Facebook is one the most used and popular social media platform to share various things among each of our friends, families and all. So to personalize our experience that means to serve us better, Facebook uses our various stuff like phone number,email id, D.O.B and various other things. But what will happen when all this data will go to bad hands? I will today in this article tell you how you can prevent yourself from all this things. But you will understand better if you know all this by a hacker's mind means what are the various ways hacker uses to hack someone account.
HACK #1
FACEBOOK PHISHING
Phishing is still the most common type of assault used for hacking Facebook accounts. There are several strategies for carrying out a phishing attack.
1. A basic phishing attack works like this....a hacker makes a fake login page which precisely resembles the genuine Facebook page.
2. An email is sent asking the casualty to login info that page.
3. Once the casualty logins through the fake page, the casualty "Email Address" and "secret word" is put away into a content record.
The hacker then downloads the content documents and get his hands on the casualties Accreditation.
HACK #2
KEYLOGGING
Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it.
A keylogger is basically a small program which once is installed on a victim's computer it will record everything which the victim types on his or her computer.
The logs are then sent back to the attacker by either TP or directly to the hacker's email address.
Two methods of Keylogging-
A. Software Keylogging- Runs on the computer's operating systems ( example: Windows 9 )
B. Hardware Keylogger- Device connected to the keyboard
HACK #3
STEALERS
Almost 80% people use stored password in their browser to access Facebook. This is very convenient for you, but can be extremely dangerous as stealers can easily access your saved password stored in the browser.
Prevention:
How to combat Facebook hacking via stealers
1. Use Password Manager
Password manager automatically fill out important forms without you having to type anything in and keeps your password safe.
2.Avoid saving password on browser
When the "remember password" prompt comes up and you are not at your own computer, click on the "not now" button.
HACK #4
SESSION HIJACKING
Session Hijacking can be often very dangerous if you are accessing Facebook on a http:// connection. In a session Hijacking attack a hacker steals the victims browser cookie which is used to authenticate a user to authenticate a user on a website and uses to it to access victims account. Session hijacking is widely used on Lan's.
Prevention:
How to combat session hijacking-
Using a Firefox add-on called Force TLS or if you use Chrome, KB SSL Enforcer. Both will automatically redirect you to secured page of the sites you visit.
1. Victims- Victim is unaware that their connection is being watched
2. Hacker- The Hacker hijacks the network connection and gathers information that's being exchanged between the victim and the server.
3. Server
HACK #5
SIDE JACKING/ FIRESHEEP
Sidejacking is a popular method for hacking Facebook and email accounts. It's the process of stealing someone's access to a website, typically done on wireless public networks.
Firesheep is widely used to carry out sidejacking attacks and works when the attacker and the victim is on the same wifi network. A sidejacking attack is basically another name for http session hijacking, but it's more targeted towards wifi users.
Prevention:
How to combat Sidejacking-
Install a free Firefox add-on called Force TLS or if you use Chrome, install KB SSL Enforcer. Both will automatically redirect you to secured pages for the sites that you choose.
HACK #6
MOBILE PHONE HACKING
Millions of Facebook users access Facebook through their mobile phones. If the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are lots of Mobile spying softwares used to monitor a cellphone.
Prevention:
How to combat Facebook Mobile Phone Hacking
1. Confirm your Mobile Number
Confirming your mobile number is one of many ways to enhance your account security on Facebook. This way, even when you lose or forget your password, Facebook will be able to send you a new one via SMS.
2. Code Generator for Android Phones
If you use an android phone, you can set up an extra layer of security by having to enter a code every time you access Facebook through the app.
HACK #7
USB HACKING
If an attacker has physical access to your computer, he or she could insert a USB stick that is programmed with a function to automatically extract saved passwords in the browser.
Prevention:
How to combat USB hacking....
1. Do not leave your laptop unattended.
2. Install software that tells your computer not to accept unrecognized devices.
HACK #8
MAN IN THE MIDDLE ATTACK
If the victim and attacker are on the same LAN and on a switch based network, a attacker can place himself between the client and the server, or he could also act as a default gateway and capturing all the traffic in between.
1.Client- The attacker secretly relays and possibly alters the communication between two parties who believes they are directly communicate with each other.
2.Hacker- Man in the middle phisher, annoynomous proxy.
HACK #9
BOTNETS
Botnets are not commonly used for hacking Facebook accounts mainly because of it's high setup costs. They are used to carry more advanced attacks.
A botnet is basically a collection of compromised computer. The infection process is same as the keylogging. However a botnet gives you additional options in for carrying out attacks with the compromised computer.
Someone of the most popular botnets include Spyeye and Zeus.
HACK #10
DNS SPOOFING
If both the victim and the attacker are on the same network, an attacker can use a DNS spoofing attack and change the original facebook.com page to his own fake page and hence can get access to victims facebook account.
Credit goes to @theblackhathacker
That's it guys.
Hope you like our list and i assure you that I will keep this article updating so that you are always ahead.
And if you have any doubts and questions or any type of suggestions, please keep us know in the comment section.
Thank youPEACE ✌️
HACK #1
FACEBOOK PHISHING
Phishing is still the most common type of assault used for hacking Facebook accounts. There are several strategies for carrying out a phishing attack.
1. A basic phishing attack works like this....a hacker makes a fake login page which precisely resembles the genuine Facebook page.
2. An email is sent asking the casualty to login info that page.
3. Once the casualty logins through the fake page, the casualty "Email Address" and "secret word" is put away into a content record.
The hacker then downloads the content documents and get his hands on the casualties Accreditation.
HACK #2
KEYLOGGING
Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it.
A keylogger is basically a small program which once is installed on a victim's computer it will record everything which the victim types on his or her computer.
The logs are then sent back to the attacker by either TP or directly to the hacker's email address.
Two methods of Keylogging-
A. Software Keylogging- Runs on the computer's operating systems ( example: Windows 9 )
B. Hardware Keylogger- Device connected to the keyboard
HACK #3
STEALERS
Almost 80% people use stored password in their browser to access Facebook. This is very convenient for you, but can be extremely dangerous as stealers can easily access your saved password stored in the browser.
Prevention:
How to combat Facebook hacking via stealers
1. Use Password Manager
Password manager automatically fill out important forms without you having to type anything in and keeps your password safe.
2.Avoid saving password on browser
When the "remember password" prompt comes up and you are not at your own computer, click on the "not now" button.
HACK #4
SESSION HIJACKING
Session Hijacking can be often very dangerous if you are accessing Facebook on a http:// connection. In a session Hijacking attack a hacker steals the victims browser cookie which is used to authenticate a user to authenticate a user on a website and uses to it to access victims account. Session hijacking is widely used on Lan's.
Prevention:
How to combat session hijacking-
Using a Firefox add-on called Force TLS or if you use Chrome, KB SSL Enforcer. Both will automatically redirect you to secured page of the sites you visit.
1. Victims- Victim is unaware that their connection is being watched
2. Hacker- The Hacker hijacks the network connection and gathers information that's being exchanged between the victim and the server.
3. Server
HACK #5
SIDE JACKING/ FIRESHEEP
Sidejacking is a popular method for hacking Facebook and email accounts. It's the process of stealing someone's access to a website, typically done on wireless public networks.
Firesheep is widely used to carry out sidejacking attacks and works when the attacker and the victim is on the same wifi network. A sidejacking attack is basically another name for http session hijacking, but it's more targeted towards wifi users.
Prevention:
How to combat Sidejacking-
Install a free Firefox add-on called Force TLS or if you use Chrome, install KB SSL Enforcer. Both will automatically redirect you to secured pages for the sites that you choose.
HACK #6
MOBILE PHONE HACKING
Millions of Facebook users access Facebook through their mobile phones. If the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are lots of Mobile spying softwares used to monitor a cellphone.
Prevention:
How to combat Facebook Mobile Phone Hacking
1. Confirm your Mobile Number
Confirming your mobile number is one of many ways to enhance your account security on Facebook. This way, even when you lose or forget your password, Facebook will be able to send you a new one via SMS.
2. Code Generator for Android Phones
If you use an android phone, you can set up an extra layer of security by having to enter a code every time you access Facebook through the app.
HACK #7
USB HACKING
If an attacker has physical access to your computer, he or she could insert a USB stick that is programmed with a function to automatically extract saved passwords in the browser.
Prevention:
How to combat USB hacking....
1. Do not leave your laptop unattended.
2. Install software that tells your computer not to accept unrecognized devices.
HACK #8
MAN IN THE MIDDLE ATTACK
If the victim and attacker are on the same LAN and on a switch based network, a attacker can place himself between the client and the server, or he could also act as a default gateway and capturing all the traffic in between.
1.Client- The attacker secretly relays and possibly alters the communication between two parties who believes they are directly communicate with each other.
2.Hacker- Man in the middle phisher, annoynomous proxy.
HACK #9
BOTNETS
Botnets are not commonly used for hacking Facebook accounts mainly because of it's high setup costs. They are used to carry more advanced attacks.
A botnet is basically a collection of compromised computer. The infection process is same as the keylogging. However a botnet gives you additional options in for carrying out attacks with the compromised computer.
Someone of the most popular botnets include Spyeye and Zeus.
HACK #10
DNS SPOOFING
If both the victim and the attacker are on the same network, an attacker can use a DNS spoofing attack and change the original facebook.com page to his own fake page and hence can get access to victims facebook account.
Credit goes to @theblackhathacker
That's it guys.
Hope you like our list and i assure you that I will keep this article updating so that you are always ahead.
And if you have any doubts and questions or any type of suggestions, please keep us know in the comment section.
Thank youPEACE ✌️
10 Ways How Hackers can Hack Your Facebook Account | Step by step process with Images
Reviewed by Rahul Choudhary
on
August 01, 2019
Rating:
No comments: