8.9.14

6 WADDO OO AAD KU XADI KARTID FACEBOOK ACCOUNT'S !!!

9/08/2014

5 Ways to Hack a Facebook Account | Facebook Hacking 1) Phishing : The 1st and very basic way of hacking Fb id is via Phishing. Phishing is actually creating fake web pages to steal user’s credentials like passwords,phone no,emails,etc. DRAWBACK : nowadays Users are aware of these type of attacks and one can not be easily fooled using this type of attacks. You need some social engineering to trick someone. ‘ Prevention : Always check the page URL(link) before logging in. This is the most trusted and effective way one can use to getting attack from phishing. also you can use some good Antivirus software which will warn you if you visit a harmful phishing page. Even if somehow you have already entered your Passwords and emails in a phising site, Immediately Change your password. 2) Keylogging : ( Keyloggers ) An another good way of hacking Fb accounts. In this type of attack a hacker simply sends an infected file having keylogger in it to the victim. If the victim executes(run) that file on his computer , and then whatever he types will be mailed/uploaded to hacker’s server. The advantage of this attack is that the victim won’t know that hacker is getting every Bit of data he is typing in his computer . Another big advantage is that hacker will get passwords of all the accounts used on that computer. Sometimes they will steal your internet bank account's passwords. DRAWBACkS : Keyloggers are often detected as harmfull viruses by good antiviruses. Hacker must find a way to protect it from a good antivirus. Prevention : Execute or run the file only if you trust the sender. Use online visus scanner such as novirusthanks.org . Use good antivirus and always update it regularly . 3)Sniffing It consists of stealing session in progress. In this type of attack an attacker makes connection with server and client and relays message between them, making them believe that they are talking to each other directly. DRAWBACK : If user is logged out then attacker is also logged out and the session is lost. It is difficult to sniff on SSL protected networks.\ Prevention : Always use SSL secured connections. Always keep a look at the url if the http:// is not changed to https:// it means that sniffing is active on your network. 4) Trojans/backdoors : This is an advanced level topic. It consists of a server and a client. In this type of attack the attacker sends the infected server to the victim. After execution the infected server i.e. Trojan Horse (virus) on the victim’s computer opens a backdoor and now the hacker can do whatever he wants with the victim’s computer DRAWBACK : Trojans Horses are also often detected as threats by good antiviruses. Hacker must find a way to protect it from antivirus. Prevention : Run the file only if you trust the sender or source. Use online virus scanner such as novirusthanks.org Use good antivirus and always update it regularly . 5)Social Engineering : This method includes guessing and fooling the clients to give their own passwords to hackers. In this type of attack, a hacker sends a fake mail to the victim which is very convincing and appealing and asks the user for his password. Answering the security questions also lies under this category. Drawback : It is not easy to convince someone to make him give his password. And Guessing generally doesn’t always work ( Although if you are lucky enough it may work!). Prevention : Never give your password to anyone Don’t believe in any sort of emails which asks for your password. LAST AND VERY EFFECTIVE 6) Session Hijacking In a session hijacking attack an attacker stealsvictims cookies, cookies stores all the necessary logging Information about one’s account like passwords and emails, By using this info an attacker can easily hack anybody’s account. If you get the cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Facebook, Google, Yahoo, etc,. Drawbacks : You will be logged out when user is logged out. You will not get the password of the user’s account. and this Will not work if the user is using HTTPS connections. Prevention : Always work on SSL secured connections. Always keep a look at the url if the http:// is changed to https:// it means that sniffing is active on your network. Like And Share !!!

Written by

a computer geek and a junior compo programmer by interest and lecturer in accounting by profession. He got his MSIT, BBIT, and MBA in Community Development at Golis University - Burao and Fair Land University - Hargesia. He has an excellence work experience with Excel Accounting/Financial Accounting, AIS/MIS/FIS/Computerized Accounting. He also masters in Excel Programming, Access Programming not to mention that he is an IT Professional in Microsoft Studio and Visual Basic Programming , Web Development in "PHP, Joomla, Wold Press. He also trained in Networking, Hardware, IT Security all in all Maxbuub has a limit let potentials and skills and he chooses to share all of that an more in this blog. Facebook: https://www.facebook.com/MrBura0

0 comments:

Post a Comment

 

© 2014 Hacks And Security . All rights resevered. Designed by Templateism

Back To Top