What's new

Tutorial Facebook Complete Method Of Ways To stéál Or Capture Target Passphrase

Xerodeu

Eternal Poster
Joined
Jul 18, 2020
Posts
623
Solutions
1
Reaction
1,357
Points
370
Hi, In This Thread, I Will Show You All Six Method Or ways Your Account can Be häçked. Remember This is for educational purposes only, and do not use this thread. To take advantage of anyone, this can also help you find out why you get häçked. If ever you get compromised.

First On Our List Is Phishing:
PHISHING-phishing is a Way of deceiving people To Log In In A Particular Link Resulting in the häçkers s†éáling your Credentials

This Thread Leads To Phishing Demonstration: https://phcorner.net/threads/how-easy-password-s-ealers-make-phishing-sites-just-for-you.1172106/

Second Is Session Hijacking:
SESSION HIJACKING-Session hijacking is a kind of attack usually in public wifi That takes advantage of your cøøkíés or session-id. Once you are connected to specific public wifi, there could be a lurking danger.

No Demonstration.

Third is Bruteforce:
BRUTEFORCE-Bruteforce Is A Way of cr@cking The victim's password. Bruteforce is a way of guessing every possible password until you get the correct passphrase of the victim's account.

Demonstration:



Fourth Is Malware:
MALWARE-Malware is a program usually designed to halt and destroy a computer system. Malware includes backdoors, keyl0ggers, ransomware, rootkit, worm. So what is the malware's role in Facebook häçking? Sometimes malware is used to build a backdoor for an operating system like keyl0ggers to capture keyboard keys being pressed by the victims.

Demonstrations:



Fifth is Browser Exploitation Or Web Hooking
HOOKS-A web browser hook can be thought of like a backdoor in a web page, allowing an attacker to execute commands on the page with or without the visitor noticing. This includes Deploying a Facebook phishing Page Or Redirecting you to a Facebook phishing page.

Demonstration:



Sixth Is Data Breach
DATA BREACH-Data breach is a type of häçking that häçkers target the Databases of a Particular website to harvest all of the hashes, emails, and passwords inside the database.

No Demonstration

So all of that is the only way your account can be häçked, so if you are häçked, maybe one of the six methods is the reason why you get häçked.

Remember, With Great Power Comes Great Responsibility
 

Attachments

lods try ko intindi yung nasa video. my tanong ako ano yung Flat Form gamit mo para mg decode? o need pa regisiter para ma download yun? pde ba yan sa CMD?
 
lods try ko intindi yung nasa video. my tanong ako ano yung Flat Form gamit mo para mg decode? o need pa regisiter para ma download yun? pde ba yan sa CMD?
Linux terminal ang gamit ko,Pede yung brutefoce sa cmd pero yung iba need ng Linux kernel like Kali linux
 
Ayus mga tutorial mo lods, heheh... napapa-isip tuloy ako gumawa ng threads like this para sa mga beginner learner na gusto gumawa ng mga ganito using their android phones. Continue to inspire lods. :)
;)
 
mga boss pa help po need ko lang account at password para ma verify if may lalaki yung asawa ng friend ko, kahit po bayad kami via gcash po
 
Back
Top