Social sites are the most widely used social networking site with over 2.6 billion monthly active users as of the first quarter of 2020. As a reason if which it has become the number 1 target of hackers.

1. Phishing

Phishing still is the most popular attack vector used for hacking Facebook accounts, There are variety of methods to carry out phishing attack. In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real Facebook page and then asks the victim to login into that page. Once the victim logins through the fake page the victims “Email Address” and “Password” is stored in to a text file, The hacker then downloads the text file and gets his hands on the victims credentials.

2. Keylogging

Keylogging, according to me is the easiest way to hack a Facebook password, Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A keylogger is basically a small program which once is installed on victim’s computer will record every thing which victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.

3. Stealers

Almost 70% percent people use stored passwords in their browser to access the Facebook, This is quite convenient but can sometimes be
extremely dangerous, Stealer’s are software’s specially designed to capture the saved passwords stored in the victims browser. Stealers once FUD can be extremely powerful

4. Session Hijacking

Session Hijacking can be often very dangerous if you are accessing Facebook on a http://EXAMPLE.In/ without https a Session Hijacking attack a hacker steals the victims browser cookie which is used to authenticate a user on a website and use it to access victims account, Session hijacking is widely used on LAN’s.

5. Sidejacking With Firesheep

Side jacking attack went common in late 2010, however it’s still popular now a days. Fire sheep is widely used to carry out side jacking attacks.

Firesheep only works when the attacker and victim is on the same WiFi network. A sidejacking attack is basically another name for HTTP session hijacking, but it’s more targeted towards WiFi users.

6. Mobile Phone Hacking

Millions of Facebook users access Facebook through their mobile phones.
In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are lots of Mobile Spying softwares used to monitor a Cellphone. The most popular Mobile Phone Spying softwares are:
1. Mobile Spy
2. Spy Phone Gold

7. DNS Spoofing

If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original Facebook page to his own fake page and hence can get access to victims Facebook account.

8. USB Hacking

If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved
passwords in the browser.

9. Man In the Middle Attacks

If the victim and attacker are on the same LAN and on a switch based network, A hacker can place himself b/w the client and the server or he could also act as a default gateway and hence capturing all the traffic in between.

10. Botnets

Botnets are not commonly used for hacking Facebook accounts, because of it’s high setup costs, They are used to carry more advanced attacks, A botnet is basically a collection of compromised computer. The infection process is same as the key logging, however a botnet gives you additional options for carrying out attacks with the compromised computer. Some of the most popular bot-nets include Spy-eye and Zeus.

Be safe & don’t be an easy prey for the hackers.

Please don’t forget to Like,Comment & Share.

Follow the Admin here: https://www.facebook.com/sachinshetty10

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

RSAC Meetup Banner

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)