SlideShare a Scribd company logo
1 of 1
Download to read offline
Facebook is the biggest social network and has more than 900 million users. Facebook allows people
to share their photos and videos, to chat with their friends, play games and basically to see what is
happening in other people’s lives. Because of all those reasons people have started to invade other
people’s privacy by hacking their facebook accounts.
The most common method people use to hack facebook accounts is phishing. Phishing is an act of
attempting to acquire usernames, passwords, credit card numbers and so on. The hacker tries to trick
the victim into believing that he is on a trusted log in page. In the facebook case, the hacker makes a
clone website that looks just like facebook and then tricks the victim into logging in using that page.
And when the hacker acquires the login credentials, the script then forwards the victim to the real
facebook page.
One other common method in facebook password hacking is sending the victim a program that logs
keystrokes and then uploads everything to a server or sends it to an email address. These types of
programs are called keyloggers and hackers usually hide them in files that look like images, mp3 files,
word documents, folders and so on. And a naive person or a person without too much knowledge
opens the file and becomes infected. Depending on the implementation of the keylogger the hacker
might have to filter out the junk and get to the good stuff – the login credentials.
Facebook accounts can also be hacked by session stealing, but the hacker might not acquire the
password because the passwords are encrypted. However, the hacker will gain access to the facebook
account and will be able to do anything that doesn’t require password authentication.
Among the methods above, facebook accounts can be hacked by sniffing the connection between the
server and the client. In this attack method the hacker makes a connection with the server (facebook)
and with the client (the victim) and relays messages between them convincing them that they are
directly connected to each other.
To sum up, I’d like to say that more than 90% of people can be tricked by one of the methods above.
And to prevent the hacker from utilizing the facebook hack methods above, you need to know how
they work and to be careful when logging in to your facebook account.

More Related Content

Viewers also liked

Renta de 4ta y 5ta categoría
Renta de 4ta y 5ta categoríaRenta de 4ta y 5ta categoría
Renta de 4ta y 5ta categoríaBeatriz Carpio
 
Iii bim 3er. año - alg - guía 4 - racionalización
Iii bim   3er. año - alg - guía 4 - racionalizaciónIii bim   3er. año - alg - guía 4 - racionalización
Iii bim 3er. año - alg - guía 4 - racionalizaciónMinisterio de Educación
 
Tema i-exposicion cadena de valor como herramienta gerencial
Tema i-exposicion cadena de valor como herramienta gerencialTema i-exposicion cadena de valor como herramienta gerencial
Tema i-exposicion cadena de valor como herramienta gerencialMario Rodriguez
 
ขั้นตอนการติดตั้งสื่อการสอน ชั้นประถมศึกษาปีที่ 2 สู่แท็บเล็ต
ขั้นตอนการติดตั้งสื่อการสอน ชั้นประถมศึกษาปีที่   2  สู่แท็บเล็ต  ขั้นตอนการติดตั้งสื่อการสอน ชั้นประถมศึกษาปีที่   2  สู่แท็บเล็ต
ขั้นตอนการติดตั้งสื่อการสอน ชั้นประถมศึกษาปีที่ 2 สู่แท็บเล็ต Napadon Yingyongsakul
 
Irlanda (ppt 4)
Irlanda (ppt 4)Irlanda (ppt 4)
Irlanda (ppt 4)Be Paredes
 
Experience Certificate - Al Ghurair
Experience  Certificate - Al GhurairExperience  Certificate - Al Ghurair
Experience Certificate - Al Ghurairprasandh p v
 

Viewers also liked (13)

Ciencia divina (walter y miguel)
Ciencia divina (walter y miguel)Ciencia divina (walter y miguel)
Ciencia divina (walter y miguel)
 
Renta de 4ta y 5ta categoría
Renta de 4ta y 5ta categoríaRenta de 4ta y 5ta categoría
Renta de 4ta y 5ta categoría
 
Iii bim 3er. año - alg - guía 4 - racionalización
Iii bim   3er. año - alg - guía 4 - racionalizaciónIii bim   3er. año - alg - guía 4 - racionalización
Iii bim 3er. año - alg - guía 4 - racionalización
 
C7 class relationship
C7 class relationshipC7 class relationship
C7 class relationship
 
C8 object-oriented thinking
C8 object-oriented thinkingC8 object-oriented thinking
C8 object-oriented thinking
 
C9 templates
C9 templatesC9 templates
C9 templates
 
C4 data structures
C4 data structuresC4 data structures
C4 data structures
 
C5 classes and objects
C5 classes and objectsC5 classes and objects
C5 classes and objects
 
Tema i-exposicion cadena de valor como herramienta gerencial
Tema i-exposicion cadena de valor como herramienta gerencialTema i-exposicion cadena de valor como herramienta gerencial
Tema i-exposicion cadena de valor como herramienta gerencial
 
ขั้นตอนการติดตั้งสื่อการสอน ชั้นประถมศึกษาปีที่ 2 สู่แท็บเล็ต
ขั้นตอนการติดตั้งสื่อการสอน ชั้นประถมศึกษาปีที่   2  สู่แท็บเล็ต  ขั้นตอนการติดตั้งสื่อการสอน ชั้นประถมศึกษาปีที่   2  สู่แท็บเล็ต
ขั้นตอนการติดตั้งสื่อการสอน ชั้นประถมศึกษาปีที่ 2 สู่แท็บเล็ต
 
ACTIVIDAD NUMERO 01
ACTIVIDAD NUMERO 01ACTIVIDAD NUMERO 01
ACTIVIDAD NUMERO 01
 
Irlanda (ppt 4)
Irlanda (ppt 4)Irlanda (ppt 4)
Irlanda (ppt 4)
 
Experience Certificate - Al Ghurair
Experience  Certificate - Al GhurairExperience  Certificate - Al Ghurair
Experience Certificate - Al Ghurair
 

Facebook hack methods

  • 1. Facebook is the biggest social network and has more than 900 million users. Facebook allows people to share their photos and videos, to chat with their friends, play games and basically to see what is happening in other people’s lives. Because of all those reasons people have started to invade other people’s privacy by hacking their facebook accounts. The most common method people use to hack facebook accounts is phishing. Phishing is an act of attempting to acquire usernames, passwords, credit card numbers and so on. The hacker tries to trick the victim into believing that he is on a trusted log in page. In the facebook case, the hacker makes a clone website that looks just like facebook and then tricks the victim into logging in using that page. And when the hacker acquires the login credentials, the script then forwards the victim to the real facebook page. One other common method in facebook password hacking is sending the victim a program that logs keystrokes and then uploads everything to a server or sends it to an email address. These types of programs are called keyloggers and hackers usually hide them in files that look like images, mp3 files, word documents, folders and so on. And a naive person or a person without too much knowledge opens the file and becomes infected. Depending on the implementation of the keylogger the hacker might have to filter out the junk and get to the good stuff – the login credentials. Facebook accounts can also be hacked by session stealing, but the hacker might not acquire the password because the passwords are encrypted. However, the hacker will gain access to the facebook account and will be able to do anything that doesn’t require password authentication. Among the methods above, facebook accounts can be hacked by sniffing the connection between the server and the client. In this attack method the hacker makes a connection with the server (facebook) and with the client (the victim) and relays messages between them convincing them that they are directly connected to each other. To sum up, I’d like to say that more than 90% of people can be tricked by one of the methods above. And to prevent the hacker from utilizing the facebook hack methods above, you need to know how they work and to be careful when logging in to your facebook account.