15
HACKING

Hacking

Embed Size (px)

Citation preview

Page 1: Hacking

HACKING

Page 2: Hacking

METHODS TO HACK FACEBOOK

KEYLOGGER METHODPHISHINGBY WIRESHARK

Page 3: Hacking

PHISHING METHOD IN THIS METHOD WE CREATE A WEB

PAGE SIMILAR TO FACEBOOK PAGE AND UPLOAD THAT PAGE INTO OUR WEBSITE. THEN WE SEND THE LINK(URL) OF THE WEBSITE TO THE VICTIMS BY MEANS OF FACEBOOK OR GMAIL.

WHEN HE OR SHE CLICK ON THAT LINK OUR FACEBOOK PAGE OPENS AND ASK USERNAME AND PASSWORD TO LOGIN. WHEN HE OR SHE ENTERED THE INFORMATION HIS LOGIN ID AND PASSWORD SENT TO THE HACKER

Page 4: Hacking
Page 6: Hacking

What is keylogger ? A keylogger also know as keystroke

logger is a software or hardware device which monitors each and every key typed by you on your keyboard. You can not identify the presence of keylogger on your computer since it runs in background and also it is not listed in task manager or control panel. It can be used by parents to keep eye on their childrens or company owner to spy on their employes.

Page 7: Hacking

Types of keyloggers

There are two types of keylogger:-

 hardware keylogger 

software keylogger  

                                 

Page 8: Hacking

HARDWARE KEYSTROKER

Page 9: Hacking

SOFTWARE KEYLOGGERS

There are many keylogger free avaiable in internet

Some of the are :- Ardamax KeyloggerEmissary Keylogger etc.

Page 10: Hacking

STEP1 : Create Server for Hacking PasswordsFirst of all for hacking any facebook account password, we have to create our keylogger server that will run on victims PC and capture his keystrokes and mail us on the email account that we will use to build the keylogger. The keylogger server building process consists of several steps. 

Page 11: Hacking

Now open the Keylogger file. Here you will need gmail ID and password.

Page 12: Hacking

Bind the Keylogger server with any software

KEYLOGGER FILE CAN BE BIND WITH ANY SOFTWARE AND THEN SEND TO VICTIM.

EVEN VICTIM WHEN

Page 13: Hacking

How to Spread Keylogger or send it to victim or friendNow you have one Software setup file with keylogger

attached with it.(In our case we have Ccleaner setup with keylogger attached with it).

Now Spread your keylogger through forums. You might be a member of various forums use them to spread your keylogger in form of software posts. You can use various software's to spread them that users frequently download.

Spread it through pendrives or USB hard drives. Suppose a friend asked you for a software give it the software that has keylogger attached with it. 

Page 14: Hacking

How to protect yourself from these hacks?Prevention is always better than cure so always

follow these steps: Don't use cracked softwares and don't

download them from unauthorized websites. Always keep your antivirus and anti-spyware

up to date. Always scan the files before transferring

them to your USB. Do not allow other users to use your PC i.e

password protect it.

Page 15: Hacking

Never use your online banking from cyber cafe. If you want to use then you can try this method. open notepad and type anything Then copy and paste each word that comes in your username or password.

When you enter cyber cafe make sure that no hardware device is attached to keyboard wire.