Sabtu, 25 Agustus 2012

Cara Hack Facebook Orang Lain (100% Ampuh)






How to hack facebook password hack facebook or others to be knowledge that many people, especially many cool facebook users, why? I also do not know why people really want to know how to hack facebook passwords of others (hacking facebook) but this way including theft manner facebook facebook accounts or passwords of others, if I am personally curious to know how to hack facebook because just curious though it may end edges are applied also for other people to hack facebook hack facebook especially those with us first.
Web Links: click here
Therefore, if you want to know how to hack facebook password to make sure someone else is not used for evil or that could harm others, if you just want to know it does not matter preceded keculi we might not hurt meberikan shockterappy way behind There are several ways to hack hack password facebook others, usually if facebook hacked facebook account owner can not log in because the password or email facebook always cook after hacked
I think people's facebook hack no use at all, most of us just goofing photo facebook account owner, email addresses and other data that are less useful for us, if just for fun ngerjain friend or girlfriend might not matter as long as not too much just . Okay for those of you who are curious about how to hack facebook others after some other time I also wrote how to hack facebook with keylogger others, now how to hack facebook other people in other ways:
1. Siahkan Download Facebook Frezer following: download
    
with password: yurieke
2. Run the program to block facebook account owner login password
3. If the program was dead, facebook owner can log into his account
This method is the easiest way of hacking facebook someone else or if you want to know how to hack facebook passwords with a keylogger you can see in the last post, what's the point of his question our facebook hack others if we ourselves do not like it if hacked
Tips To Hack Facebook was not easy at others:
Password theft, account takeover, it is often the case in the cyber world. Not a difficult thing to do, but many of the newbie who just kept wondering. . "How do I get other people's email password?" Or the most frequent questions I receive is .. "How did you get my password?"
For questions that this article was written, hopefully can add insight and open up your mind about the importance of keeping the current account was in vulnerable places.
How to get it? ...
There are many ways to get a password. Some of them do not require any special skills. Here are the ways of the most common and most frequently used: .....
[1]. Social Engineering
[2]. Keylogger
[3]. Web Spoofing
[4]. Facing Email
[5]. Password Cracking
[6]. Session Hijacking
[7]. Being Proxy Server
[8]. Utilizing User Negligence In Use FiturBrowser
[9]. Googling
Web Links: click here
[1]. Social Engineering
Social Engineering is the name of a technique of gathering information by exploiting loopholes victim psychology. Or maybe it should also be regarded as "fraudulent" Social Engineering requires patience and caution so as the unsuspecting victims. We are required to be creative and able to think like a victim.
Social Engineering is the art of "forcing" people to do things according to your expectations or desires. Of course the "coercion" that do not openly or outside normal behavior is usually done with the victim. Humans tend to believe or easily influenced toward people who have a big name, never (or trying to) provide relief, and have the words or the convincing appearance. This is often used to prosecute perpetrators of social engineering victims. Often the perpetrator make a condition that we have some sort of dependency kepadanya.Ya, without us knowing he's conditioned us to a problem and make (as if - if only) he can overcome that problem. Thus, we would tend to do what he instructed without being suspicious.
Social Engineering is sometimes a serious threat. It seems to have nothing to do with technology, but still worth a watch out for social engineering because it can be fatal for your system. Why?? Because after a computer still can not get away from humans. Yes, no one system komputerpun on this earth that can be separated from human intervention. no matter how great your defense, if you are already controlled by the attacker through social engineering, then maybe you are the one who opened the entrance for her attacker.
[2]. Keylogger
Keylogger is a software that can record user activity. The recording is saved as plain text or images. Keylogger works by tapping a keyboard user. The application is able to recognize these forms as sensitive as the password form.
There are safe ways to avoid keyloger:
1. Use passwords with special characters like! @ # $% ^ & * () {} []. Most keyloger will ignore this character so that the perpetrator (keyloger installer) will not receive the actual password.
2. Prepare the password of the house, save it in text form. When you wish to enter a password, copy-paste tingal ajah. Keyloger will read your password by tapping the keyboard. But this way is somewhat risky. Why? because when you make a copy, your data will be stored in the clipboard. Currently, many found free software that can display the data in the clipboard.
[3]. Web Spoofing
Still remember the case pecurian Bank BCA Account number of customers? Yes, that's one real example of Web spoofing. The core of this technique is to make use of user error when typing a website address in the address bar. Basically, Web Spoofing is an attempt to trick the victim into thinking he is accessing a particular site, but it's not.
In the case of BCA, the perpetrator makes the site very similar and identical to the original site so that the victim will not be fooled doubt fill in sensitive information such as user name and password. In fact, because the site is a scam site, it is all valuable information was recorded by the fake web server, which is owned by the offender.
[4]. Facing Email
Facing email? Yes, and very easy to do this. One way is to use mailsnarf contained on dsniff utility. How to work mailsnarf is to block the data packets through the Internet and compile them into a complete email.
Dsniff and mailsnift are working on the basis of WinPcap software (equivalent to libcap on Linux) is a library that captures data packets. Packets captured is stored in a file by WinDump, while Dsniff and mailsnarf went further analyze the data packets and display the password (dsniff) or email content (mailsnarf).
[5]. Password Cracking
"Hacking while sleeping." Was the phrase used by the people who are doing password cracking. Why? Because in general dibuthkan a long time to perform password cracking. Can take hours, even days and - today! All of that depends on the target, whether the target using a common password, password length unusual character, or a combination of passwords with special characters.
One of the software which is used to do this is by using Brutus, one of the remote password cracker software is quite famous. Brutus worked with engineering dictionary attack or a bruce-force attack against ports http, POP3, FTP, telnet, and NetBIOS.
Dictionary Attack works with tried out the words in the dictionary passwords. While brute - force attack works with tried out all combinations of letters, numbers, or characters.
Brute Force Atack works very slowly and takes a long time depending on the type and character length specifications of the computer password. When this has been a lot of sites that blocked access to the login access to the business on an ongoing basis to no avail.
[6]. Session Hjacking
Session hijacking is increasingly prevalent among adult attackers. Session Hijacking usually done by imitation cookies. So in essence, we should be able to imitate the victim's cookies for login session.
So how to get the victim's cookies?
1. By analyzing Cookies.
This method is relatively difficult.
2. Stealing Cokies.
For example, the attacker would like to get an account of the A. The attacker can easily create such a script Java script is inserted in the email to be sent to korban.Saat victim opens the email, will own cookies unwittingly stolen and recorded onto a webserver by using a PHP script.
Lately, the most frequent target was Friendster account. There is an insert of a scipt through testimonials, there were inserted in the profile itself to steal the victim's cookies and so forth. I have tips for this:
1. Do not use the browser Internet Explorer
When you want to open other people's profiles, do not use Internet Explorer. Note the address intending profiles you see, first logout of your account and remove all cookies, then open your Friendster profile destination.
2. Check the source code
When receiving testimonials, please check your source code. Are there alien script or words are synonymous with piracy as:
"HACKED", "defaced", "OWNED" .. etc. ..
If in doubt ....... reject ajah ..
3. Logout unexpectedly.
Alert when without any apparent reason suddenly you logout automatically from your account. When you are prompted to enter a username and password, see your addressbar first! whether you are on a site that should or not. Check the source code page tersebut.Lihat the form action, where your information will be sent.
Actually, session hijacking can be prevented if only the service providers pay attention to the following:
1. Assign a unique session identifier
2. Set the system identifier random pattern
3. Session identifiers independent
4. Session identifiers can be mapped to the connection
client side.
Another phenomenon is, until the time this article was published, it was often found that users who do not sign out after opening the account. Thus, another person who uses the computer and open a website that has just been opened by the first will be automatically logged into the victim's account.
[7]. Being Proxy Server
We can gather information with a proxy server for the victim to be able to surf. With a proxy server, the whole identity of the surfers can be ours.
[8]. Utilizing user Negligence in the use fiturbrowser
Each browser must have features intended for the ease and convenience of users in surfing. Among them is the presence of cache and Password Manager.
On the Internet of course, many a website whose content is not changed in a few days (for example spyrozone.tk nich .. hehehe Well, for a site like this cache to be a very useful thing. Cache will store the files browsing so it will if you visit again browser to the site no longer have to download a second time from the server so that every page you have open before will open more quickly. All that is usually governed by the header time to live.
Well, how about the news provider sites are always up to date? For sites like it, time to live it will be set = 0 so that later you'll continue to download every time you visit.
Quite convenient is not it? Yes, but the threat began to emerge. Try it now you explore options related to the cache in your browser. Course you can see that there is a facility to determine how much temporary files that can be stored on the hard drive. Find also the location where the files are stored.
Try to open the folder, you will see the html files and image files from sites that you have visited. In IE browser, you can see the location of the cache files by browsing the menu Tools -> Internet Options -> Settings
So what can I get it?? yet only the files "garbage"?? Hmm ... now try to copy all the files there into a folder. Then open one of their HTML files. If it's a public computer, you can find out what sites have been accessed by the person before you.
Hmm .. just by looking at your temporary files can even see the password and etc.. I met lots of sites that store passwords and displays it on the url. Of course, you also must have often read in various tutorials.
Most browsers today have facilities for storing passwords. For example, when receipts Mozilla Firefox, you'll often receive a confirmation dialog box asking if you want your password saved or not by PasswordManager. Most users tend to select YES, whether consciously or if they do not know (read: do not want to know) what the purpose of the dialogue box.
Others who then use the browser that can very easily get the victim's password to enter the menu Tools -> Options -> Security -> Saved passwords.
Another example is a facility owned by the wand passwords Opera browser. When you enter a user name and password in a form and pressing the submit button, opera by default will ask to confirm to you whether you want the browser to store your id and password or not. Again and again ... most netter sloppy, they tend to select "YES".
Then?? Others who then use a browser that can view any site that is accessed by the user, point your browser to the site, place the cursor on the form the user name, press [ALT] + [ENTER] and BOOOMM!!!! Why?? Do not be surprised yet!! Hehehe .. login form will automatically be filled with the victim's user name complete with the password: D (It's fun enough ..
These are just a few examples, explore the features firtur other browsers!
[9]. Googling
Google.com. Many sites have collapsed, passwords and number - credit card number stolen as a result of the work of people who abuse this miracle Previously, it was easily dilakukan.Hanya by typing certain keywords associated with your user name and password, you can harvest hundreds of user passwords through google. But now it seems you have to bite the finger when using the above manner; D
Do not be sad before because Google has just spawned a new product, the Google Code Search. Start a new threat arises, "the clever" is now able to crawl up to archive files that are in the public directory of the web server. Be careful who had a habit to store important information in it (passwords, and other valuable info) should start the habit now eliminated. Always protect sensitive folders so that your website can live longer. If not ... yach .. ajah wait for someone new products utilizing google to dredge sensitive information from your web server. and if that had happened ... so be prepared .. "Playground" will be taken over by it ..

Tidak ada komentar:

Posting Komentar