Skip to main content

10 ways to hack someone’s FB account and Prevention and Safety Measures!!!

Phishing

Phishing is the most common technique used for hacking FB passwords. It is easy for anyone who is having little technical knowledge to get a phishing page done and that is why phishing is so popular. Many people become a victim of Phishing page due to its trustworthy layout and appearance.

How phishing works?

In simple words, Phishing is a process of creating a duplicate copy of a reputed website’s page in the intention of stealing user’s password or other sensitive information like credit card details. In our topic, Creating a page which perfectly looks like Facebook login page but in a different URL like fakebook.com or faecbook.com or any URL which pretends to be legit. When a user lands on such a page, he/she might think that is real Facebook login page and asking them to provide their username and password. So the people who do not find phishing page suspicious might enter their username, password and the password information would be sent to the Facebook hacker who created the phishing page, simultaneously the victim would get redirected to original FB page.


For Example : Suman is a programmer, he creates a FB login page with some scripts that enable him to get the username and password information. John put this fake login page in https://www.facebouk.com/make-money-online-tricks. Peter is a friend of John. John sends a message to Peter “Hey Peter, I found a way to make money online easily, you should definitely take a look at this
https://www.facebouk.com/make-money-online-tricks”. Peter navigate to the link and see a Facebook login page. As usual Peter enters his username and password of FB. Now the username and password of Peter was sent to John and Peter get redirected to a money making tips page https://www.facebouk.com/make-money-online-tricks-tips.html. That’s all Peter’s Facebook account is hacked.


How could you protect yourself from FB phishing?

Hackers can reach you in many ways like email, personal messages, FB messages, Website ads etc. Clicking any links from these messages would lead you to a Facebook login page. Whenever you find a FB login page, you should note only one thing which is URL because nobody can spoof / use Facebook URL except when there are some XSS zero day vulnerabilities but that’s very rare.
  1. What is the URL you see in browser address bar?
  2. Is that really https://www.facebook.com/ (Trailing slash is important since it is the only separator in Google chrome to distinguish domain and sub domain. Check out the below examples to know the difference)?
  3. Is there a Green colour secure symbol (HTTPS) provided in the address bar?
Keeping these questions in your mind would prevent you from getting hacked of phishing. Also see the below examples of phishing pages.

Social Engineering

This is the second most common technique of hacking Facebook accounts. Actually this method shouldn’t come under Hacking since there is no much knowledge required for this method. I am listing this method under hacking to ensure the list of most common techniques used for FB account hacking in their respective order. Social engineering is basically a process of gathering information about someone whose account you need to hack. Information like date of birth, their mobile number, their boyfriend / girlfriend’s mobile number, nickname, mother’s name, native place etc.

Most Common and Weak Passwords

Security Question does not let you get into others FB account easily. But setting a weak password could easily allow any of your friends to hack into your account. What is a weak password in this scenario? A password☺ which can be easily guessed by a third person is called weak password.  Below are some of the most common passwords people tend to use in Facebook.
  • Mobile Number
  • Nickname / Name and Date of Birth Conjunction
  • Boy Friend’s / Girl Friend’s Mobile Number – Most of the lovers 
  • Boy Friend’s / Girl Friend’s Name – Most of the lovers ðŸ˜›
  • Boy Friend and Girl Friend Name Combination
  • Unused / Old Mobile Number

How could you protect yourself from Social Engineering? 


Security Question

Don’t have a weak or familiar security question/answer. It should be known only to you. You can set your Facebook security question very easily.  Additionally FB provide an option called “Login Alerts” under Facebook Security Settings, you should add your mobile or email there to get notified whenever your Facebook account is logged in to a new or unknown device.


Please feel free to share your comments and feedbacks. Thank you for bearing all my poor grammar mistakes ....and plz comment below. 

Comments

Popular posts from this blog

How to Identify the Gender of your Twitter Followers??

Do you ever wonder what is the demographics of people who follow you on Twitter. How many of your Twitter friends are men? Or women? Or random colored eggs, people who are either too lazy to change their default avatar or maybe they are  Twitter bots . The  Graph Search of Facebook  can provide deep insights into the demographics of people who are connected with you on the social network. For instance, you can write a natural language query like “ My friends who are older than 30 ” or “ My female friends who live in Delhi ” and the answer will be available instantly. Such granular data is however not available for Twitter users. Who Follows You? Males, Females or Eggs How do you programmatically determine the gender of a person on Twitter? The  Twitter API  doesn’t provide the gender information but there’s a workaround. You can take the profile picture of a Twitter user, feed it into Siftr’s  Vision API  and it will detect the gender of the most prominent face in the photogr

How to Make Phone Numbers Callable in Google Sheets?

How to Insert Clickable Phone Numbers in Web Pages We use the simple tel protocol to convert a plain text phone number on a web page into a clickable telephone link For instance, if you click  this link  on a mobile phone, it will open the phone dialer prefilled with the specified number. There’s no need to copy-paste numbers. How to Type Phone Numbers in a Google Sheet It is a bit tricky to type phone numbers inside Google Spreadsheets. Here’s why: Phone numbers are mostly made of digits preceded by the plus (+) symbol. The problem is as soon as add the plus sign in the spreadsheet cell, it assumes that you entering a math formula and tries to calculate the value. There are two simple workarounds to this problem. You can enclose the phone number inside double quotes (“) and precede it with an equal to (=) sign. An even easier alternative is to use the single quote (‘) before the phone number. Google Sheets will then interpret the cell’s value as text and

5 real-world events which ‘prove’ that time travel actually exists

In Back to the Future, you need an expensive car, and a conveniently placed lightning bolt – but what if time travel was easier than that? What if time travellers were ALL AROUND US? The ‘time travelling hipster’ (above) is one of the creepier pieces of evidence touted as proof that time travel exists – but we’ve picked out some of the best below, including several people from black-and-white films who appear to be using mobile phones. Nigel Watson, paranormal expert and author of the UFO Investigations Manual, ‘Would time travelers from the future really be using mobile phones? Wouldn’t they use something more sophisticated and less visible? Then again Dr Who still uses a sonic screwdriver and that is so 20th Century…’ Entry by  Cervus Entry by  Chan Teik Onn Entry by  GordonHaid Entry by  gicusudoru