0ad 1983 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1st Person 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 Games 2d 2x0ng 3d 3d game 3D Games 3D modeling 3rd Person a las barricadas action Action Games action rpg action-adventure Adventure Games agentkeeper aim alien alienarena amiga amiga cd32 amnesiac hero an rpg that actually takes place in the present day ancientbeast and now I'm in a sewer Android Games annex-glest-mod antargis arcade Arcade Games ardorcraft arewealone arkane arkham art article arxendofsun arxliberatis assaultcube AtomicGameEngine award ball-rolling bananabread based on a book based on a cartoon or anime based on a comic based on a movie based on a tv series batman bge bioware Blackvoxel blender blendswap bloody flying enemies bombable boulder chase breakout clone broken sword bubble bobble bullet bullet hell bullfrog bushidoblocks bygfoot Call Of Duty Games capcom Card Games cartoon cutscenes castlevania cataclysm cel shading character name the anthropomorphic mascot hero child game Chocolate Doom christmas codecombat collect 'em up commercial community conquests contest-gamedev core design corebreach creativecommons Cricket Games crowdfunding crowdsourcing crystalspace crytek Cube2 cyberspace daft dagon damsel in distress dark forces darkmod darkplaces data dealer dc deadmorning deceiver delicious health-restoring snack food devcorner developer commentary dhewm3 Diablo difficulty select faces digitised actors dinosaurs disgaea disney distorted parallel ghost dimension divinity Doom Doom3 dos double fine driving Driving Games drm bullshit duckmarines dungeon siege dungeons and dragons eatthewhistle ecksdee electronic arts emiliapinball engines erebus escoria escort mission event-conference extremetuxracer FGD fighting game Fighting Games final fantasy first person brawler first person shooter First-person shooter flare flightgear food world Football Games forgotten realms FPS Freeablo freegamer freeorion frogatto Full version Games game engine GameDevelop games gas powered games genre-adventure genre-buildingsim genre-cards genre-defense genre-educational genre-engine genre-exploration genre-flighsim genre-fps genre-mmo genre-platformer genre-precision genre-puzzle genre-racing genre-roguelike genre-rpg genre-rts genre-sandbox genre-shooter genre-space genre-spacesim genre-tbs gigalomania girlfriend rescue glamour GLSL godot gold star for not being crap good game Gorynlich Grand Theft Auto gsoc GTA guest post h-craft hack and slash hacking minigame hedgewars heretic hero of allacrost hexenedgeofchaos hexoshi Hidden Object hive horror Horror game Horror Games html5 i finished this one i hate clowns i take my orders direct from the king iceball id software idtech2 idtech3 idtech4 indiana jones Indie indiegogo intellivision ioquake3 irem ironbane irrlamb irrlicht jaleco james bond 007 james pond jedi knight jediknight jihaus jme jmonkey3 jrpg keeperrl Kelgar kickstarter success story konami krysalis Lamiae legend entertainment lenar less than 1 GB Games less than 100 Mb Games Less than 200 MB Games less than 300MB Games Less than 400 MB Games Less than 500 MB Games Less than 500MB Games level complete flagpole liberated pixels cup licensing lincityng linux linuxgameawards lipsofsuna List of Games live action fmv logo with a sword through it love lucasarts lugaru l�ve l�ve2d mac mario mass effect mecha-neko media players MegaGlest Metroidvania might and magic mighty rabbit minetest-c55 mission game Mission Games MIT mode-multiplayer mode-onedevicemultiplayer mode-singleplayer model viewer monkey island monolith Moonshades movie mozilla mystery adventure naev natsume NBA 2K series NBA live Series Need for Speed neverball NFS nihon falcom nintendo nintendo game boy nintendo game boy color nintendo gba nintendo nes nintendo snes nippon ichi nova pinball obsidian occulusrift octaforge ogre3d oh wow this platformer starts on a forest level olpc Open World Games open-source openart opencaesar3 opencity opendungeons openflashpoint openfootball opengameart openig openjk openmw openra openxcom origin osx Other overdose Overkill OW ows patreon paws menu pc PC Games people can fly photo editor software physica pinball pirates pixel art platform-android platform-html5 platform-ios platform-java platform-linux platform-osx platform-symbian platform-webgl platform-windows platformer platinum arts sandbox playstation playstation 2 playstation psp pleethebear point and click adventure portrait-marathon possessed hero post-apocalyptic PotM princess rescue probe programming projectfootball projectofthemonth PS 3 Games Puzzle Puzzle Games quintet racer racing Racing Games rail shooter rainbowrooms ransom rats in the basement raven software Real-time tactics redeclipse remake resident evil Resident Evil Games retux revolution software ritual rockstar north roguerepublic Role Playing Games Role-Playing Games ROTC RPG RPG Games rts RTS Games run and gun ryzom saints row sam and max sandbox sauerbraten scifi screenshots of the year scrolling beat 'em up sdl sealed the monsters away for a thousand years sega sega genesis-mega drive sega master system sega mega cd shameless advertising shiny entertainment shiny metal logo shoot 'em up Shooting shooting gallery Shooting Games shunnedsurvivor sierra Simulation Games skullplosion skyriot slippery ice world Small Games Soccer solarus space space combat Space Games space marines space station 13 spacenerdsinspace spectrum holobyte spinning background cogs sport platformer Sports Sports Games square standalone star trek star trek 50th anniversary celebration week star wars starts with the ending of the previous game stealth stealth action Stealth Games steam strategy Strategy Games Strife stuntrally style-historical style-retro style-sci-fi stylish black and white visuals Subway Surfers game summerofcards sunsoft superpowers supertuxkart surprise it's a stealth level Survival Horror sweet game SWF Games systemshock tactics taito tales Tales of Maj'Eyal TBS td telltale Terasology terminal-overload Terra Centauri Tesseract The Castle Doctrine the music is stuck in my head theskyofverdun they took all my guns theyearning third person shooter Third-person shooter Time Management tol tom clancy's ToME top editing software torque2d torque3d tournament towerdefense tremulous trolls turbografx-16 turbografx-cd turn based tactics tutorial ultima unkillable protagonist unknownhorizons unreal unvanquished Urho3D valyriatear vdrift vdrift-ogre vehicular mayhem veraball vic tokai video villainous protagonist voice says the title volition vote voxel warsow warzone2100 wesnoth windows wins the prize wolfenstein wordwarvi world war 2 worldforge Wrestling Games wtactics WWE wyrmsun xbox 360 XBOX 360 Games xonotic ya3dag yodasoccer you get to drive a giant mech you get to drive a submarine ys ysoccer zelda zero-k zombies


Something most of our readers always wanted to Learn, something new about Facebook Hacking. Learn the best attacks for Facebook Hacking with their advantages and drawbacks.

Note:- This tutorial is for educational purpose only and may not be used for any blackhat purpose. The prime aim of this tutorial is to create awareness so that you guys can protect yourself  from getting hacked.
Before learning the actual procedure you should know about different types of attacks, their drawbacks and prevention against these attacks .



 Phishing 

The first and very basic way of hacking Facebook accounts is via Phishing. Phishing is actually creating fake web pages to steal user�s credentials like email,passwords,phone no,etc.

DRAWBACK 


Users nowadays are aware of these type of attacks and one can not be easily fooled using this attack. You need some social engineering to trick someone.

Prevention 



Always check the page URL before logging in. This is the most trusted and effective way one can use to avoid himself from phishing.



Other way is to use some good Antivirus software which will warn you if  you visit a harmful phishing page.



Even if somehow you have already entered your credentials in a phisher, Immediately Change your password.


Keylogging

This is another good way of hacking Facebook accounts. In this type of attack a hacker simply sends an infected file having keylogger in it to the victim. If the victim executes that file on his pc, whatever he types will be mailed/uploaded to hacker�s server. The advantage of this attack is that the victim won�t know that hacker is getting every Bit of data he is typing. Another big advantage is that hacker will get passwords of all the accounts used on that PC.


DRAWBACK 

Keyloggers are often detected as threats by good antiviruses. Hacker must find a way to protect it from antivirus.

Prevention 

Execute the file only if you trust the sender.

Use online scanner such as novirusthanks.org

Use good antivirus and update it regularly .



Trojans/backdoors 
This is an advanced level topic. It consists of a server and a client. In this type of attack the attacker sends the infected server to the victim. After execution the infected server i.e. Trojan on the victim�s PC opens a backdoor and now the hacker can do whatever he wants with the victim�s PC .

DRAWBACK 

Trojans are often detected as threats by good antiviruses. Hacker must find a way to protect it from antivirus.

Prevention 

Execute the file only if you trust the sender.

Use online scanner such as novirusthanks.org

Use good antivirus and update it regularly .




Sniffing

It consists of stealing session in progress. In this type of attack an attacker makes connection with server and client and relays message between them, making them believe that they are talking to each other directly.
DRAWBACK 
If user is logged out then attacker is also logged out and the session is lost.

It is difficult to sniff on SSL protected networks.


Prevention 
Always use SSL secured connections.

Always keep a look at the url if the http:// is not changed to https:// it means that sniffing is active on your network.




Social Engineering 

This method includes guessing and fooling the clients to give their own passwords. In this type of attack, a hacker sends a fake mail which is very convincing and appealing and asks the user for his password.
Answering the security questions also lies under this category.
Drawback 

It is not easy to convince someone to make him give his password.
Guessing generally doesn�t always work ( Although if you are lucky enough it may work!).

Prevention 
Never give your password to anyone

Don�t believe in any sort of emails which asks for your password


 Session Hijacking


In a session hijacking attack an attacker steals victims cookies, cookies stores all the necessary logging Information about one�s account, using this info an attacker can easily hack anybody�s account. If you get the cookies of the Victim you can Hack any account the Victim is Logged into i.e. you can hack Facebook, Google, Yahoo.
Drawbacks 
You will be logged out when user is logged out.

You will not get the password of the user�s account
.

Will not work if the user is using HTTPS connections.


Prevention 
Always work on SSL secured connections.

Always keep a look at the url if the http:// is not changed to https:// it means that sniffing is active on your network.


Disclaimer: This tutorial is only for educational purpose. The author or the blog owner is not responsible for any kind of misuse of this information provided.

Author Name

Contact Form

Name

Email *

Message *

Powered by Blogger.