Sei sulla pagina 1di 23

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/328891101

Facebook Hacking

Presentation · April 2017

CITATIONS READS

0 17,574

1 author:

Banaz Anwer Qader


Kirkuk University
6 PUBLICATIONS   9 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

data warehouse and data mining View project

All content following this page was uploaded by Banaz Anwer Qader on 12 November 2018.

The user has requested enhancement of the downloaded file.


 What is Hacking?
 Types of Hacking
 Types of Hackers
 History of Hacking
 Facebook Hacking
 Methods of Facebook Hacking
 Ways to Recover Hacked Facebook Account
 How to Protect Yourself ?
 Xploit Software As Example of FB Hacking
What is hacking?

It is a term refers to an array of activities which are done


to intrude some one else’s personal information space so as to
use it for malicious, unwanted purposes.
1. Ethical Hacking
 White –hat hacking , penetration testing
 With permission and authorized
 Doing by white-hat hacker that employed by accompany or
organization
 Legal
 Defensive and protective purposes

2. Malicious Hacking
 Black –hat hacking , criminal hacking
 Without permission and unauthorized
 Doing by black-hat hacker for stealing personal and important
information
 Illegal
 Malicious and destructive purposes
1 • Black Hat Hackers

2 • White Hat Hackers

3 • Gray Hat Hackers


 The first hackers appeared in the 1960's at the Massachusetts Institute of
Technology (MIT), and their first victims were electric trains.
 During the 1970's, appears phone hackers a different kind of hacker to hack
the telephonic system and make phone calls for free, like John Draper.
 By the 1980's, The BBS used by hackers specialized in tips on how to break
into computers, how to use stolen credit card numbers and share stolen
computer passwords.
 1986 that the US government realized the danger that hackers represented to
the national security, making computer breaking a crime across the nation.
 During the 1990's, internet hackers appears.
 Today, we are accustomed to hackers, crackers, viruses, Trojans, worms and
all of the techniques we need to follow to combat them.
Ian Murphy Kevin Mitnick Johan Helsinguis

Linus Torvalds Mark Abene Robert Morris


1- Reset the Password
• By knowing the email's victim, and without
knowing the password, all you have to do is choose
three friends to send a code to.

2- Use a keylogger software

• By installing this software in the victim's node for


recording all key strokes and send detailed report
to hacker.
keylogger software
3- phishing
By creating a fake login page, and It need:
 create a web hosting account and a fake login page.
 Have complete information about how to clone a website to make an
exact copy of the Facebook login page.
4- Stealing Cookies

• By using Firesheep which is a Firefox add-on that sniffs web traffic on an


open Wi-Fi connection. It collects the cookies and stores them in a tab on
the side of the browser.
• From there, the hacker can click on the saved cookies and access the
victim's account, as long as the victim is still logged in. Once the victim logs
out, it is impossible for the hacker to access the account.
It is where the password has been changed but your
Facebook account still have your associated email address
or mobile number.

Enter your see your profile


(email or with recovery email
Set your
mobile number or address Enter the
Forgot new password
and recovery code
Password? username or to continue. and get back to your
mobile number Facebook account
name) select one of them , then
in the textbox click ok
2. Password Changed & No Access to
Associated Email

 In this case hacker changed your Facebook password and


you lost or forgot password of your email resulting you
have no access to Facebook associated email.

 In this way, we use hacking method (reset a password) to


recovering our Facebook account
2. Password Changed & No Access to
Associated Email
Forgot Password option

Enter your email or mobile number or username or name in the textbox and click search.

Click “No longer have access to these?” at the bottom of the reset password dialog box.

Enter a new email address or phone that you know you can access and click Continue.

You will be directed to extended recovery options. It may vary for different Facebook accounts
1- security questions
2- trusted contacts

you'll see a URL.Click Reveal My Trusted Contacts and type the full name of one of your trusted contacCall your friends and
give them the URL so that they can open the link and give the security code to you.ts.

Use the security codes from your trusted contacts to access your account
3. Password & Associated Email Address
Changed
 Here the hacker changed your password as well as
your associated email address. This case is
somewhat hard to recover since the hacker blocked
a way to recover. We have two options in this case.
You should either have access to mobile number or
old email address.

 Recover using Mobile Number

4. Recover using Email Change Notification

 This method can be applied only if


you try in few days after your
account was hacked.
• 10 best anti-hacking software for Windows 10

1. Windows Defender Advanced 2. Anti-Hacker 7.0


Threat Protection.

3. Enhanced Mitigation Experience


4. Malwarebytes Anti-Malware
Toolkit
• 10 best anti-hacking software for Windows 10

5. McAfee Security Scan Plus 6. Spybot Search & Destroy –


free edition

7. HitmanPro 8. Trojan Remover


• 10 best anti-hacking software for Windows 10

9. SUPERAntiSpyware 10. Reason Core Security


View publication stats

Potrebbero piacerti anche