ExtremeHacking
Today : | Time : | safemode : ON
> / Main Website / Cyber Surakha Abhiyan / Hackers Charity / Linkedin / facebook / twitter /
Name Author Perms Com Modified Label

Why you shouldn't phish, keylog on Facebook Unknown rwxr-xr-x 0 4/30/2013

Filename Why you shouldn't phish, keylog on Facebook
Permission rw-r--r--
Author Unknown
Date and Time 4/30/2013
Label
Action
Ethical Hacking Institute in Pune
./Arizona Team

Well, I began to think to myself that I should write another tutorial considering that even if you do eventually acquire the password and e-mail of facebook account, you will still be stuck with the problem regarding the situation of "Logging in from another Location"























I have noticed that when a lot of new kids ask about how they can "hack" a Facebook account, most people suggest keylogging, rating, phishing, and even social engineering as the most notable methods.

I won't waste your time and I will go straight to the point. I will merely display some other problems when acquiring or taking over a Facebook account.

Why not phish on Facebook?

Well, A problem appears showing that you are logging in from a different location, so even if you have a password and the e-mail you will still have the problem. This problem happens when you attempt to change their passwords manually by having the URL sent to their e-mails.

Once again, you would need to spoof their IPs to bypass that.

Why not keylog?

Well, again...Keylogs only record keystrokes executed on the person's keyboards. You will have access to text and nothing else. By text, I am referring to whatever you seek such as e-mail and password. The same problem will happen here about logging in from another location.

Once again, you would need to spoof their IPs to bypass that.

Why not social engineer?


Well, you might be able to eventually get access to their e-mail and password info, but the problem of Logging in from another location will still be there, so you'll still be screwed.

So, what you may wonder, what should I do then?

Personally, I would highly suggest to ONLY RAT the person if you are attacking them from a different location. However, if you know the person personally, I would suggest keylogging since there is a possibility that you might be able to have access to the computers they use and the problem of Logging in from another location will go away. 


To wrap it up, I would suggest RATing only if you don't know your victim to a personal level since you will essentially have complete access to their computers and allowing you to do things on their computers rather than your own.

Keylogging, Phishing, and SE are good methods for acquiring the info, but bypassing Facebook is where the problem comes.

Keylogging, Phishing, and SE are still good methods to attack other websites, but Facebook became smart enough to make it a bit more difficult for "hackers" to take over accounts.

Hope you will keep this in mind..
Enjoy. 


www.arizonainfotech.com
CEH CHFI ECSA ENSA CCNA CCNA SECURITY MCITP RHCE CLOUD ANDROID IPHONE NETWORKING HARDWARE TRAINING INSTITUTE IN PUNE
 

Cyber Suraksha Abhiyan | Sadik Shaikh © 2015 Sadik Shaikh | CEH V9 | ETHICAL HACKING Course Training Institute in India-Pune
Extreme Hacking Template design by Sadik Shaikh | Cyber Suraksha Abhiyan