ComRȁde PyRate

Saturday 7 March 2015

Top 8 Ways To Hack Facebook Accounts Ultimate tutorials

Top 8 Ways To Hack Facebook Accounts 

There are various methods to hack facbook account password like Keyloggers, Phishing websites etc.. whereas bruteforcing, dictionary attacks, DDOS attack etc will not work directly due account lockout feature. Today in this post I am going to share a very effective way to hack facebook account I named it Top 10 ways to hack facebook accounts



8 Way To Hack Facebook 

1. Facebook Phishing 




Phishing still is the most popular attack vector used for hacking facebook accounts, There are variety of methods to carry out phishing attack, In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real facebook page and then asks the victim to login into that page, Once the victim logins through the fake page the victims "Email Address" and "Password" is stored in to a text file, The hacker then downloads the text file and get's his hands on the victims credentials.
I have explained the step by step phishing process in my post below:
                     

2. Keylogging 

Keylogging, according to me is the easiest way to hack a facebook password, Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A keylogger is basically a small program which once is installed on victims computer will record every thing which victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address. 

I have explained the step by step process in my post 

How To Hack Facebook With keylogging

3. Session Hijacking




Session Hijacking can be often very dangerous if you are accessing Facebook on a http:// connection, In a Session Hijacking attack a hacker steals the victims browser cookie which is used to authenticate a user on a website and uses to it to access victims account, Session hijacking is widely used on Lan's. I have already written a three part series on How session hijacking works? and also a separate post on Facebook session hijacking.


4. Sidejacking With Firesheep


Sidejacking attack went common in late 2010, however it's still popular now a days, Firesheep is widely used to carry out sidejacking attacks, Firesheep only works when the attacker and victim is on the same wifi network. A sidejacking attack is basically another name for http session hijacking, but it's more targeted towards wifi users.
To know more about sidejacking attack and firesheep, read the post mentioned below:



5. Mobile Phone Hacking
Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are lots of Mobile Spying softwares used to monitor a Cellphone.
The most popular Mobile Phone Spying softwares are:
1. Mobile Spy 

6. DNS Spoofing 

If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original facebook.com page to his own fake page and hence can get access to victims facebook account.

7. USB Hacking 

Usb password stealer
If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the browser, I have also posted related to this attack which you can read by accessing the link below:

8. Man In the Middle Attacks

If the victim and attacker are on the same lan and on a switch based network, A hacker can place himself b/w the client and the server or he could also act as a default gateway and hence capturing all the traffic in between, ARP Poisoning which is the other name for man in the middle attacks is a very broad topic and is beyond the scope of this article, We have written a couple of articles on man in the middle attacks which canb be accessed from the links mentioned below:
If you are really interested in learning how man in the middle attacks, you can view the presentation 


I have worked very hard on this post please leave comments if u like it

Black Hat Top Hack- Attack Tools For Hackers

 

  1. Armitage : Graphical Cyber Attack Management Tool
      
      Armitage is a graphical cyber attack management tool for Metasploit that visualizes your               targets, recommends exploits, and exposes the advanced capabilities of the framework.                     Armitage aims to make Metasploit usable for security practitioners who understand 
      hacking but don’t use Metasploit every day. If you want to learn Metasploit and grow  
      into the    advanced features, Armitage can help yo
      Download NOw for                         Windows : Linux: MacOS X
                                ---------------------------------------------------------
     
       2.Dark-Jumper v5.8 : SQLi, LFi RFi Scanner
     http://i1-mac.softpedia-static.com/screenshots/Darkjumper_1.png
     Darkjumper is a free tool what will try to find every website that hosts at the same server as your        target. Then check for every vulnerability of each website that host at the same time
                                  ---------------------------------------------------------
   3.Dossier detective (information gathering/doxing tool        coded by me)   

    Dossier Detective:
    [Image: dossier%20detective%20screenie.jpg]

    This tool takes advantage of the freely available public information on the internet in an attempt to create a           dossier on individuals and companies by using a plethora of techniques. It will do things like use 
search               engines, social networking sites, vehicle databases, telephone systems and much more. Primarily 
     aimed at private detectives but obviously not restricted to - coded in VC++ and required the .NET 
     rumtime 3.5 or  above to run.
                                        ONLY ONLY FOR EDUCATIONAL PURPOSE

               DOWNLOAD NOW

                                                   ---------------------------------------------------------
   4.Lucidity Scanner (check vulnerable computers, webservers, DoS attack etc)
      coded by me

   This is the BEST tool I've made to date:
   [Image: lucidty%20screenshot.jpg]
   Lucidity Scanner

   This is a tool for checking and testing computers and web servers which can help build up a blueprint of the          system and identify potentially exploitable weaknesses.
                                            
      DOWNLOAD NOW
                                               
                                      ---------------------------------------------------------
                                      
   5.iPentagram - ShellBooter, DorkScanner, Vuln.Scanner, IPTracer, TxtEncrypt                    [MediaFire] 



   [Image: jbpZAXH5JiQlqu.png]
    What is iPentagram?
   iPentagram is a project I have been working on for the past few weeks.It includes a large variety 
    of functions which are mandatory for all computer lovers and enthusiasts.
   Features:
  • // Shell Booter - Powerful and advanced shellbooter which gives the users the ability to add new shells.
  • // Dork Scanner - Scan websites for dorks with blazing speeds.
  • // Vulnerability Detector - SQLi vulnerability detector with multiple settings.
  • // IP Tracer - Trace, log and export IP addresses.
  • // File Pumper - Increase the size of your executables without corrupting it.
  • // Text Encryption/Decryption -
  • Gives the user the ability to encrypt or decrypt submitted text.
  • // Multi-threaded - iPentagram is fully multi-threaded. Meaning, you can run multiple tools at once without causing the application to freeze or crash.
  • // User Friendly - iPentagram was designed to be used not only by professionals but also by beginners and is therefore extremely user friendly. With messages and tooltips that even a child could understand, iPentagram is as easy as it gets.
  • // Automatic Updates - iPentagram will automatically notify the user when a new update is available and will allow the user to get his/her hands on the new update with just the click of a button.
     
         Download Now : Mediafire link\ : password www.hoodedjustice.me


    NOTE
               Do not remove/relocate the files associated with iPentagram or it may not work.

      
                                                   ---------------------------------------------------------

      6.Flutter Packets [DOS] 
      [Image: zWfu8TO.png]
      Download Binray here
      Download Source here
                                      ---------------------------------------------------------
          
     7.CPanel Nightmare - puplic Version


     [Image: 2vi1747.png]
     
       This is the public version
       This version is 3 times slower from private version
       Also the ftp brute was disabled in public version
       For penetration testing only
  
     Download Link              
                          http://www.mediafire.com/download/gtmo6x...ersion.rar
                           Login Password: pentest
     
                                      ---------------------------------------------------------
  8. 2.BlaZer's Tool Kit - All in One Hacking Tools Pack : Free Download
      http://profile.ak.fbcdn.net/hprofile-ak-snc4/186586_100002436797280_3198900_n.jpg
       Features:

      ★ Inbuilt Web Browser with Java Script and Flash

      ★ Email Bomber

      ★ Port Scanner

      ★ Screen Recorder

      ★ Pinger

      ★ Anti-Virus Finder

      ★ File-Downloader and much more.....
      
      Download Now
                                http://www.mediafire.com/?9qa37of7ihd1z
                                  
                                ---------------------------------------------------------
    9.Aph3x Stresser V2! Just Him Em Up! 
    [Image: 2ylsr4p.jpg]
    Changes
    Fixed some bugs.
    Made it more stable.
    Works faster.
    Should work with any ddos shell out there with no  problems.
    Added unlimited attack time ( 99999999999?
    yea,even more)
    Download Link: here
            
                              ---------------------------------------------------------
   10.SQL Injection TOOLs All IN One  Complete Pack
  
  
     SQL Injection TOOLs All IN One

->Black Out v1.0
->ExploitSQL_v2_0
->Google_URLs_Extractor
->Havij1.08
->Havij1.13 Pro edition
->Hybrid_V02_
->Hybrid_v.1.0
->jsky
->Lib
->Longcat
->obeseusvB
->Palector v1
->pangolin
->QuadNX_v.Qx2
->Sabre Flood
->SQL_Injection_Tool_v1
->SQLIHelper_V2.5
->SQLSmarthack
->tequiLAN_0.1_5
->WITOOL_V0.1_081231
->xdos
                Download Now 
                              
                                    ---------------------------------------------------------
 11.On Cracking Rampage OCR 1.14 Tool 
 [Image: tvocr.jpg]
  Download
  Cracking Rampage OCR
                    
                                      ---------------------------------------------------------


12.Here is a decent little cracker. It requires a proxy list but  gets good results. Enjoy

     [Image: y1XiOTx.png]
         
         DOWNLOAD NOW

                                    ---------------------------------------------------------
   13.SMTP SCANNER
    [Image: 45995_257x193.jpg]
   The powerful tool to your email marketing service. Use SMTP SCANER, you can find out 
     many workable SMTP servers in few hours or days. It is can check the SMTP server
     (Relay SMTP Server and Anonymous SMTP Server). It can use hundreds of threads/connections
      to search
   Click here To download

                                    ---------------------------------------------------------

  14. Exploit Scanner
   
    Here a Exploit Scanner very easy to use.
    Have fun and hack as many you could :dance:


    Click here to download

                                  ---------------------------------------------------------

15.WordPress Site Bruce Force 
[Image: 1ifXL]
Click here to download 
                                      ---------------------------------------------------------
16.Ez File Pumper
       A pumper makes a file bigger. (the size of the file) So if you have a virus, and its 2kb,                nobody will download it because its definitely not anything real, so if you make the
     file to say 2mb people wont think twice about it. So lets just say you made a virus,
      but the size is way to small and people will not download it because of the size. 
      So what do you need... The Ez File Pumper!!!!
    [Image: 2jfkr5k.jpg]
    Click Here To DOwnload

                                           ---------------------------------------------------------

  17.Source DecFlooder v1.00
     Features:
         Flooder:          

         DDos
         Email Bomber
         Chat Spammer
        
          Download Now
                                       ---------------------------------------------------------

 18.BLACK HOLE EXPLOIT KIT
      [Image: image_1.jpg]
     BlackHoleexploit kit is A type of crimeware Web application developed in Russia to 
       help hackers take advantage of unpatched exploits in order to hack computers via 
        malicious scripts planted on compromised websites.
        Download it NOw
                                      ---------------------------------------------------------

   19.GetSploits - search exploit-db.com database by  command line
        getsploits searches for specific exploits/shellcode/papers (using several search 
          options to narrow down the results) from exploit-db.com and prints descriptions 
           and links to found exploits/shellcode/papers and optionally writes links and 
          descriptions of found results to a file.
      Download it now
                            ---------------------------------------------------------

 20.Nmap - The most advanced scanner
      If you haven't tried nmap yet, you really should cause it's imho the best 
        You can get it off http://insecure.org/ , and of course it both works on
        windows and linux, thus you can get the source of it too if you want to.
       Download Now 
                                        ---------------------------------------------------------
21.Backtrack 
     
       The Most Commonly used Tool For hacking recomended by hackers give it a try
      Download Backtrack Now

                                       ---------------------------------------------------------

22.  Kali Linux
       
      Kali is a complete re-build of BackTrack Linux, adhering completely to Debian development                standards. All-new infrastructure has been put in place, all tools were reviewed and packaged,             and we use Git for our VCS.
    More than 300 penetration testing tools: After reviewing every tool that was included in                    BackTrack, we eliminated a great number of tools that either did not work or had other 
     tools available that provided similar functionality.
         Download Now

                                     ---------------------------------------------------------

  23.Netsparker PentestTool
     [Image: 1.png]
          This is a tool for Web Penetratition  more friendly "Vurnerable
       Scanner"   
        Friendly interface that makes you comfort to use
        Net sparker Community Version [free version]
        Click Here To Download
                                          ---------------------------------------------------------

 24.  Horny Monkey Deface Builder v1
        Horny Monkey Deface Builder is for create your defacement in HTML.
             Edited! Image links http://prntscr.com/x7pi4
                Download Now
                                        ---------------------------------------------------------

   25.     AIRCRACK
      Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover                  keys once enough data packets have been captured. It implements the standard FMS                attack along with some optimizations like KoreK attacks
         Click Here To Download

                                            ---------------------------------------------------------

  26. BarsWF

        BarsWF is the worlds fastest md5 bruteforcing password cracker, 
          just in case you didn't already know It combines using your 
          computers processor with you graphics cards GPU for computing 
          the largest amount of hashes as quickly as possible.

          Click here to download

                                                   ---------------------------------------------------------
  

  27.BLOODSHED IDE

               Bloodshed IDE is an Integrated Development Environment (IDE) for the C/C++ programming                      language.

              Download Now
                                       ---------------------------------------------------------

   28. NEMESIS
              Nemesis is a packet injector utility that is command line based and supports linux and windows
              Download Now

                                            ---------------------------------------------------------

    29. HPING
              Hping is a command-line TCP/IP assembler that supports TCP, ICMP, UDP and RAW-IP                         protocols also works on Unix systems, Windows, Sun and MacOS's.
             download link

                                   ---------------------------------------------------------

  30.  Metasploit:A hackers Real Friend
       [Image: lemjh.png]
       Metasploit Framework, a tool for developing and executing 
         exploit code against a remote target machine. Other important
         sub-projects include the Opcode Database, shellcode archive, 
        and security research.

        The Metasploit Project is also well known for anti-forensic and 
         evasions tools, some of which are built into the Metasploit 
          Framework.
         DOWNload Now

                                              ---------------------------------------------------------
      
 31.    LOIC/Hoic DDOS ATTACK TOOLs

         These are very strong ddos attack tools 

         Download LOIC

             DOWNLOAD HOIC

                                   
                      IF U HAVE ANY GOOD TOOL TO SHARE THEN COMMENT                           I'LL add it too      
                                    ---------------------------------------------------------


                               HOPE U LIKE MY TOols Comments will be                                     appreciated :) :) 
                    and like us on facebook 
      


                                ---------------------------------------------------------