Wednesday, 13 January 2016

Facebook Hacking 2016

Real Facebook Hacking Revealed by an Ethical Hacker

Real Facebook Hacking Revealed

Understand the scenarios, tricks and tools behind Facebook Hacking to protect yourself and your love once.
Do you or one of your family members Facebook account got hacked by a hacker? Do you want to know about the science behind Facebook hacking? Or you just want to know how you can protect yourself if your account in under attack or hacked by a hacker then you are at the right place in this article I will not even tell you the science behind Facebook hacking, I will also tell you about what precautions you can take for protecting yourself.

Facebook Hacking

Today, I’m going to explain you the ways of hacking Facebook account but before moving forward I want to tell you that this article is only for education purpose, the only motive behind writing about Facebook hacking in to protect you and let you know about tools and techniques that a hacker used to attack your Facebook accounts.

Ways of Facebook hacking and security tips:

Behind Facebook hacking, there is not a rocket science even 12-year-old teenager can get access to your account using few tools and techniques. So it’s really important to every user to know about what measures, steps they can take for protecting their online presence.
There are eight ways every hacker used to get into your accounts:
  • Phishing: The first, most easy and most popular attack used for hacking online accounts. In this attack, a hacker creates a clone of login web page of a specific website and set it in the way once a user login into it using his own credentials these details can directly save into his database.
Security tip: Always check the URL of the web page where you trying to log in and make a healthy habit of browsing URLs manually I mean typing URLs directly not to used any sources.
  • Keylogging: Keylogging is the technique used by an attacker to get victim’s credentials using a keylogger. Basically, keylogger is a small program that captures every key you typed on your keyboard and send to the attacker by either using FTP or by emails.
Security tip: Always use a good anti key logger to protect yourself from keylogging. There many are anti-key logging programs available in online market.
  • Stealer’s: Usually every user saved their passwords into their browsers for accessibility and ease of use but hackers take advantage of it and they use stealers to steal your browser’s saved passwords, usernames, and even banking transitions details you have saved in your browsers.
Security tip: Stealer’s can be very dangerous and the only way to protect yourself from stealing your data is to use LastPass. It’s a free program that manage your passwords in every efficient way as well it uses 256-bit encryption to save you passwords in your device and that makes stealing impossible.
  • Session hijacking: It was the most dangers attack, but now it’s outdated. In session hijacking the cookies from an insecure connection but now Facebook uses 256-bit encrypted connection that makes the session hijacking very hard.
Security tip: Always make sure that you browse Facebook using secure (https://) connection.
  • Mobile Phone Hacking: Mostly users use Facebook on mobile and hacking a mobile is easier because we don’t take mobile security seriously even few users have a good antivirus on their mobile phones that makes them more vulnerable. A hacker can use spyware and many other mobile hacking techniques to get anything of his use.
Security tip: Always use a good mobile antispyware to protect you precious mobile data and hardcore your mobile security.
  • DNS spoofing: In this technique an attacker changes the original Facebook page to his own fake page if they are on the same network and get the access of victim’s account.
  • USB Hacking: In this technique a hacker program there USB in the way that can extract your credentials from every browser if that USB inserted into a victim’s device.
Security tip: Use a good antivirus program and try to reduce the use of unwanted USB devices unless it’s important and always save your passwords into LastPass.
  • MITM Attack: MITM attack stands for ‘man in middle attack’. It is a network-based attack if a victim and attacker are on the same network then attacker himself place between the client and server then captures all traffic and extract then important information from that sniffed data.
Security tip: You can use a VPN client and a secured tunnel that can encrypt your data from client to server. It will make it impossible to sniff your data using man and middle attack.
That’s it, hope it will be a very useful resource and always think before you click.
Stay safe and stay tuned The Viral Bytes.

How to hack WhatsApp account???

How to hack WhatsApp account???

WhatsApp is currently one of the most secure messaging services purely because it works with a particular phone number and requires a c...
HOW TO TRACK WHATSAPP CONTACT NO. WITHOUT ANY TRICK OR HACK
Share ZIP, PDF , APK , EXE , RAR files via WhatsApp
How To Change Whatsapp Theme
WhatsApp is currently one of the most secure messaging services purely because it works with a particular phone number and requires a certain code. In my today’s article I am going to describe a few methods to hack WhatsApp account. Yes guys, it’s no more a myth. You can actually get access to someone else’s WhatsApp account. If you always wanted to know what your boyfriend/husband or girlfriend/wife or friend talks to on WhatsApp then you are at the right place. There are loads of other websites that claim they can hack WhatsApp account, all of them are false. None of those tricks work and actually it is nothing but just a waste of time. The methods that I am going to depict will surely help you in getting access of someone else’s whatsApp account. So people, lets get started now.

Method 1:- Social Engineering (Recommended)

NOTE:- THIS HACK ONLY WOULD WORK WITH SOMEBODY YOU KNOW OR ARE FRIENDS WITH.

Step 1: Firstly you will need to download Bluestacks
Step 2: For this to work, a little Social Engineering is required. Using this software you would need to download and open up the whatsapp application.
Step 3:- Now enter the Phone number of your victim. WhatsApp will send a confirmation code on victims number. You are in need of that code.
Step 4: The best method to get this code off your friend is to start a conversation with him. All you have to do is trick him into giving the code. You could try this:-
“You – Hey, I got a reactivation code for my WhatsApp, did you get one too?
Victim – Yeah I did!
You – I accidentally deleted mine, might be worth a shot to try yours”
The victim hopefully gives you the code.
In the event that they don’t, might be worth trying to physically get hold of their phone or try from a different tactic. Try and get it from them without making it too obvious.
People can be stupid. This is a guaranteed method if you manage to complete the steps above.

NOTE: This method doesn’t work twice so know what you’re going to say and just go in for it. If you fail on one person, move onto the next…You will be able to intercept any messages, videos, images. Virtually anything you want off their WhatsApp

Method 2:- Using MAC [Media Access Control] ADDRESS

In this trick i will be telling you how you can read your messages offline with the help of MAC Address. You can see that you can read the messages and see profile picture in your WhatsApp even when you are not connected to internet and it also pop up the messages which you have not read when you were offline. The trick behind this is that all the messages are kept encrypted in the SD card of your mobile phone so even when are offline you can read the messages and see profile picture of your contacts.
In this trick you have to spoof your android phone’s MAC Address. Don’t be surprised!! Yes, MAC Address can be spoofed.  The attacker can use your MAC address and verification code to access your whatsapp account.
It is easy to spoof MAC address in android but for spoofing MAC address the device must be rooted with BusyBox and Terminal App must be installed in it. Anyone can spoof their MAC address if they meet all these requirements and eventually can hack WhatsApp account of the victim.
You can learn spoofing MAC Address by going to this link: http: //forum.xda-developers.com/showthread.php?t=1385577

Now just follow these simple steps:-
  • Get mac address on your android phone.
  • Finding MAC address on an Android Phones
  • On your phone’s home screen, click on menu, then go to setting.
  • Click on about phone.
  • Click on the status.
  • And then view your Wi-Fi MAC address.
  • As soon the message is received Push the MAC address as well as Verifying code to your server or mail it your ID. That banks on your convince.
  • Cheat your phone’s MAC address to the Victims address and install WhatsApp and after that type the verify code.
  • And now its done. You get full access to the victim’s whatsapp ID. So now you can keep spying/watching your victim’s movements.
  • That means you and the victim is using the same ID from different devices.
  • WhatsApp hack to use it by not using your number.
  • This hack works by cheating the WhatsApp Verification Servers by sending a spoofed request for an authorisation code expected for a different phone.
  • Install Whatsapp on your device. WhatsApp now opens a counter where it sends a verification message to its servers.
  • Block the message service – it can be blocked by changing the message centre number or turning the phone into Airplane mode.
WhatsApp now gives a substitute method of verification – Select verify through SMS and fill in your email address. Once you click to send the SMS press cancel to abort the call for authorisation to the WhatsApp server.
  • Now you have to do sms Spoofing.
  • Examine your outbox and copy the message details into the spoofer application and send the spoofed verification.
  • You will now receive messages expected for the spoofed number on your mobile device and you can communicate with people under the spoofed number.
It’s done!! You have hacked into your friend’s WhatsApp account.

NOTE:- This information has been shared to create awareness among people regarding the “Ways to Hack Whatsapp” so that you can protect yourself from getting hacked. In no way do we promote misusing of the information.