Ways of Hacking Facebook
Dont Just trust any program saying It can hack Facebook or Penetrate its Database etc. There are other ways to do it ..And those programs are Fake.
1)Phishing
What is a Facebook Phishing Page ?
Phishing is a way of attempting to acquire information such as usernames,passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail spoofing or instant messaging,and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.
How to use it ?
Step 1
Download: Facebook Phishing Page
File Size: 4 KB
File Extension: .rar (Compressed Archive)
Step 2
Extract the files after downloading .Make an id on one of these hosting websites .www.t35.com
www.110mb.com
www.x10hosting.com
www.000webhost.com
www.blackapplehost.com
www.freehostia.com
Step 3
After registering login to your file manager of you respective hosting and upload all the files of the folder which contains the document.
Step 4
Once you have uploaded the files you have to change the permission (CHMOD) of each file to "700".Select all the file and change the permissions as shown in the pictures below.
Step 5
So by now you should have uploaded the file,CHMODed (Changed Permissions) the files.Now is the time to test.Go the site for example.http://username.freehostia.com/index.htm
Step 6
After you go there you will find that it is the exact clone of the original one.Just enter some E-mail ID and password in order to check if it working,now it should redirect you to "www.hackmeout.blogspot.com",if this is happening it is a success !Now go to your file manager again and refresh the page,you'll find that a new file will be created for ex. Facebook-Passwords.htm in your file manager to view the passwords,go to http://username.freehostia.com/Facebook-Passwords.htm
2)Keylogging
Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. Also you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited.
This invisible spy application is designed for 2000, XP, 2003, Vista and Windows 7.
Step 1
1)Download: Ardamax Keylogger
File Extension: .rar (Compressed Archive)
Name: Luiz Ricardo P Oliveira
Serial: 3F1A54F8032C
Use download 2).3) if download 1) doesn't Works .
2)Download: Ardamax Keylogger
File Extension: .rar (Compressed Archive)
Name:Nemesis
3)Download: Ardamax Keylogger
File Extension: .rar (Compressed Archive)
Name: Popescu Marian
Serial: 083A-E649-5E15
Step 2
After installing the program, when u run it for the first time, you’d be asked to put in the name and the serial number which you will get from Step 1.[i have included the key for the software] .After activating it, lets open it up. When you’ll open it, you’ll see an icon added into your system tray as shown in pic above
Now lets right click on that icon & then click on “Remote Installation”. Now you should have something as shown in pic below.
Step 4
Lets click on next and make sure that u should have the picture as above In the option that says “Additional components” select ONLY “Log viewer”.
Step 5
Now here comes the most important page, which will show u the options and will let u select the way you want to receive the information from your victim’s computer.
You can select one of the three options. You can choose FTP but it is complicated , so choose Email option.
Step 8
Send To - Your G-mail's Email address
Username, Password - Your G-mail's Email address and password
SMTP server - SMTP server address.
Port - SMTP server connection port. Typical values are 25, 465, 587.
Security - select the connection type:
Dont Just trust any program saying It can hack Facebook or Penetrate its Database etc. There are other ways to do it ..And those programs are Fake.
1)Phishing
What is a Facebook Phishing Page ?
Phishing is a way of attempting to acquire information such as usernames,passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail spoofing or instant messaging,and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.
How to use it ?
Step 1
Download: Facebook Phishing Page
File Size: 4 KB
File Extension: .rar (Compressed Archive)
Step 2
Extract the files after downloading .Make an id on one of these hosting websites .www.t35.com
www.110mb.com
www.x10hosting.com
www.000webhost.com
www.blackapplehost.com
www.freehostia.com
Step 3
After registering login to your file manager of you respective hosting and upload all the files of the folder which contains the document.
Step 4
Once you have uploaded the files you have to change the permission (CHMOD) of each file to "700".Select all the file and change the permissions as shown in the pictures below.
Step 5
So by now you should have uploaded the file,CHMODed (Changed Permissions) the files.Now is the time to test.Go the site for example.http://username.freehostia.com/index.htm
Step 6
After you go there you will find that it is the exact clone of the original one.Just enter some E-mail ID and password in order to check if it working,now it should redirect you to "www.hackmeout.blogspot.com",if this is happening it is a success !Now go to your file manager again and refresh the page,you'll find that a new file will be created for ex. Facebook-Passwords.htm in your file manager to view the passwords,go to http://username.freehostia.com/Facebook-Passwords.htm
2)Keylogging
Ardamax Keylogger is a keystroke recorder that captures user's activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. Also you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited.
This invisible spy application is designed for 2000, XP, 2003, Vista and Windows 7.
Step 1
1)Download: Ardamax Keylogger
File Extension: .rar (Compressed Archive)
Name: Luiz Ricardo P Oliveira
Serial: 3F1A54F8032C
Use download 2).3) if download 1) doesn't Works .
2)Download: Ardamax Keylogger
File Extension: .rar (Compressed Archive)
Name:Nemesis
Serial:YKPJVSDPITIUTRL
3)Download: Ardamax Keylogger
File Extension: .rar (Compressed Archive)
Name: Popescu Marian
Serial: 083A-E649-5E15
Step 2
After installing the program, when u run it for the first time, you’d be asked to put in the name and the serial number which you will get from Step 1.[i have included the key for the software] .After activating it, lets open it up. When you’ll open it, you’ll see an icon added into your system tray as shown in pic above
Step 3
Now lets right click on that icon & then click on “Remote Installation”. Now you should have something as shown in pic below.
Lets click on next and make sure that u should have the picture as above In the option that says “Additional components” select ONLY “Log viewer”.
Step 5
Now next screen would give you “Invisibility” options. This will help you to hide your key logger from your victim’s computer. So CHECK’EM all!
Step 6
Now the page that says “Web Update”, lets UNCHECK all off the boxes & click on NEXT.
Now you will see “Options” page. So select it the way i’ve done in the picture shown above.
Step 7
Now here comes the most important page, which will show u the options and will let u select the way you want to receive the information from your victim’s computer.
You can select one of the three options. You can choose FTP but it is complicated , so choose Email option.
Step 8
Send To - Your G-mail's Email address
Username, Password - Your G-mail's Email address and password
SMTP server - SMTP server address.
Port - SMTP server connection port. Typical values are 25, 465, 587.
Security - select the connection type:
- None - simple connection.
- SSL - secure SSL connection.
- TLS - TLS-encrypted connection.
SMTP server , Port and security will fill automatically after filling Send to,username, Password etc.
No comments:
Post a Comment