🔗Note :- This post is only for security purpose don't try any illegal activity and i'm sharing these methods so you can protect your Facebook account from these types of hacking attacks.
1. Hack Facebook Account Password By Phishing
Phishing is still the most popular attack vector used for hacking Facebook accounts. There are variety methods to carry out phishing attack. In a simple phishing attacks a hacker creates a fake log in page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim log in through the fake page the, the victims "Email Address" and "Password" is stored in to a text file, and the hacker then downloads the text file and gets his hands on the victims credentials.
2. Hack Facebook Account Password By Keylogging
Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A Keylogger is basically a small program which, once is installed on victim's computer, will record every thing victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.
Almost 80% percent people use stored passwords in their browser to access the Facebook. This is quite convenient, but can sometimes be extremely dangerous. Stealer's are software's specially designed to capture the saved passwords stored in the victims Internet browser.
4. Session Hijacking
Session Hijacking can be often very dangerous if you are accessing Facebook on a http (non secure) connection. In Session Hijacking attack, a hacker steals the victims browser cookie which is used to authenticate the user on a website, and use it to access the victims account. Session hijacking is widely used on LAN, and WiFi connections.
5. Sidejacking With Firesheep
Sidejacking attack went common in late 2010, however it's still popular now a days. Firesheep is widely used to carry out sidejacking attacks. Firesheep only works when the attacker and victim is on the same WiFi network. A sidejacking attack is basically another name for http session hijacking, but it's more targeted towards WiFi users.
6. Mobile Phone Hacking
Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are a lots of Mobile Spying software's used to monitor a Cellphone. The most popular Mobile Phone Spying software's are: Mobile Spy, and Spy Phone Gold.
7. DNS Spoofing
If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original Facebook page to his own fake page and hence can get access to victims Facebook account.
8. USB Hacking
If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the Internet browser. And your passwords are saved in the flash 9. Man In the Middle Attacks
If the victim and attacker are on the same LAN and on a switch based network, a hacker can place himself between the client and the server, or he could act as a default gateway and hence capturing all the traffic in between.
Botnets are not commonly used for hacking Facebook accounts, because of it's high setup costs. They are used to carry more advanced attacks. A Botnet is basically a collection of compromised computer. The infection process is same as the key logging, however a Botnet gives you additional options for carrying out attacks with the compromised computer. Some of the most popular Botnets include Spyeye and Zeus.
If you didn't understand any of the above method, just comment below with your questions and I will gladly answer.
🔐 HOW TO UNLOCK PHONE PATTERN LOCK USING COMMAND PROMPT 💻
Incase you forgot the pattern you used in locking your smartphone and you want to open your phone with having to flash the phone, follow the steps below carefully .
1. Connect your android phone to you computer.
2. Open Command prompt administrator.
3. Now in command prompt window type following code carefully without the quotes (")
[ adb shell cd/data/data/com.android.providers.settings/databases sqlites settings.db ] update system set value=0 where name=’lock_pattern_autolock’; update system set value=0 where name=’lockscreen.lockedoutpermanently’; .quit"
4. Now you will see some screen as shown below and then you can reboot your phone and now when your android starts again, then try unlocking it using any random pattern and it will unlock and work pretty fine.
5. If you face any problem repeat same steps but instead of the above code tru using [ adb shell rm/data/system/gesture.key] and the press enter and now reboot your device to see if it works
Before starting, you have to make sure you have access to the victim's smartphone because you will need to hack the victim's phone before the whatsapp.
Follow the steps below carefully .
1. Go to the victim's cells phone and install an application called "AirDroid: File & Notifications" Download here 2. Launch the app, sign up with an email and password, then go-tohttp://web.airdroid.com/ and you will enter the same email and password that you put in the app. 3. When the above steps is done successfully ,then the phone has been hacked because any message or notification your victim get, you will also get it on the site you registered.
4. Now let's get down to business, you need to download a 3rd party whatsapp on your phone like Gbwhatsapp or OGwhatsapp or better still use any stable app cloner to create another whatsapp on your phone. 5. With the 3rd party whatsapp, log in on whatsapp with the victim's number. 6. The whatsapp verification code will be sent to the victim's number. All you need to do is to get the code from the site in step 2 and input it in the whatsapp. 7. Whatsapp Hacked! Now you can see everything on the victim's whatsapp from your phone.
Note: for this hack to be very effective, make sure the victim's smartphone is "background data enabled"
An IP (Internet Protocol) is a combination of numbers and full stops unique to each device accessing the Internet. The IP can be used to identify you and your online activities, and as with any personal information online, it can be put to ill uses in your expense. Luckily, there is a tool that helps you check your IP address and find out how much you are unknowingly exposing.
What is an IP?
While IP addresses are assigned at random each time you surf the web, your location can still be identified with the new set of seemingly random numbers each time. The IP reveals a lot about you such as your location down to the very zip code, and the networks through which you’re connected, such as who your ISP is and whether you are using a proxy or VPN. It is thus easy for people on the Internet such as advertisers to target you for their benefits. This is because the IP address assigned to your device can be combined with information from the sites you visit, cookies, browsing history, web trackers, metadata and many others to further profile you online. As a matter of fact, geolocation identifies you whether you are using a WiFi, LAN or mobile network.
Advertisers are geo-targeting your IP
Digital-savvy advertisers no longer throw ads at users the same way that a billboard does to pedestrians. Modern online advertising is highly personalized to maximize the likelihood of a user actively interacting with an ad. To do so, various aspects about user must be known beforehand. Among them is the location, which is harnessed from IP vendors that sells such information to advertisers, whereby they provide accurate location of an IP, other useful IP intelligence such as their connection speed and repackaged user data and analysis.
How effective are customized ads?
It has been established that geotagging ads increases the rate of interaction with the user up to 300%. For example, online retail stores such as Amazon target ads to customers with products that are needed and highly popular in specific locations. This increases the conversion rate while reducing marketing dollars with a concentrated effort. With such a heavy vested interest, you can imagine how aggressively IP vendors, analytics firms and advertisers are scouring over your data secretly behind your back.
If ads are the worst you got out of IP geo-profiling, you got the long end of the stick. In worse cases, you might fall prey to fraudsters and criminals that have a hold of your profile. If a user knows where you live, what you look for on the internet, when you surf the web and other details, you might be targeted in bank frauds, impersonation, spamming, cyberbullying and even blackmailing. The good news is that you can reclaim your online privacy when you find out what your IP says about you and learn how to hide it effectively with a VPN.