SlideShare une entreprise Scribd logo
1  sur  15
METHODS TO HACK FACEBOOK
KEYLOGGER METHOD
PHISHING
BY WIRESHARK
PHISHING METHOD
IN THIS METHOD WE CREATE A WEB
PAGE SIMILAR TO FACEBOOK PAGE
AND UPLOAD THAT PAGE INTO OUR
WEBSITE. THEN WE SEND THE
LINK(URL) OF THE WEBSITE TO THE
VICTIMS BY MEANS OF FACEBOOK OR
GMAIL.
WHEN HE OR SHE CLICK ON THAT
LINK OUR FACEBOOK PAGE OPENS
AND ASK USERNAME AND PASSWORD
TO LOGIN. WHEN HE OR SHE
What Is Keylogger And How To
Be Safe From Keyloggers?
What is keylogger ?
A keylogger also know as keystroke logger is
a software or hardware device which monitors
each and every key typed by you on your
keyboard. You can not identify the presence
of keylogger on your computer since it runs in
background and also it is not listed in task
manager or control panel. It can be used by
parents to keep eye on their childrens or
company owner to spy on their employes.
Types of keyloggers
There are two types of keylogger:-
 hardware keylogger
 software keylogger
HARDWARE KEYSTROKER
SOFTWARE KEYLOGGERS
There are many keylogger free avaiable in
internet
Some of the are :-
 Ardamax Keylogger
 Emissary Keylogger etc.
STEP1 : Create Server for Hacking
Passwords
 First of all for hacking any facebook
account password, we have to create our
keylogger server that will run on victims PC
and capture his keystrokes and mail us on
the email account that we will use to build
the keylogger. The keylogger server building
process consists of several steps.
Now open the Keylogger file. Here you will need gmail
ID and password.
Bind the Keylogger server with any
software
KEYLOGGER FILE CAN BE BIND WITH ANY
SOFTWARE AND THEN SEND TO VICTIM.
EVEN VICTIM WHEN
How to Spread Keylogger or send
it to victim or friend
 Now you have one Software setup file with keylogger
attached with it.(In our case we have Ccleaner setup with
keylogger attached with it).
 Now Spread your keylogger through forums. You might be
a member of various forums use them to spread your
keylogger in form of software posts. You can use various
software's to spread them that users frequently download.
 Spread it through pendrives or USB hard drives. Suppose a
friend asked you for a software give it the software that has
keylogger attached with it.
How to protect yourself from
these hacks?
Prevention is always better than cure so always follow
these steps:
 Don't use cracked softwares and don't download them
from unauthorized websites.
 Always keep your antivirus and anti-spyware up to
date.
 Always scan the files before transferring them to your
USB.
 Do not allow other users to use your PC i.e password
protect it.
 Never use your online banking from cyber cafe. If you
want to use then you can try this method. open
notepad and type anything Then copy and paste each
word that comes in your username or password.
 When you enter cyber cafe make sure that no
hardware device is attached to keyboard wire.

Contenu connexe

En vedette

How to jumpstart your car
How to jumpstart your carHow to jumpstart your car
How to jumpstart your carBowen Stephens
 
Blurred Lines: Finding Clarity with Your Audience In the Fight for Time Atten...
Blurred Lines: Finding Clarity with Your Audience In the Fight for Time Atten...Blurred Lines: Finding Clarity with Your Audience In the Fight for Time Atten...
Blurred Lines: Finding Clarity with Your Audience In the Fight for Time Atten...Energy Digital Summit
 
Flash Games Japan Mediakit for BitSummit 2015
Flash Games Japan Mediakit for BitSummit 2015Flash Games Japan Mediakit for BitSummit 2015
Flash Games Japan Mediakit for BitSummit 2015Shunsuke Miyahara
 
L'eccellenza è un percorso senza fine...
L'eccellenza è un percorso senza fine...L'eccellenza è un percorso senza fine...
L'eccellenza è un percorso senza fine...Fedegari Group
 
How to cook a basic stir fry
How to cook a basic stir fryHow to cook a basic stir fry
How to cook a basic stir fryrddunn0720
 
Почему изменения в асептическом производстве являются неизбежными?
Почему изменения в асептическом производстве являются неизбежными?Почему изменения в асептическом производстве являются неизбежными?
Почему изменения в асептическом производстве являются неизбежными?Fedegari Group
 
Những giai đoạn phát triển của trẻ
Những giai đoạn phát triển của trẻNhững giai đoạn phát triển của trẻ
Những giai đoạn phát triển của trẻdanglephong
 
Building capacity for creating demand in support of malaria prevention and co...
Building capacity for creating demand in support of malaria prevention and co...Building capacity for creating demand in support of malaria prevention and co...
Building capacity for creating demand in support of malaria prevention and co...Malaria Consortium
 
Innovation in Chemical Bio-decontamination: from the process to the machine
Innovation in Chemical Bio-decontamination: from the process to the machineInnovation in Chemical Bio-decontamination: from the process to the machine
Innovation in Chemical Bio-decontamination: from the process to the machineFedegari Group
 
Search and Social: A Happy Marriage - Cara Wiggins Gray [Energy Digital Summi...
Search and Social: A Happy Marriage - Cara Wiggins Gray [Energy Digital Summi...Search and Social: A Happy Marriage - Cara Wiggins Gray [Energy Digital Summi...
Search and Social: A Happy Marriage - Cara Wiggins Gray [Energy Digital Summi...Energy Digital Summit
 
Integrating mRDTs into the health system in Uganda: preparing health workers ...
Integrating mRDTs into the health system in Uganda: preparing health workers ...Integrating mRDTs into the health system in Uganda: preparing health workers ...
Integrating mRDTs into the health system in Uganda: preparing health workers ...Malaria Consortium
 
1a budaya&pembelajaran
1a budaya&pembelajaran1a budaya&pembelajaran
1a budaya&pembelajaranSang Kojol
 
Case study- Implementing fully integrated solutions for the food industry
Case study- Implementing fully integrated solutions for the food industryCase study- Implementing fully integrated solutions for the food industry
Case study- Implementing fully integrated solutions for the food industryFedegari Group
 

En vedette (14)

How to jumpstart your car
How to jumpstart your carHow to jumpstart your car
How to jumpstart your car
 
Blurred Lines: Finding Clarity with Your Audience In the Fight for Time Atten...
Blurred Lines: Finding Clarity with Your Audience In the Fight for Time Atten...Blurred Lines: Finding Clarity with Your Audience In the Fight for Time Atten...
Blurred Lines: Finding Clarity with Your Audience In the Fight for Time Atten...
 
Flash Games Japan Mediakit for BitSummit 2015
Flash Games Japan Mediakit for BitSummit 2015Flash Games Japan Mediakit for BitSummit 2015
Flash Games Japan Mediakit for BitSummit 2015
 
L'eccellenza è un percorso senza fine...
L'eccellenza è un percorso senza fine...L'eccellenza è un percorso senza fine...
L'eccellenza è un percorso senza fine...
 
Seo tutorial 1
Seo tutorial 1Seo tutorial 1
Seo tutorial 1
 
How to cook a basic stir fry
How to cook a basic stir fryHow to cook a basic stir fry
How to cook a basic stir fry
 
Почему изменения в асептическом производстве являются неизбежными?
Почему изменения в асептическом производстве являются неизбежными?Почему изменения в асептическом производстве являются неизбежными?
Почему изменения в асептическом производстве являются неизбежными?
 
Những giai đoạn phát triển của trẻ
Những giai đoạn phát triển của trẻNhững giai đoạn phát triển của trẻ
Những giai đoạn phát triển của trẻ
 
Building capacity for creating demand in support of malaria prevention and co...
Building capacity for creating demand in support of malaria prevention and co...Building capacity for creating demand in support of malaria prevention and co...
Building capacity for creating demand in support of malaria prevention and co...
 
Innovation in Chemical Bio-decontamination: from the process to the machine
Innovation in Chemical Bio-decontamination: from the process to the machineInnovation in Chemical Bio-decontamination: from the process to the machine
Innovation in Chemical Bio-decontamination: from the process to the machine
 
Search and Social: A Happy Marriage - Cara Wiggins Gray [Energy Digital Summi...
Search and Social: A Happy Marriage - Cara Wiggins Gray [Energy Digital Summi...Search and Social: A Happy Marriage - Cara Wiggins Gray [Energy Digital Summi...
Search and Social: A Happy Marriage - Cara Wiggins Gray [Energy Digital Summi...
 
Integrating mRDTs into the health system in Uganda: preparing health workers ...
Integrating mRDTs into the health system in Uganda: preparing health workers ...Integrating mRDTs into the health system in Uganda: preparing health workers ...
Integrating mRDTs into the health system in Uganda: preparing health workers ...
 
1a budaya&pembelajaran
1a budaya&pembelajaran1a budaya&pembelajaran
1a budaya&pembelajaran
 
Case study- Implementing fully integrated solutions for the food industry
Case study- Implementing fully integrated solutions for the food industryCase study- Implementing fully integrated solutions for the food industry
Case study- Implementing fully integrated solutions for the food industry
 

Hacking

  • 1.
  • 2. METHODS TO HACK FACEBOOK KEYLOGGER METHOD PHISHING BY WIRESHARK
  • 3. PHISHING METHOD IN THIS METHOD WE CREATE A WEB PAGE SIMILAR TO FACEBOOK PAGE AND UPLOAD THAT PAGE INTO OUR WEBSITE. THEN WE SEND THE LINK(URL) OF THE WEBSITE TO THE VICTIMS BY MEANS OF FACEBOOK OR GMAIL. WHEN HE OR SHE CLICK ON THAT LINK OUR FACEBOOK PAGE OPENS AND ASK USERNAME AND PASSWORD TO LOGIN. WHEN HE OR SHE
  • 4.
  • 5. What Is Keylogger And How To Be Safe From Keyloggers?
  • 6. What is keylogger ? A keylogger also know as keystroke logger is a software or hardware device which monitors each and every key typed by you on your keyboard. You can not identify the presence of keylogger on your computer since it runs in background and also it is not listed in task manager or control panel. It can be used by parents to keep eye on their childrens or company owner to spy on their employes.
  • 7. Types of keyloggers There are two types of keylogger:-  hardware keylogger  software keylogger
  • 9. SOFTWARE KEYLOGGERS There are many keylogger free avaiable in internet Some of the are :-  Ardamax Keylogger  Emissary Keylogger etc.
  • 10. STEP1 : Create Server for Hacking Passwords  First of all for hacking any facebook account password, we have to create our keylogger server that will run on victims PC and capture his keystrokes and mail us on the email account that we will use to build the keylogger. The keylogger server building process consists of several steps.
  • 11. Now open the Keylogger file. Here you will need gmail ID and password.
  • 12. Bind the Keylogger server with any software KEYLOGGER FILE CAN BE BIND WITH ANY SOFTWARE AND THEN SEND TO VICTIM. EVEN VICTIM WHEN
  • 13. How to Spread Keylogger or send it to victim or friend  Now you have one Software setup file with keylogger attached with it.(In our case we have Ccleaner setup with keylogger attached with it).  Now Spread your keylogger through forums. You might be a member of various forums use them to spread your keylogger in form of software posts. You can use various software's to spread them that users frequently download.  Spread it through pendrives or USB hard drives. Suppose a friend asked you for a software give it the software that has keylogger attached with it.
  • 14. How to protect yourself from these hacks? Prevention is always better than cure so always follow these steps:  Don't use cracked softwares and don't download them from unauthorized websites.  Always keep your antivirus and anti-spyware up to date.  Always scan the files before transferring them to your USB.  Do not allow other users to use your PC i.e password protect it.
  • 15.  Never use your online banking from cyber cafe. If you want to use then you can try this method. open notepad and type anything Then copy and paste each word that comes in your username or password.  When you enter cyber cafe make sure that no hardware device is attached to keyboard wire.