There are many ways to hack someone Facebook accounts or profiles.
❶ Phishing
Phishing is still one of the most popular attack vector used for hacking Facebook accounts. this technique not only used to hack fb accounts but it is also use for tweeter, Instagram, and other social media's account's. There are different methods to carry out phishing attack. In a simple phishing attacks a hacker creates a fake Login page which exactly looks like the real page of Facebook after then asks the victim to log in. Once the victim fill up the information and log in through the fake page the, the victims "Email Address" and "Password" is stored in to one text file, and the hacker then downloads that text file and gets his hands on the victims credentials information.
❷ Keylogging
Keylogging is the easiest and simple way to hack a someone Facebook password. Keylogging sometimes can be very dangerous that even a person with good knowledge of computers can fall for it. there is two types of keylogger available 1) software keyylogger and 2)hardware keylogger.. A Keylogger is basically a small program which, once is installed on victim's personal computer and it will record every thing victim types on his/her computer. The logs are then send back to the attacker or hacker by either FTP or directly to hackers e-mail address.
❸ Stealer's
Almost 85% percent people use stored passwords in their browser history to access the Facebook or any of accounts. This is quite convenient, but this is not at all it can sometimes be extremely dangerous for the user's. Stealer's are software's that specially designed to capture the cookie's that are available in the browsers and try to steal the saved passwords stored in the victims computer Browser.
❹ Session Hijacking
Session Hijacking can be often very dangerous if you are using or accessing Facebook or any of your account's on a http ( that is non secure) connection. In Session Hijacking attack is same as stealer's technique, a hacker steals the victims browser history or cookie which is used to authenticate the user on a website, and use it to access the victims account. Session hijacking is mostly used on LAN(oriented connection), and WiFi(wireless)connections. session hijacking also done with using search engine.
❺ Sidejacking With Firesheep
Sidejacking attack went common in late 2011, however it's still most popular now a days. Firesheep is widely used to carry out sidejacking attacks. Firesheep only works when the attacker and victim is on the same (network)WiFi network. this attack is basically another name. That is for http session hijacking, but it's more targeted towards WiFi users.
❻ Mobile Phone Hacking
Millions of social account users access through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her any of accounts account. Their are a lots of Mobile Spying software's and worm viruses are used to unavailable the services and monitor a Cellphone. The most popular Mobile Phone Spying software's are available you can use free of cost and that is : Bossy spy, Mobile Spy, and Spy Phone Gold.
❼ DNS Spoofing
If both the user or victim and attacker or hacker are on the same network, an attacker(hacker) can use a DNS spoofing attack and change the original Facebook page to his own fake page(same technique that use in phishing) and hence can get access to victims Facebook account.
❽ USB Hacking
If an attacker has physical access to your victim computer, he could just insert a programmed USB with a function to automatically extract saved passwords in the Internet browser. so it will be easy for the attacker or hacker. nothing to just get physical access of the victim's system.
❾ Man In the Middle Attacks
If the victim and attacker are on the same LAN connection and on a switch based network, a hacker or attacker can place himself between the client and the server, or he could act as a default gateway and hence capturing all the traffic in between. Here key exchange methods are use for gain access of the client and server information.
❿ Botnets
Last But not at least, Botnets are not commonly used for hacking Facebook accounts or any of your account's , because of it's high setup costs They are used to carry more advanced attacks. A Botnet is actually a collection of compromised system or computer. The infection process is same as the key logging, however a Botnet gives you additional options for carrying out attacks with the compromised system or computer. Some of the most popular Botnets include Zeus and Spyeye that is available online.
❷ Keylogging
Keylogging is the easiest and simple way to hack a someone Facebook password. Keylogging sometimes can be very dangerous that even a person with good knowledge of computers can fall for it. there is two types of keylogger available 1) software keyylogger and 2)hardware keylogger.. A Keylogger is basically a small program which, once is installed on victim's personal computer and it will record every thing victim types on his/her computer. The logs are then send back to the attacker or hacker by either FTP or directly to hackers e-mail address.
❸ Stealer's
Almost 85% percent people use stored passwords in their browser history to access the Facebook or any of accounts. This is quite convenient, but this is not at all it can sometimes be extremely dangerous for the user's. Stealer's are software's that specially designed to capture the cookie's that are available in the browsers and try to steal the saved passwords stored in the victims computer Browser.
❹ Session Hijacking
Session Hijacking can be often very dangerous if you are using or accessing Facebook or any of your account's on a http ( that is non secure) connection. In Session Hijacking attack is same as stealer's technique, a hacker steals the victims browser history or cookie which is used to authenticate the user on a website, and use it to access the victims account. Session hijacking is mostly used on LAN(oriented connection), and WiFi(wireless)connections. session hijacking also done with using search engine.
❺ Sidejacking With Firesheep
Sidejacking attack went common in late 2011, however it's still most popular now a days. Firesheep is widely used to carry out sidejacking attacks. Firesheep only works when the attacker and victim is on the same (network)WiFi network. this attack is basically another name. That is for http session hijacking, but it's more targeted towards WiFi users.
❻ Mobile Phone Hacking
Millions of social account users access through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her any of accounts account. Their are a lots of Mobile Spying software's and worm viruses are used to unavailable the services and monitor a Cellphone. The most popular Mobile Phone Spying software's are available you can use free of cost and that is : Bossy spy, Mobile Spy, and Spy Phone Gold.
❼ DNS Spoofing
If both the user or victim and attacker or hacker are on the same network, an attacker(hacker) can use a DNS spoofing attack and change the original Facebook page to his own fake page(same technique that use in phishing) and hence can get access to victims Facebook account.
❽ USB Hacking
If an attacker has physical access to your victim computer, he could just insert a programmed USB with a function to automatically extract saved passwords in the Internet browser. so it will be easy for the attacker or hacker. nothing to just get physical access of the victim's system.
❾ Man In the Middle Attacks
If the victim and attacker are on the same LAN connection and on a switch based network, a hacker or attacker can place himself between the client and the server, or he could act as a default gateway and hence capturing all the traffic in between. Here key exchange methods are use for gain access of the client and server information.
❿ Botnets
Last But not at least, Botnets are not commonly used for hacking Facebook accounts or any of your account's , because of it's high setup costs They are used to carry more advanced attacks. A Botnet is actually a collection of compromised system or computer. The infection process is same as the key logging, however a Botnet gives you additional options for carrying out attacks with the compromised system or computer. Some of the most popular Botnets include Zeus and Spyeye that is available online.
---THANK YOU---
COMMENT IF YOU WANT TO KNOW MORE ABOUT THIS TECHNIQUES IN DEEPLY AND PRACTICALLY.
SUBSCRIBE MY BLOG AND SHARE THIS ARTICLE TO YOUR FRIENDS.
EmoticonEmoticon