Today I
will discuss all general methods to Hack Facebook/Twitter Account Password that all
hackers usually use to hack your Facebook/Twitter/Email account.
1) Phishing Attack
2)
Hacking Account password remotely using Keyloggers and RAT's
3)
By hacking the primary email address that user has used for creating
Facebook/Twitter
account(Read note)
4)
Social Engineering or simply Guessing your friends Password.
Phishing Attack:
I am explaining this method first because its the most easiest and most effective and also
the most popular method for hacking Facebook/Twitter password. You can also search on
Google the various famous Facebook hacking methods and you will find Phishing
technique on the top always. And I am explaining the methods according to their
popularity. Now you want to know which is my favorite method for Hacking Facebook
account passwords and i will undoubtedly tell its simply not Phishing.
For more on Phishing click here.
Hacking Account password remotely using Keyloggers and RATs:
Best method for advanced Hackers. And my second favorite too. Its popularity is little but lower than Phishing only because it involves you to download hack tool and then create your keylogger and send it to victim which is a lengthy process and also unsecured too as you don't aware that the keylogger that you downloading is himself contain some spyware or simply a keylogger attached with it. Keylogging becomes more easy if you have physical access to victim computer as only thing you have to do is install a keylogger and direct it to your destination so that it will send all recorded keystrokes to pointed destination. What a keylogger does is it records the keystrokes into a log file and then you can use these logs to get required Facebook password and thus can hack Facebook password.
Best method for advanced Hackers. And my second favorite too. Its popularity is little but lower than Phishing only because it involves you to download hack tool and then create your keylogger and send it to victim which is a lengthy process and also unsecured too as you don't aware that the keylogger that you downloading is himself contain some spyware or simply a keylogger attached with it. Keylogging becomes more easy if you have physical access to victim computer as only thing you have to do is install a keylogger and direct it to your destination so that it will send all recorded keystrokes to pointed destination. What a keylogger does is it records the keystrokes into a log file and then you can use these logs to get required Facebook password and thus can hack Facebook password.
More on keyloggers later.
Hacking the Primary Email address
If Facebook hacker or any specific Keylogger, by some means, hacks your
primary Gmail or yahoo account which you are using as primary email address,
then this information account can easily hack your Facebook password using
"Forgot password" trick. The Hacker will simply ask Facebook to send
password to the primary email address and ask Facebook administrators to send
the reset email to your primary email address- which is already hacked. Thus,
your Facebook account password will be reset and it will also be hacked !
Note :So, always remember to protect your primary email address that you
have used to create Facebook account and try to keep unknown or useless mail id
as your primary email address in Facebook and also keep a good and un guessable
security question and answer.
Social Engineering or Guessing Passwords:
This method sounds to be pretty not working at beginning. Even I was
neglecting this way for a long time . But, once, I thought of using it against
my friend on Facebook and amazingly what happened that i guessed his Facebook
password very easily by this method. I think many of you might be knowing how
what this social engineering, For novice hackers, Social engineering is method
of retrieving password or Guessing the password or answer of security question
simply be hacking some information about the victim or simply gathering his information
from his own Facebook and other social networking profiles where most of users
provide their critical information just for fashion and doesn't know its
consequences. You have to be very careful while using this as victim must not
be aware of your intention. Just ask him cautiously using your logic.
No comments:
Post a Comment