Top 10 Ways How Hackers Hack Facebook Accounts Latest 2017

In this discussion i will show you no. of ways that hackers use to hack Facebook accounts. As being the most popular social site Facebook is getting more and more secured from their side.

Q) But the Question is we are really secured ??

==> And the answer is NO,

That's why i have brought to you some security tip to secure your Facebook account from being hacked.

facebook-hacking-logo
#Note : This discussion is only for security and educational purpose. Hacking is Illegal, Be aware. I have only shared these methods just to aware you from these hacking attacks.

Top 10 Ways Hackers Use To Hack FaceBook Account


#1 Hack Facebook Account Password By Phishing 

facebook-phishing-hack
This is the most popular and easy method to hack Facebook. This hack is that much simple that a 10 year child can do that just by following some simple steps. I will teach you this phishing attack later in this discussion.

Phishing step by step Tutorial

Basically this hack Includes Fake Facebook Login or Spam Facebook Pages that were created by the hacker which exactly looks like the real Facebook page. Once Victim opens the fake page and log’s in then the “Email” and “Password” is directly sent to his email or  a text file . Now the hacker have the login credentials and now any illegal activity can take place.

#2 Hack Facebook Account Password By Key-Logger

facebook-keylogger-hack
Key-logging is the perfect manner to hack a Facebook password. Key-logging every so often can be so risky that even someone with right knowledge of computer systems can fall for it. A Key-logger is largely a small software which, as soon as is hooked up on sufferer’s laptop, will document the whole thing sufferer types on his/her laptop. The logs are then sent back to the attacker through either ftp or at once to hackers email deal with.

#3 Saved Passwords From Browser

saved-passsword-fb-hackNow a days web browsers are made according to the public needs. And public want comfortable, easy and  fast interface. To achieve these features web browsers are updating frequently. One of the approach that web browsers implement to make web surfing faster is saving passwords for next time easy and fast access. Hackers can retrieve these passwords form browsers.

In google chrome you can view you saved password from here :

chrome://settings/passwords

#4 Hack Facebook Account Password By Session Hijacking

facebook-hack-session-hijacking
Session Hijacking is one of the most dangerous attack if you are accessing Facebook on (HTTP) non-secured connection. As you have seen that if you check the “Stay Logged In” when logging in. Then it won’t logout until done manually. This is because of cookie stored in your browser. In this, The hacker tries to steal saved cookies from the web browser. Session hijacking is widely used on LAN and WiFi connections.

#5 Mobile Phone Hacking

mobile-phone-hacking
Today’s most of the people are switching to mobile phones because of there growing features and Millions of user access Facebook from there mobile phones. If a hacker can gain access to the victims mobile phone then he most probably can gain access to there accounts. Most probably he will reset the Facebook account password by getting OTP (One time password) on the mobile phone.
Or the hacker can spy your mobile via no. of spying software like Mobile Spy and Spy Phone Gold.

#6 USB Hacking

USB-hacking
If the hacker has Physical access to the victim system then he could inject a malicious program or script ( often called virus ) via USB Drive. The malicious program can retrieve all your saved passwords or cookies from web browser.

Or USB can contain a Auto-run silent Key-Logger that has the capability to record all the keystrokes of the keyboard that you type.

# Read More about Virus : http://viraltechfever.blogspot.com/2016/10/basic-working-virus-and-antivirus-full.html

#7 Man In the Middle Attacks

MIMA-hack
If the victim and the hacker are on the same network i.e. LAN , Wan. Then this hack can be carried out. In this, A hacker places himself between the sender and receiver and sniffs all the information being sent. In some cases, victim may be sending un-encrypted data, which means the man-in-the-middle (MITM) can easily obtain any un-encrypted information.

On the other hand, victim may be sending encrypted data that can be in form of hashes like Md5 hash, then the hacker has to decrypt the data to get the information.

#8 Email ID Hacking

Email-Hacking
This is the ever green way to hack any account connect to that email. If the hacker was successful in gaining access to the email then he has the ticket to manually reset password of the account.

#9 Hacking WiFi Network

Many users use WiFi at their homes or any work place and if your router has weak security then a hacker can easily hack into your WiFi and can capture all the incoming and outgoing data packets. Now hackers can easily execute Man In The Middle Attack.
WiFi-hacking

#10 Social Engineering

Social-engineering
This is not the professional way but it is the simple one. In this, the hacker tries to collect all the possible information of the victim from all possible methods. Then the attacker starts cracking the password either by dictionary attack created by the victims information. This attack just like hit and trial. I think most of the hackers first try this method for cracking into the victims account.

How To Protect Yourself From These Attacks :-


  • Avoid Login on Non-Trusted sites.
  • Keep antivirus on your pc or mobile.
  • Never Login your account into others Devices.
  • Always Prefer trusted sites for download.
  • Try not to save your credential on your browser.
  • Avoid login on public connections such as WiFi.