All Tricks
    • Home
    • Hacking
      • IDM UNIVERSAL CRACK
      • Bruit Force
      • Phishing FB new
      • Phishing Gmail New
      • Kali Tabnapping
      • Hack friends Profile
      • Hacking Tips
      • SSL Breaking Fb hack
      • Hack Wifi Win.
      • Website hack
    • Android
      • Root Android
      • Speed Up Android
      • Partition in SD
      • Run Kali on Android
      • Android on PC
      • Find Lost Android
      • Apple vs Android Vs Win
      • Apple vs Android Vs Win
    • Facebook
      • Autolikes
      • Page Rename
      • Rename FB ID
      • Empty Facebook ID
      • Blog to Facebook
      • IP changer Firefox
      • Bruit Force Attack
      • Xss Ijection FB
    • Youtube
      • Youtube -- 9xbuddy
      • Youtube -- Savefrom Net
      • Youtube -- catch videos
      • Youtube Downloader alltricks
      • Our Youtube Channel
    • Downloads
      • IDM UNIVERSAL CRACK POST
      • IDM CRACK UPDATE 11/2016
      • IDM Crack Direct Download 1
      • IDM crack Direct 2
      • Ease Us Recovery
    • Chat
    • DMCA ©
    • Contact us
      • Resume
      • CV
  • Home
  • Hacking
    • IDM UNIVERSAL CRACK
    • Bruit Force
    • Phishing FB new
    • Phishing Gmail New
    • Kali Tabnapping
    • Hack friends Profile
    • Hacking Tips
    • SSL Breaking Fb hack
    • Hack Wifi Win.
    • Website hack
  • Android
    • Root Android
    • Speed Up Android
    • Partition in SD
    • Run Kali on Android
    • Android on PC
    • Find Lost Android
    • Apple vs Android Vs Win
    • Apple vs Android Vs Win
  • Facebook
    • Autolikes
    • Page Rename
    • Rename FB ID
    • Empty Facebook ID
    • Blog to Facebook
    • IP changer Firefox
    • Bruit Force Attack
    • Xss Ijection FB
  • Youtube
    • Youtube -- 9xbuddy
    • Youtube -- Savefrom Net
    • Youtube -- catch videos
    • Youtube Downloader alltricks
    • Our Youtube Channel
  • Downloads
    • IDM UNIVERSAL CRACK POST
    • IDM CRACK UPDATE 11/2016
    • IDM Crack Direct Download 1
    • IDM crack Direct 2
    • Ease Us Recovery
  • Chat
  • DMCA ©
  • Contact us
    • Resume
    • CV

Wednesday, 16 April 2014

4 Ways to Crack a Facebook Password and How to Protect Yourself from Them

 Parth Makadiya     05:02     FACEBOOK, HACK, SECURE     No comments   

We share our lives on Facebook. We share our birthdays and our anniversaries. We share our vacation plans and locations. We share the births of our sons and the deaths of our fathers. We share our most cherished moments and our most painful thoughts. We divulge every aspect of our lives. We even clamor to see the latest versions even before they're ready for primetime.
But we sometimes forget who's watching.
We use Facebook as a tool to connect, but there are those people who use that connectivity for malicious purposes. We reveal what others can use against us. They know when we're not home and for how long we're gone. They know the answers to our security questions. People can practically steal our identities—and that's just with the visible information we purposely give away through our public Facebook profile.
The scariest part is that as we get more comfortable with advances in technology, we actually become more susceptible to hacking. As if we haven't already done enough to aid hackers in their quest for our data by sharing publicly, those in the know can get into our emails and Facebook accounts to steal every other part of our lives that we intended to keep away from prying eyes.
In fact, you don't even have to be a professional hacker to get into someone's Facebook account.
It can be as easy as running Firesheep on your computer for a few minutes. In fact, Facebook actually allows people to get into someone else's Facebook account without knowing their password. All you have to do is choose three friends to send a code to. You type in the three codes, and voilà—you're into the account. It's as easy as that.
In this article I'll show you these, and a couple other ways that hackers (and even regular folks) can hack into someone's Facebook account. But don't worry, I'll also show you how to prevent it from happening to you.

Method 1: Reset the Password

The easiest way to "hack" into someone's Facebook is through resetting the password. This could be easier done by people who are friends with the person they're trying to hack.
  • The first step would be to get your friend's Facebook email login. If you don't already know it, try looking on their Facebook page in the Contact Info section.
  • Next, click on Forgotten your password? and type in the victim's email. Their account should come up. Click This is my account.
  • It will ask if you would like to reset the password via the victim's emails. This doesn't help, so press No longer have access to these?
  • It will now ask How can we reach you? Type in an email that you have that also isn't linked to any other Facebook account.
  • It will now ask you a question. If you're close friends with the victim, that's great. If you don't know too much about them, make an educated guess. If you figure it out, you can change the password. Now you have to wait 24 hours to login to their account.
  • If you don't figure out the question, you can click on Recover your account with help from friends. This allows you to choose between three and five friends.
  • It will send them passwords, which you may ask them for, and then type into the next page. You can either create three to five fake Facebook accounts and add your friend (especially if they just add anyone), or you can choose three to five close friends of yours that would be willing to give you the password.

How to Protect Yourself

  • Use an email address specifically for your Facebook and don't put that email address on your profile.
  • When choosing a security question and answer, make it difficult. Make it so that no one can figure it out by simply going through your Facebook. No pet names, no anniversaries—not even third grade teacher's names. It's as easy as looking through a yearbook.
  • Learn about recovering your account from friends. You can select the three friends you want the password sent to. That way you can protect yourself from a friend and other mutual friends ganging up on you to get into your account.

Method 2: Use a Keylogger

Software Keylogger
A software keylogger is a program that can record each stroke on the keyboard that the user makes, most often without their knowledge. The software has to be downloaded manually on the victim's computer. It will automatically start capturing keystrokes as soon as the computer is turned on and remain undetected in the background. The software can be programmed to send you a summary of all the keystrokes via email.
CNET has Free Keylogger, which as the title suggests, is free. If this isn't what you're looking for, you can search for other free keyloggers or pay for one.
Hardware Keylogger
These work the same way as the software keylogger, except that a USB drive with the software needs to be connected to the victim's computer. The USB drive will save a summary of the keystrokes, so it's as simple as plugging it to your own computer and extracting the data. You can look through Keelog for prices, but it's bit higher than buying the software since you have the buy the USB drive with the program already on it.

How to Protect Yourself

  • Use a firewall. Keyloggers usually send information through the internet, so a firewall will monitor your computer's online activity and sniff out anything suspicious.
  • Install a password manager. Keyloggers can't steal what you don't type. Password mangers automatically fill out important forms without you having to type anything in.
  • Update your software. Once a company knows of any exploits in their software, they work on an update. Stay behind and you could be susceptible.
  • Change passwords. If you still don't feel protected, you can change your password bi-weekly. It may seem drastic, but it renders any information a hacker stole useless.

Method 3: Phishing

This option is much more difficult than the rest, but it is also the most common method to hack someone's account. The most popular type ofphishing involves creating a fake login page. The page can be sent via email to your victim and will look exactly like the Facebook login page. If the victim logs in, the information will be sent to you instead of to Facebook. This process is difficult because you will need to create a web hosting account and a fake login page.
The easiest way to do this would be to follow our guide on how to clone a website to make an exact copy of the facebook login page. Then you'll just need to tweak the submit form to copy / store / email the login details a victim enters. If you need help with the exact steps, there are detailed instructions available by Alex Long here on Null Byte. Users are very careful now with logging into Facebook through other links, though, and email phishing filters are getting better every day, so that only adds to this already difficult process. But, it's still possible, especially if you clone the entire Facebook website.

How to Protect Yourself

  • Don't click on links through email. If an email tells you to login to Facebook through a link, be wary. First check the URL (Here's a great guide on what to look out for). If you're still doubtful, go directly to the main website and login the way you usually do.
  • Phishing isn't only done through email. It can be any link on any website / chat room / text message / etc. Even ads that pop up can be malicious. Don't click on any sketchy looking links that ask for your information.
  • Use anti-virus & web security software, like Norton or McAfee.

Method 4: Stealing Cookies

Cookies allow a website to store information on a user's hard drive and later retrieve it. These cookies contain important information used to track a session that a hacker can sniff out and steal if they are on the same Wi-Fi network as the victim. They don't actually get the login passwords, but they can still access the victim's account by cloning the cookies, tricking Facebook into thinking the hacker's browser is already authenticated.
Firesheep is a Firefox add-on that sniffs web traffic on an open Wi-Fi connection. It collects the cookies and stores them in a tab on the side of the browser.
From there, the hacker can click on the saved cookies and access the victim's account, as long as the victim is still logged in. Once the victim logs out, it is impossible for the hacker to access the account.

How to Protect Yourself

  • On Facebook, go to your Account Settings and check under Security. Make sure Secure Browsing is enabled. Firesheep can't sniff out cookies over encrypted connections like HTTPS, so try to steer away from HTTP.
  • Full time SSL. Use Firefox add-ons such as HTTPS-Everywhere or Force-TLS.
  • Log off a website when you're done. Firesheep can't stay logged in to your account if you log off.
  • Use only trustworthy Wi-Fi networks. A hacker can be sitting across from you at Starbucks and looking through your email without you knowing it.
  • Use a VPN. These protect against any sidejacking from the same WiFi network, no matter what website you're on as all your network traffic will be encrypted all the way to your VPN provider.

Protecting Yourself: Less Is More

Social networking websites are great ways to stay connected with old friends and meet new people. Creating an event, sending a birthday greeting and telling your parents you love them are all a couple of clicks away.
Facebook isn't something you need to steer away from, but you do need to be aware of your surroundings and make smart decisions about what you put up on your profile. The less information you give out on Facebook for everyone to see, the more difficult you make it for hackers.
If your Facebook account ever gets hacked, check out our guide on getting your hacked Facebook account back for information on restoring your account.
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg
Email ThisBlogThis!Share to XShare to Facebook
Newer Post Older Post Home

0 comments:

Post a Comment

Popular Posts

  • Internet Download Manager [IDM] Universal Crack Version
    By Parth Makadiya Note  : This crack has a built-in update function . Once IDM new version comes, you can update and apply crack ...
  • Windows Phone 8.1 Review: Gloriously Good Enough
    By Parth Makadiya Share On Google+ Add This To Delicious Tweet/ReTweet This Share on Facebook StumbleUpon This Digg This Microsof...
  • How to Open or Access Blocked Websites at Schools,College and Office Work
    By Parth Makadiya Share On Google+ Add This To Delicious Tweet/ReTweet This Share on Facebook StumbleUpon This Digg This N...
  • How to Hack WPA WiFi Passwords by Cracking the WPS PIN
    A flaw in  WPS , or  W iFi  P rotected  S etup, known about for over a year by  TNS , was finally exploited with proof...

Recent Posts

LightBlog

Categories

2 STEP VERIFICATION (1) 4.4 (2) 4.4.3 (1) 4G (1) ADSEAN (1) ANDROID (8) ANDROID ON PC (1) APK ON PC (2) BACKLINK (1) BLOCK (1) BLOG (2) BOOT (1) BOOTABLE (2) CCPROXY (1) Change (1) Chat (1) CMD (1) CRACK (1) CREATE YOUR OS (1) DATA (1) DOWNLOAD (1) DOWNLOADER (1) DUAL OS (1) error (1) EXTRA SECURE (1) FACEBOOK (5) FB (1) FEATURES (1) FIREFOX (1) fix error (1) FORMAT (1) FREE (1) GET TRAFFIC (1) GLASS (1) GOOGLE (2) HACK (12) HDD (1) HELP (3) HIDDEN PROFILE PICTURE (1) HOSTING (1) How to (1) IDM (2) INTERNET (1) INTERNET DOWNLOAD MANAGER (1) IOS VS WINDOWS VS ANDROID (1) KEYLOGGER (2) LINUX (1) Mac Adress (1) MOBILE (1) NEXUS (1) NOKIA ANDROID (1) NOTPAD (1) ONLINE (2) OPEN (1) OWN (1) PAGE (2) PATTERN (1) PC (2) PENDRIVE (1) PHISHING (1) PHONE (1) playstore (1) RECOVERY (2) RENAME (1) REVIEW (1) ROOT (5) SAMSUNG (1) SECURE (2) SHUT (1) Snuff (1) Social (1) solve error (1) SPEED (1) SPYWARE (1) TORRENT (1) TORRENT WITH IDM (1) TRACE (1) TRICKS (1) UPDATE (3) VIRUS (1) WEBCAM (1) WEBSITE (1) WEBSITES (2) widget (1) WIFI (4) WINDOWS (1) WINDOWS 7 (1) WINDOWS 8 (1) YOUTUBE (1)

Unordered List

  • Follow on Twitter
  • Like on Facebook
  • Subscribe on Youtube
  • Follow on Instagram

Pages

  • Home

Text Widget

Blog Archive

  • Home
  • About
  • Contact
  • 404
Powered by Blogger.

Category 4

Instagram

Ads Inside Post

Total Pageviews

Recent

Comment

Subscribe

Subscribe

Category 5

Event more news

Recent Posts

Breaking

Recent Posts

Contributors

  • Parth Makadiya
  • Top Android Applications

Contact Form

Name

Email *

Message *

  • Home
  • About
  • Contact
  • Features
  • _feature 1
  • _feature 2
  • __feature 3.1
  • __feature 3.2
  • __feature 3.3
  • _feature 4
  • _feature 5
  • Shortcodes
  • Documentation
  • Download this template

Labels

  • 2 STEP VERIFICATION
  • 4.4
  • 4.4.3
  • 4G
  • ADSEAN
  • ANDROID
  • ANDROID ON PC
  • APK ON PC
  • BACKLINK
  • BLOCK
  • BLOG
  • BOOT
  • BOOTABLE
  • CCPROXY
  • Change
  • Chat
  • CMD
  • CRACK
  • CREATE YOUR OS
  • DATA
  • DOWNLOAD
  • DOWNLOADER
  • DUAL OS
  • error
  • EXTRA SECURE
  • FACEBOOK
  • FB
  • FEATURES
  • FIREFOX
  • fix error
  • FORMAT
  • FREE
  • GET TRAFFIC
  • GLASS
  • GOOGLE
  • HACK
  • HDD
  • HELP
  • HIDDEN PROFILE PICTURE
  • HOSTING
  • How to
  • IDM
  • INTERNET
  • INTERNET DOWNLOAD MANAGER
  • IOS VS WINDOWS VS ANDROID
  • KEYLOGGER
  • LINUX
  • Mac Adress
  • MOBILE
  • NEXUS
  • NOKIA ANDROID
  • NOTPAD
  • ONLINE
  • OPEN
  • OWN
  • PAGE
  • PATTERN
  • PC
  • PENDRIVE
  • PHISHING
  • PHONE
  • playstore
  • RECOVERY
  • RENAME
  • REVIEW
  • ROOT
  • SAMSUNG
  • SECURE
  • SHUT
  • Snuff
  • Social
  • solve error
  • SPEED
  • SPYWARE
  • TORRENT
  • TORRENT WITH IDM
  • TRACE
  • TRICKS
  • UPDATE
  • VIRUS
  • WEBCAM
  • WEBSITE
  • WEBSITES
  • widget
  • WIFI
  • WINDOWS
  • WINDOWS 7
  • WINDOWS 8
  • YOUTUBE

Instagram

Labels

  • 2 STEP VERIFICATION
  • 4.4
  • 4.4.3
  • 4G
  • ADSEAN
  • ANDROID
  • ANDROID ON PC
  • APK ON PC
  • BACKLINK
  • BLOCK
  • BLOG
  • BOOT
  • BOOTABLE
  • CCPROXY
  • Change
  • Chat
  • CMD
  • CRACK
  • CREATE YOUR OS
  • DATA
  • DOWNLOAD
  • DOWNLOADER
  • DUAL OS
  • error
  • EXTRA SECURE
  • FACEBOOK
  • FB
  • FEATURES
  • FIREFOX
  • fix error
  • FORMAT
  • FREE
  • GET TRAFFIC
  • GLASS
  • GOOGLE
  • HACK
  • HDD
  • HELP
  • HIDDEN PROFILE PICTURE
  • HOSTING
  • How to
  • IDM
  • INTERNET
  • INTERNET DOWNLOAD MANAGER
  • IOS VS WINDOWS VS ANDROID
  • KEYLOGGER
  • LINUX
  • Mac Adress
  • MOBILE
  • NEXUS
  • NOKIA ANDROID
  • NOTPAD
  • ONLINE
  • OPEN
  • OWN
  • PAGE
  • PATTERN
  • PC
  • PENDRIVE
  • PHISHING
  • PHONE
  • playstore
  • RECOVERY
  • RENAME
  • REVIEW
  • ROOT
  • SAMSUNG
  • SECURE
  • SHUT
  • Snuff
  • Social
  • solve error
  • SPEED
  • SPYWARE
  • TORRENT
  • TORRENT WITH IDM
  • TRACE
  • TRICKS
  • UPDATE
  • VIRUS
  • WEBCAM
  • WEBSITE
  • WEBSITES
  • widget
  • WIFI
  • WINDOWS
  • WINDOWS 7
  • WINDOWS 8
  • YOUTUBE

Translate

Awesome

Category 5

Post Slider



Facebook

Comments

LightBlog
Adbox

Advertisement

About us

Popular Posts
  • Internet Download Manager [IDM] Universal Crack Version
    By Parth Makadiya Note  : This crack has a built-in update function . Once IDM new version comes, you can update and apply crack ...
  • Windows Phone 8.1 Review: Gloriously Good Enough
    By Parth Makadiya Share On Google+ Add This To Delicious Tweet/ReTweet This Share on Facebook StumbleUpon This Digg This Microsof...
  • How to Open or Access Blocked Websites at Schools,College and Office Work
    By Parth Makadiya Share On Google+ Add This To Delicious Tweet/ReTweet This Share on Facebook StumbleUpon This Digg This N...
  • How to Hack WPA WiFi Passwords by Cracking the WPS PIN
    A flaw in  WPS , or  W iFi  P rotected  S etup, known about for over a year by  TNS , was finally exploited with proof...
  • What is ROOT??
    Rooting - is it for me? Some Q&A By Parth Makadiya Share On Google+ Add This To Delicious Tweet/...
  • How To Root Android the Easy Way
    How To Root Android the Easy Way Click Here to Root Android By Parth Makadiya Share On Google+ Add This To Delicious Twe...
  • Creating Bootable Pen Drive Using Windows Command Prompt
    Making a pen drive bootable is possible in Windows7 & Windows8 operating system. Formatting a computer to install fresh Windows OS ...
  • Google Play Store Error 498 – 5 Ways to Fix it
    By Parth Makadiya Recently While Downloading Asphalt game on my Smartphone I got an  Error 498  in Google Play Store. To be Exact, the Err...
  • How to Recover Lost Data from a Formatted Drive in 7 Steps
    By  Parth Makadiya Last time we talked about when to use data recovery software and  10 features to look for when choosing recovery soft...
  • How to Install Windows XP from USB Flash/Pen Drive
    BY Parth Makadiya Share On Google+ Add This To Delicious Tweet/ReTweet This Share on Facebook StumbleUpon This Digg This Inst...

Sample Text

Copyright © All Tricks | Powered by Blogger
Design by Hardeep Asrani | Blogger Theme by NewBloggerThemes.com | Distributed By Gooyaabi Templates