1. Facebook fake page (see my other tutorial + facebook offline file -tutorial.com/hacking-tutorial/hacking-facebook-using-man-in-the-middle-attack/ and -tutorial.com/hacking-tutorial/5-steps-how-to-hack-facebook-account-password/)
I will show two methods one is the easy one for beginners who want to just test the hack and the second one is for those wanting to learn hacking and pentesting and create their custom Facebook phishing page.
A phishing attack is the attack method used by hackers in which they create a copy of the original site which is exactly the same as the original website. Then by using social engineering and creativity, they send the phishing link to people to sign in. Once someone signs in their credentials. Hackers can easily get the username and password of the victim in text format.
To create the second part of facebook phishing page you need to create a PHP file. I am naming my file as post.php since that is what I edited in the source code in part one. If you plan on using a different name make sure to change it in index.htm as well.
For example, you create a web page that shows users how to earn money in a very short time, but before continuing to the article, you ask the user to login to Facebook to continue. This login section must be designed exactly the same as the original Facebook login. Now send the link to the target user. When he or she opens the link, the page asks the user to login in order to continue, and the user immediately logs in in order to continue reading the article, but as you've written the redirection code, the user is redirected to his or her original Facebook page, and your database contains his or her Facebook login credentials.
Now create a database with the same name, and then create a table with the same name again. And at last, create columns with the same details as used in the above code, that is, a database named fbhackedusers, a table named fbusers, and then columns namely facebookid and facebookpassword.
Now your friend will enter his or her Facebook account ID and password to get some exclusive tips to earn money in a short time. You can also change the message, title, and description of the page as per requirement; that is what the user likes most. For example, if you send the link toanyone on WhatsApp, it looks like this (this happens only when you put all the hacking systems live as given below):
You can send the link to any of your friends whose Facebook account is going to be hacked by you, or to anyone else's Facebook account you want to hack. And to see if your friend is in your hacking system, keep looking at the list of hacked users by refreshing the hackedusers.php page.
We are going to cover some Facebook hacking techniques discovered on bug bounty program that could have let anyone hack into any FB account WITHOUT PASSWORD. Please note that all the methods listed here are patched by the Facebook team and it no longer works. But you will get a basic idea of how hackers could hack an account without knowing the actual password. Check the link placed in each method if you want to view more details.
This time, the ethical hacking experts from the International Institute of Cyber Security (IICS) will show you the use of FotoSploit, a tool to create phishing links with preview that will make the target user believe that they will be redirected to a Facebook or YouTube page. This tool is ideal for sending phishing links through instant messaging platforms.
The tool will create the link that we must send to the potential victim, remember that the success or failure of the attack requires the victim to fall into the trap and hand over their login credentials and even their location data.
Now we have the 3 required files facebook-login.html, code.php, password.txt on the desktop.The next task is to link(connect) the 3 files. such that we must link them in the order facebook-login.html >> code.php >> passwords.txt.
After get the phishing link, we can now send it to our target. Avoid using messaging platforms which detect phishing links. You can also make an extra step of hiding the link behind some text as a hyperlink or you can create a Facebook ad template which can make your mail look more authentic. Using trusted way of sending the phishing link will also play a big part in ensuring the success of the attack. Below is an example of an email that can be delivered to target via email.
What could the problem be? A video you posted last year of your friends dancing to a hit song? Could that really be it? Well, maybe: The link does lead to a notice about music copyright infringement. The address of the page is facebook.com, and the notification page contains a link to an appeal form. So far, seems plausible.
Written BySami SadithSami is a content writer & loves to read. He enjoys writing about topics such as productivity, viral marketing and growth hacking. Allowing himself to create his unique visual style, but still allowing people to recognize it.
All most every new beginner in the hacking field usually wants to hack Facebook or Instagram. These can be considered as some of the most common priorities of every beginner in the hacking field. However, a question may be arising in your mind that, when we search on Google "hack facebook," a huge number of sites comes as a result, promising just enter the target's e-mail address and they will give you password. Thus it is nothing but just a method of making a fool; otherwise, Facebook had to shut down their business a long time ago. You may be wondering, then what does actually meaning of hacking Facebook. First of all, we have to accept that most of us are really misled by the term "hacking". Usually, all newcomers in the hacking field think that gaining the target's password or gaining access to the target's account is hacking, but hacking is much more than that. So before moving forward, we want to clear that you cannot hack Facebook, and it is almost impossible, at least for beginners.
Phishing is the most common method to get access to someone's Facebook account. The most popular type of phishing is creating a fake login page and send the link of the page by e-mail or SMS, or social media to the target. Once the target opens that link, the login page will look exactly like the Facebook login page. However, if the target thinks that is a genuine page and enters his/her credentials. You will get those credentials instead of Facebook, and then you can easily access the target's account. This process is a little bit difficult because we need to host a website and create a login page. However, some excellent tools really made it kids play.
When you create Linked data types, Excel connects to an online data source and returns detailed information about certain values, such as company stocks or geographies. For instance, converting the word Microsoft to a linked data type will return information about the Microsoft Corporation, such as location, number of employees, stock price, and so on.
Enable all Linked Data Types (not recommended) Click this option if you want to create linked data types without receiving a security warning. The data for linked data types is currently provided through Microsoft, but as with all external data, you should only choose this option if you trust the data source. You may want to select this option temporarily, and then return to the default setting when you no longer need it.
Heads-ups!! Almost every account is being cloned. Your picture and your name are used to create a new facebook account (they don't need your password to do this). They want your friends to add them to their facebook account. Your friends will think that it's you and accept your request. From that point on they can write what they want under your name. I have NO plans to open a new account. Please DO NOT accept a 2nd friend request from "me". Copy this message on your wall.
It is true in a general sense that some scammers have engaged in Facebook cloning, a process in which the scammer creates a new Facebook account using a profile picture and similar name taken from an existing user, then sends out friend requests which appear to originate from that user. (The requests often claim the sender has just set up a new Facebook account or was locked out of his previous account.) The end purpose of such scams varies: it may be to send Facebook users links to malicious websites that propagate malware, to perpetrate phishing schemes, or to collect personal information from users that can be used for identity theft. 2b1af7f3a8