Skip to main content

10 ways to hack someone’s FB account and Prevention and Safety Measures!!!

Phishing

Phishing is the most common technique used for hacking FB passwords. It is easy for anyone who is having little technical knowledge to get a phishing page done and that is why phishing is so popular. Many people become a victim of Phishing page due to its trustworthy layout and appearance.

How phishing works?

In simple words, Phishing is a process of creating a duplicate copy of a reputed website’s page in the intention of stealing user’s password or other sensitive information like credit card details. In our topic, Creating a page which perfectly looks like Facebook login page but in a different URL like fakebook.com or faecbook.com or any URL which pretends to be legit. When a user lands on such a page, he/she might think that is real Facebook login page and asking them to provide their username and password. So the people who do not find phishing page suspicious might enter their username, password and the password information would be sent to the Facebook hacker who created the phishing page, simultaneously the victim would get redirected to original FB page.


For Example : Suman is a programmer, he creates a FB login page with some scripts that enable him to get the username and password information. John put this fake login page in https://www.facebouk.com/make-money-online-tricks. Peter is a friend of John. John sends a message to Peter “Hey Peter, I found a way to make money online easily, you should definitely take a look at this
https://www.facebouk.com/make-money-online-tricks”. Peter navigate to the link and see a Facebook login page. As usual Peter enters his username and password of FB. Now the username and password of Peter was sent to John and Peter get redirected to a money making tips page https://www.facebouk.com/make-money-online-tricks-tips.html. That’s all Peter’s Facebook account is hacked.


How could you protect yourself from FB phishing?

Hackers can reach you in many ways like email, personal messages, FB messages, Website ads etc. Clicking any links from these messages would lead you to a Facebook login page. Whenever you find a FB login page, you should note only one thing which is URL because nobody can spoof / use Facebook URL except when there are some XSS zero day vulnerabilities but that’s very rare.
  1. What is the URL you see in browser address bar?
  2. Is that really https://www.facebook.com/ (Trailing slash is important since it is the only separator in Google chrome to distinguish domain and sub domain. Check out the below examples to know the difference)?
  3. Is there a Green colour secure symbol (HTTPS) provided in the address bar?
Keeping these questions in your mind would prevent you from getting hacked of phishing. Also see the below examples of phishing pages.

Social Engineering

This is the second most common technique of hacking Facebook accounts. Actually this method shouldn’t come under Hacking since there is no much knowledge required for this method. I am listing this method under hacking to ensure the list of most common techniques used for FB account hacking in their respective order. Social engineering is basically a process of gathering information about someone whose account you need to hack. Information like date of birth, their mobile number, their boyfriend / girlfriend’s mobile number, nickname, mother’s name, native place etc.

Most Common and Weak Passwords

Security Question does not let you get into others FB account easily. But setting a weak password could easily allow any of your friends to hack into your account. What is a weak password in this scenario? A password☺ which can be easily guessed by a third person is called weak password.  Below are some of the most common passwords people tend to use in Facebook.
  • Mobile Number
  • Nickname / Name and Date of Birth Conjunction
  • Boy Friend’s / Girl Friend’s Mobile Number – Most of the lovers 
  • Boy Friend’s / Girl Friend’s Name – Most of the lovers đŸ˜›
  • Boy Friend and Girl Friend Name Combination
  • Unused / Old Mobile Number

How could you protect yourself from Social Engineering? 


Security Question

Don’t have a weak or familiar security question/answer. It should be known only to you. You can set your Facebook security question very easily.  Additionally FB provide an option called “Login Alerts” under Facebook Security Settings, you should add your mobile or email there to get notified whenever your Facebook account is logged in to a new or unknown device.


Please feel free to share your comments and feedbacks. Thank you for bearing all my poor grammar mistakes ....and plz comment below. 

Comments

Popular posts from this blog

10 MOST HAUNTED PLACES IN THE WORLD

It seems that one of the most enduring aspects of cultural similarity found throughout the world involves the supernatural.  No matter where you go across the globe, you’re going to hear various legends and ghost stories…except some of these carry significantly more weight than your average campfire story.  People seem to be somewhat obsessed with what goes on after death, especially in regards to whether or not the spirits of the departed stick around.  It would be easy to say that such attention can be blamed on vivid, Hollywood inspired imaginations, but documented reports of supernatural disturbances go back several centuries in many places, underlining the fact that no matter the time period or society involved, the paranormal remains on people’s minds. Sure, many places in the world that are reputedly haunted seem more far-fetched than realistic, but there are those that have a tendency to make even the most hardened skeptic stop and reconsider.  Listed he...

How to Make Phone Numbers Callable in Google Sheets?

How to Insert Clickable Phone Numbers in Web Pages We use the simple tel protocol to convert a plain text phone number on a web page into a clickable telephone link For instance, if you click  this link  on a mobile phone, it will open the phone dialer prefilled with the specified number. There’s no need to copy-paste numbers. How to Type Phone Numbers in a Google Sheet It is a bit tricky to type phone numbers inside Google Spreadsheets. Here’s why: Phone numbers are mostly made of digits preceded by the plus (+) symbol. The problem is as soon as add the plus sign in the spreadsheet cell, it assumes that you entering a math formula and tries to calculate the value. There are two simple workarounds to this problem. You can enclose the phone number inside double quotes (“) and precede it with an equal to (=) sign. An even easier alternative is to use the single quote (‘) before the phone number. Google Sheets will then interpret the cell’...

What is Bitcoin?

Bitcoin is a form of digital currency, created and held electronically. No one controls it. Bitcoins aren’t printed, like dollars or euros – they’re produced by people, and increasingly businesses, running computers all around the world, using software that solves mathematical problems. It’s the first example of a growing category of money known as cryptocurrency. What makes it different from normal currencies? Bitcoin can be used to buy things electronically. In that sense, it’s like conventional dollars, euros, or yen, which are also traded digitally. However, bitcoin’s most important characteristic, and the thing that makes it different to conventional money, is that it is  decentralized . No single institution controls the bitcoin network. This puts some people at ease, because it means that a large bank can’t control their money. Who created it? A software developer called Satoshi Nakamoto proposed bitcoin, which was an electronic payment sys...