Hack Facebook Account in 18 Ways

 



1. Social Engineering


(Social engineering is a non-technical method of intrusion hackers use that relies heavily on human interaction and often involves tricking people into breaking normal security procedures. It is one of the greatest threats that organizations today encounter.)



2. Facebook Phishing

(Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.)

3. Keylogging

(A keylogger is a type of surveillance software (considered to be either software or spyware) that has the capability to record every keystroke you make to a log file, usually encrypted. A keylogger recorder can record instant messages, e-mail, and any information you type at any time using your keyboard.)

4. Password Stealers

(a password stealer is a program that collects chunks of data that are likely to be account names and their associated passwords so that an attacker can use those credentials to pose as the person they were stolen from)

5. Brute Force Attacks

(When password guessing, this method is very fast when used to check all short passwords, but for longer passwords other methods such as the dictionary attack are used because of the time a brute-force search takes.)

6. Dictionary Attacks

(In cryptanalysis and computer security, a dictionary attack is a technique for defeating a cipher or authentication mechanism by trying to determine its decryption key or passphrase by trying hundreds or sometimes millions of likely possibilities, such as words in a dictionary.)

7. Exploiting Facebook's Trusted Friend Feature

(This feature enabled a facebook user to recover his/her facebook account by choosing trusted friends who will be provided a key (code) by facebook and the facebook user would need to call the trusted friends and ask for the codes, Once the facebok user has entered all three of the keys, he would regain access to his/her facebook account.)

8. Fake SMS (To Hack Facebook Status

(Hacker can send SMS from any number to any number and he can also update the status of any facebook account if the victim have active that service.)

9. Session Hijacking

(In computer science, session hijacking, sometimes also known as cookie hijacking is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system.)

10. Sidejacking

(Sidejacking is the process of stealing someone's access to a website, typically done on wireless public networks. To sidejack access to a website, the bad actor uses a packet sniffer to obtain an unencrypted cookie that grants access to a website, such as webmail.)

11. Clickjacking

(Clickjacking (User Interface redress attackUI redress attackUI redressing) is a malicious technique of tricking a Web user into clicking on something different from what the user perceives they are clicking on, thus potentially revealing confidential information or taking control of their computer while clicking on seemingly innocuous web pages)

12. Mobile Phone Hacking

(Phone hacking is the practice of intercepting telephone calls or voicemail messages, often by accessing the voicemail messages of a mobile phone without the consent of the phone's owner.)

13. DNS Spoofing

(DNS spoofing (or DNS cache poisoning) is a computer hacking attack, whereby data is introduced into a Domain Name System (DNS) resolver's cache, causing the name server to return an incorrect IP address, diverting traffic to the attacker's computer (or any other computer).

14. USB Hacking xD

(USB simply contains applications that recover passord and such).

15. Man In the Middle Attacks

(In cryptography and computer security, a man-in-the-middle attack (often abbreviated to MITM, MitM, MIM, MiM or MITMA) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.)

16. Botnets

(botnet is a collection of compromised computers often referred to as “zombies” infected with malware that allows an attacker to control them.)


17. ByPass Security Question


(Allows you to bypass security question of your friend and reset the password with the help of 2 mutual friends.)



18. Cookies Grabing 


(Typically found in Web applications that enables attackers to inject client-side script into Web pages viewed by other users.)


Download PDF Guide for Hacking Facebook Account

Download PDF Guide to Hack Facebook Account