Hacking
Upcoming SlideShare
Loading in...5
×
 

Hacking

on

  • 89 views

 

Statistics

Views

Total Views
89
Views on SlideShare
89
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Hacking Hacking Presentation Transcript

  • METHODS TO HACK FACEBOOK KEYLOGGER METHOD PHISHING BY WIRESHARK
  • PHISHING METHOD IN THIS METHOD WE CREATE A WEB PAGE SIMILAR TO FACEBOOK PAGE AND UPLOAD THAT PAGE INTO OUR WEBSITE. THEN WE SEND THE LINK(URL) OF THE WEBSITE TO THE VICTIMS BY MEANS OF FACEBOOK OR GMAIL. WHEN HE OR SHE CLICK ON THAT LINK OUR FACEBOOK PAGE OPENS AND ASK USERNAME AND PASSWORD TO LOGIN. WHEN HE OR SHE
  • What Is Keylogger And How To Be Safe From Keyloggers?
  • What is keylogger ? A keylogger also know as keystroke logger is a software or hardware device which monitors each and every key typed by you on your keyboard. You can not identify the presence of keylogger on your computer since it runs in background and also it is not listed in task manager or control panel. It can be used by parents to keep eye on their childrens or company owner to spy on their employes.
  • Types of keyloggers There are two types of keylogger:-  hardware keylogger  software keylogger
  • HARDWARE KEYSTROKER
  • SOFTWARE KEYLOGGERS There are many keylogger free avaiable in internet Some of the are :-  Ardamax Keylogger  Emissary Keylogger etc.
  • STEP1 : Create Server for Hacking Passwords  First of all for hacking any facebook account password, we have to create our keylogger server that will run on victims PC and capture his keystrokes and mail us on the email account that we will use to build the keylogger. The keylogger server building process consists of several steps.
  • Now open the Keylogger file. Here you will need gmail ID and password.
  • Bind the Keylogger server with any software KEYLOGGER FILE CAN BE BIND WITH ANY SOFTWARE AND THEN SEND TO VICTIM. EVEN VICTIM WHEN
  • How to Spread Keylogger or send it to victim or friend  Now you have one Software setup file with keylogger attached with it.(In our case we have Ccleaner setup with keylogger attached with it).  Now Spread your keylogger through forums. You might be a member of various forums use them to spread your keylogger in form of software posts. You can use various software's to spread them that users frequently download.  Spread it through pendrives or USB hard drives. Suppose a friend asked you for a software give it the software that has keylogger attached with it.
  • How to protect yourself from these hacks? Prevention is always better than cure so always follow these steps:  Don't use cracked softwares and don't download them from unauthorized websites.  Always keep your antivirus and anti-spyware up to date.  Always scan the files before transferring them to your USB.  Do not allow other users to use your PC i.e password protect it.
  •  Never use your online banking from cyber cafe. If you want to use then you can try this method. open notepad and type anything Then copy and paste each word that comes in your username or password.  When you enter cyber cafe make sure that no hardware device is attached to keyboard wire.