There are many ways which Hackers use to Hack your Facebook account or any other Social Media account like twitter,gmail,facebook,VK etc but their are 7 most popular ways which Hackers use to Hack your accounts why will someone Hack your account or why they will do this to you even if you don’t have anything on your accounts ,the answer is data they will try to access your all data including images ,text ,videos ,passwords,emails etc if you think all these things are not use full even for you so why this will be use full for an Hacker do you know that big companies pay for all these data for Marketing purpose and advertising purpose this data is very use full for them and even if you think you don’t care about this also because every social site also do this ? than think ones again because this is Hacking he/she not only have data he/she has a passwords and email ,personal numbers he can use your phone number or email to Hack your friends accounts and family account ,he/she can also send virus or programmed files which can damage your system and other stuff.
So here are some of the ways which Hackers use to Hack your Accounts :-
1. Phishing
Phishing is still the most popular attack vector used for hacking Facebook accounts. There are variety methods to carry out phishing attack. In a simple phishing attacks a hacker creates a fake log in page which exactly looks like the real Facebook page and then asks the victim to log in. Once the victim log in through the fake page the, the victims “Email Address” and “Password” is stored in to a text file, and the hacker then downloads the text file and gets his hands on the victims credentials.
2. Keylogging
Keylogging is the simplest and the most effective way of hacking Facebook passwords. You need not be an expert to use it. Anyone with basic knowledge of computer can install and use it with ease. This method yields the best outcome when you have physical access to your victims PC.
Basically Keylogger is used to capture the keyboard strokes entered by any person, for example many offices use them to monitor their employees. So the fact that, it can capture keyboard stokes, it can also capture or record usernames and passwords entered by a person.
3.Stealer’s
Stealer’s are software’s specially designed to capture the saved passwords stored in the victims Internet browser.
4. Session Hijacking
In Session Hijacking attack, a hacker steals the victims browser cookie which is used to authenticate the user on a website, and use it to access the victims account. Session hijacking is widely used on LAN, and WiFi connections.
5. Sidejacking With Firesheep
Sidejacking attack went common in late 2010, however it’s still popular now a days. Firesheep is widely used to carry out sidejacking attacks. Firesheep only works when the attacker and victim is on the same WiFi network. A sidejacking attack is basically another name for http session hijacking, but it’s more targeted towards WiFi users.
6. Mobile Phone Hacking
Millions of people access facebook through the phone application daily. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are a lots of Mobile Spying software’s used to monitor a Cellphone. The most popular Mobile Phone Spying software’s are: Mobile Spy, and Spy Phone Gold.
7. USB Hacking
If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the Internet browser.