4 Ways to Crack a Facebook Password & How to Protect Yourself from Them

Despite the security fears that have plagued Facebook for years, most people are staying around and new members keep on connecting. This has led Facebook to break records numbers with over 1.94 billion monthly active users, as of March 2017 — and around 1.28 billion daily active users.

We share our lives on Facebook. We share our birthdays and our day of remembrances. We share our vacation plans and locations. We share the births of our sons and the deaths of our fathers. We share our most cherished moments and our most painful thoughts. We divulge every aspect of our lives. Clinical psychologists have written entire books detailing the surprisingly extensive impact Facebook has on our emotions and relationships.

But we sometimes forget who's watching.

We use Facebook as a tool to connect, but there are those people who use that connectivity for malicious purposes. We reveal what others can employ against us. They recognize when we're not home and for how long we're gone. They recognize the answers to our security questions. People can practically steal our identities — and that's just with the visible information we purposely give away through our public Facebook profile.


The scariest part is that as we become more comfortable with advances in technology, we actually get more susceptible to cutting. Equally if we haven't already done enough to help hackers in their quest for our data by sharing publicly, those in the know can get into our e-mails and Facebook accounts to steal every other portion of our life that we intended to maintain off from prying eyes.

In fact, you don't even have to be a professional hacker to come into someone's Facebook account.

It can be as comfortable as running Firesheep on your computer for a few minutes. In fact, Facebook actually allows people to go into somebody else's Facebook account without knowing their password. All you accept to do is take three friends to send a card to. You type in the three codes, and voilà — you're in the story. It's as easy as that.

In this article I'll show you these, and a couple other ways that hackers (and even regular folks) can cut into someone's Facebook account. But don't worry, I'll also indicate you how to foreclose it from happing to you.

Method 1

Reset the Password

The most comfortable means to "hack" into someone's Facebook is through resetting the word. This could be easier done by people who are allies with the individual they're attempting to cut.
  • The first step would be to make your friend's Facebook email login. If you don't already know it, try looking on their Facebook page in the Contact Info section. Still stuck? Hackers use scraping tools like The Harvester to mine for email addresses, and then hold out our guide here to recover a user's email that you don't already recognize.
  • Next, click on Forgotten your password? and type in the victim's email. Their account should come up. Click This is my account.
  • It will inquire if you would like to reset the password via the victim's emails. This doesn't help, so press No longer have access to these?
  • It will now ask How can we reach you? Type in an email that you have that also isn't linked to any other Facebook account.
  • It will now ask you a question. If you're close friends with the victim, that's great. If you don't know too much about them, make an educated conjecture. If you calculate it out, you can change the password. Right away you have to wait 24 hours to login to their bill.
  • If you don't figure out the question, you can click on Recover your account with help from friends. This permits you to choose between three and five friends.


  • It will send them passwords, which you may ask them for, and then type into the next page. You can either create three to five fake Facebook accounts and add your friend (especially if they just add anyone), or you can choose three to five close friends of yours that would be willing to gift you the word.


How to Protect Yourself

  • Utilize an email address specifically for your Facebook and don't put that electronic mail address on your profile.
  • When selecting a security question and response, make it hard. Fix it so that no one can cipher it out by just moving through your Facebook. No pet names, no anniversaries — not even third grade teacher's names. It's as easy as looking through a yearbook.
  • Learn about recovering your account from friends. You can choose the three friends you want the password posted to. That way you can protect yourself from a friend and other mutual friends ganging up on you to get into your account.

Method 2

Use a Keylogger (Software Keylogger)

A software keylogger is a program that can record each stroke on the keyboard that the user makes, most often without their knowledge. The software has to be downloaded manually on the victim's computer. It will automatically start capturing keystrokes as soon as the data processor is turned on and remain undetected in the backdrop. The software can be programmed to commit you a summary of all the keystrokes via email.

Null Byte features an excellent guidebook on how to acquire a culture on a target computer to acquire you set forth. If this isn't what you're looking for, you can look for free keyloggers or try coding a basic culture yourself in C++.


Hardware Keylogger

These function the same way as the software keylogger, except that a USB drive with the software needs to be linked to the victim's computer. The USB drive will pull through a summary of the keystrokes, so it's equally simple as plugging it to your own computer and pulling up the information.

There are various choices available for hardware keyloggers. Wired keyloggers like the Keyllama can be tied to the victim's computer to save key strokes and works on whatever operating system — provided you have physical access to recover the device afterwards. If you're looking to swipe the passwords remotely, you can put in a premium Wi-Fi enabled keylogger which can email captured keystrokes or be accessed remotely over Wi-Fi.


How to Protect Yourself

  • Use a firewall. Keyloggers usually send information through the internet, then a firewall will monitor your computer's online activity and sniff out anything suspicious.
  • Install a password manager. Keyloggers can't steal what you don't type. Password mangers automatically fill out important forms without you having to type anything in.
  • Update your software. In one case a company knows of any exploits in their software, they operate along an update. Stay behind and you could be susceptible.
  • Change passwords. If you however don't feel protected, you can modify your password bi-weekly. It may seem drastic, but it renders any information a hacker stole useless.

Method 3

Phishing

This option is a lot more difficult than the rest, but it is also the most common method to hack someone's account. The most popular type of phishing involves creating a false login page. The page can be sent via electronic mail to your victim and will seem exactly like the Facebook login page. If the victim logs in, the data will be mailed to you instead of to Facebook. This procedure is difficult because you will need to create a web hosting account and a bogus login page.


The most comfortable direction to answer this would be to watch our guide on how to clone a website to create an exact copy of the Facebook login page. Then you'll only need to tweak the state form to copy / store / email the login details a victim gets into. If you require help with the accurate steps, there are detailed instructions available by Alex Long hair on Null Byte. Users are really careful now with logging into Facebook through other connections, though, and email phishing filters get better every day, so that merely totals to this already difficult process. But, it's nevertheless possible, particularly if you clone the entire Facebook website.

How to Protect Yourself

  • Don't click on links through email. If an email tells you to login to Facebook through a connection, be suspicious. First find out the URL (Here's a neat guide on what to look out for). If you're still doubtful, go immediately to the primary website and login the way you normally serve.
  • Phishing isn't only done through email. It can be any link, on any site / chat room / text message / etc. Even ads that pop up can be malicious. Don't click on any sketchy looking links that ask for your info.
  • Use anti-virus & web security software, like Norton or McAfee.

Method 4

Man in the Middle Attack

If you can come close to your target, you can trick them into linking to a fake Wi-Fi network to steal credentials via a Man In The Middle (MITM) attack. Creatures like the Wi-Fi Pumpkin make creating a fake Wi-Fi network is equally easy as sticking a $16 Wireless Network Adapter on the $35 Raspberry Pi and getting close to your prey. One time the victim connects to your fake network, you can inspect the traffic or route them to fake login pages. You can still set it to just replace certain pages and allow other pages alone.

Get Hacking: How to Set Up Kali Linux on the Raspberry Pi

How to Protect Yourself

  • Don't connect to any open (unencrypted) Wi-Fi Networks.
  • Especially don't connect to any Wi-Fi networks that are out of position. Why might you see a "Google, Starbucks" when there's no Starbucks for miles? Because hackers know your telephone set or data processor will automatically link to it if you have employed a network with the same figure before.
  • If you experience problem connecting to your Wi-Fi, look at your list of nearby networks to ascertain if there are any copies of your network name nearby.
  • If your router requires you to insert the password for a firmware update to enable the internet or shows you a page with major spelling or grammar errors, it is probable you're plugged in to a fake hotspot and someone nearby is trying to steal your credentials.

A Couple More Facebook Hacks

For those with a bit more technological skill, hold out the Same Origin Policy Facebook hack and the somewhat easier, Facebook Password Extractor. We will go on to add more Facebook hacks in the near future, so keep coming back here.

How to Protect Yourself

  • On Facebook, go to your Account Settings and check under Security. Make sure Secure Browsing is enabled. Firesheep can't sniff out cookies over encrypted connections like HTTPS, so try to steer away from HTTP.
  • Full time SSL. Use Firefox add-ons such as HTTPS-Everywhere or Force-TLS.
  • Log off a website when you're done. Firesheep can't stay logged in to your account if you log off.
  • Use only trustworthy Wi-Fi networks. A hacker can be sitting across from you at Starbucks and looking through your email without you knowing it.
  • Use a VPN. These protect against any sidejacking from the same WiFi network, no matter what website you're on as all your web traffic will be encrypted all the direction to your VPN provider.

Protecting Yourself: Less Is More

Social networking sites are great ways to remain connected with old acquaintances and meet new people. Creating an event, sending a birthday greeting and telling your parents you love them are altogether a couple of clicks away.

Facebook isn't something you require to steer away from, but you do need to be mindful of your environment and make smart decisions about what you put up on your profile. The less data you commit out on Facebook for everyone to envision, the more difficult you make it from hackers.

If your Facebook account ever gets hacked, check out our guide on getting your hacked Facebook account back for information on restoring your account.

Bonus: If you're interested in who's checking you out, there is some ways you can (kind of) track who's viewed your Facebook profile.

Source Link: https://null-byte.wonderhowto.com/how-to/4-ways-crack-facebook-password-protect-yourself-from-them-0139532/

For more Eboostonhttp://ebooston.blogspot.com/
4 Ways to Crack a Facebook Password & How to Protect Yourself from Them 4 Ways to Crack a Facebook Password & How to Protect Yourself from Them Reviewed by Unknown on November 27, 2017 Rating: 5

No comments:

Powered by Blogger.