Wednesday, May 29, 2013

how to hack facebook, gmail , twitter, yahoo accounts - the hackers approach

For the last twenty posts , i never talk  about applications of hacking concepts, just i am sharing the concepts like how the hackers attacking , What are the strategies used by them , What is the basic idea behind them. like phishing , keyloggers, rat softwares etc...

Now  i am going  to explain how these concepts used practically implemented on a desired target(victim).Consider  a contract has been received  by hacker . now lets see how he proceed to hack victims account.

step 1

He(hacker) is going to collect information about the victim with the help of email or password .this step also called as foot printing. To collect the information , he is using several search engines, social  networking sites.

for example , victims mail is xyz@abc.com. than by using  some advanced search operators like inurl, intext,inline etc. there is lot of operators like that

 in my case iam going to find the info by search like this    ."xyz@abc.com" , including double quotes.
than it will give info mostly . still ,if there is no information than he will move to facebook , where he may found profile information  , which gives full details of user (victim)  like his DOB, any other conct info, what he like mostly , what are his preferences etc..

still no info there several search engines  to gather info using email/ username/mobile number etc
i suggest you pipl.com. here he can find a lot of info.


step 2:


After collecting the information , his next step is to attack the victim. he choose an attack type based on the situation. At first  he goes for an awesome attack, which usually followed by all hackers is that password guessing.

types of attack :

Password guessing :

this is the first attack, every hacker used follow and this one as his first preference. With the help of gathered information about victim he is trying to guess  the password. Its an art only few hackers can succeed in it.
this type of attack is called social engineering.

soon i will be come up with full details .. with a post.stay tune
 

key loggers approach :

 This attack much easier, if hacker have access of the victim pc/lap . just he install the keyloggers on the pc .

 In previous  articles, i have shared every thing about it  check  the following two links.

RAT softwares.

Its a software attack  , which is similar to keyloggers but it is used if the hacker doesn't have any direct access of victims PC. This attack is also called as trojan horse attck.

In previous  articles ,i have shared every thing about it  check  the following  link.


Phishing :

its a simple methodology .but very dangerous attack. actually phishing is cyber crime crime.
In previous  articles, i have shared every thing about it  check  the following  links

introdution
http://wejusthack.blogspot.in/2012/02/wellif-your-new-to-hacking-world-this.html

attack style :
http://wejusthack.blogspot.in/2012/02/how-to-prepare-tools-for-phishing.html

how to save from this attack :

http://wejusthack.blogspot.in/2012/02/how-to-detect-fake-page.html

there is advanced attack, we can say it as modified phishing attack. for details click the following link.
http://wejusthack.blogspot.in/2013/01/tabnabbing-latest-version-of-phishing.html


virus attack :

in this attack , hacker wrote a virus program , he sent the program to the victim pc/lap. after taht it will automatically executed and catches the sensitive information of victim. all these collected info will send to the hackers adda.  

there are few more attacks .but these are very frequently used attacks.

note:(warning)

The articles in this blog are completely for education purpose only, In any manner this author /blog do not intent to encourage to do hacking over the network,In case any sense the issues caused by you, the author responsible for your work ,its your own risk  please have a kind sense and be ETHICAL