TOP TEN WAYS OF HACKING 1. Phishing the most popular attack - TopicsExpress



          

TOP TEN WAYS OF HACKING 1. Phishing the most popular attack vector used for hacking facebook accounts,in this hacker creates a fake login page which exactly looks like the real facebook page and then asks the victim to login into that page, Once the victim logins through the fake page the victims Email Addressis stored in to a text file.Always see the url box if it looks supicious then dont sign in eg : tweakskart.log.me.in 2. Keylogging Keylogging it is the easiest way to hack fb. A keylogger is basically a small program which once is installed on victims computer will record every thing which victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address. prevention so always download file scan by the virus total 3. Stealers most of the people saved the password in browser to access the facebook.hacker can steal your data with pendrive and other method also. prevention: don;t save your password in browser. 4. Session Hijacking Session Hijacking can be often very dangerous if you are accessing Facebook on a connection, In a Session Hijacking attack a hacker steals the victims browser cookie which is used to authenticate a user on a website and uses to it to access victims account, Session hijacking is widely used on Lans. prevention always use https 5. Sidejacking With Firesheep Sidejacking attack went common in late 2010, however its still popular now a days, Firesheep is widely used to carry out sidejacking attacks, Firesheep only works when the attacker and victim is on the same wifi network. A sidejacking attack is basically another name for http session hijacking, but its more targeted towards wifi users. 6. Mobile Phone Hacking Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are lots of Mobile Spying softwares used to monitor a Cellphone.The most popular Mobile Phone Spying softwares are: use antivirus and always download file truth sworthly websites 7. DNS Spoofing If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original facebook page to his own fake page and hence can get access to victims facebook account. 8. Man In the Middle Attacks If the victim and attacker are on the same lan and on a switch based network, A hacker can place himself b/w the client and the server or he could also act as a default gateway and hence capturing all the traffic in between, ARP Poisoning which is the other name for man in the middle attacks is a very broad topic and is beyond the scope of this article. 9. Botnets Botnets are not commonly used for hacking facebook accounts, because of its high setup costs, They are used to carry more advanced attacks, A botnet is basically a collection of compromised computer, The infection process is same as the keylogging, however a botnet gives you, additional options in for carrying out attacks with the compromised computer. 10.google dork This is not a facebook hacking but it can be used for searching hacked accounts.. #paramsukhadia
Posted on: Fri, 17 Oct 2014 03:14:32 +0000

Trending Topics



Recently Viewed Topics




© 2015