HOW TO CRACK A FACEBOOK PASSWORD AND 4 WAYS TO PROTECT YOURSELF FROM THEM

9:58:00 AM

Despite the security concerns that have plagued Facebook for years, most people are sticking around and new members keep on joining. This has led Facebook to break records numbers with over one billion monthly active users as of October 2012—and around 600 million active daily users.

We share our lives on Facebook. We share our birthdays and our anniversaries. We share our vacation plans and locations. We share the births of our sons and the deaths of our fathers. We share our most cherished moments and our most painful thoughts. We divulge every aspect of our lives.

But we sometimes forget who's watching.

We use Facebook as a tool to connect, but there are those people who use that connectivity for malicious purposes. We reveal what others can use against us. They know when we're not home and for how long we're gone. They know the answers to our security questions. People can practically steal our identities—and that's just with the visible information we purposely(?) give away through our public Facebook profile.

The scariest part is that as we get more comfortable with advances in technology, we actually become more susceptible to hacking. As if we haven't already done enough to aid hackers in their quest for our data by sharing publicly, those in the know can get into our emails and Facebook accounts to steal every other part of our lives that we intended to keep away from prying eyes.

In fact, you don't even have to be a professional hacker to get into someone's Facebook account.

It can be as easy as running Firesheep on your computer for a few minutes. In fact, Facebook actually allows people to get into someone else's Facebook account without knowing their password. All you have to do is choose three friends to send a code to. You type in the three codes, and voilà—you're into the account. It's as easy as that.

In this article I'll show you these, and a couple other ways that hackers (and even regular folks) can hack into someone's Facebook account. But don't worry, I'll also show you how to prevent it from happening to you.

Method 1: Reset the Password


The easiest way to "hack" into someone's Facebook is through resetting the password. This could be easier done by people who are friends with the person they're trying to hack.
The first step would be to get your friend's Facebook email login. If you don't already know it, try looking on their Facebook page in the Contact Info section.
Next, click on Forgotten your password? and type in the victim's email. Their account should come up. Click This is my account.
It will ask if you would like to reset the password via the victim's emails. This doesn't help, so press No longer have access to these?
It will now ask How can we reach you? Type in an email that you have that also isn't linked to any other Facebook account.
It will now ask you a question. If you're close friends with the victim, that's great. If you don't know too much about them, make an educated guess. If you figure it out, you can change the password. Now you have to wait 24 hours to login to their account.
If you don't figure out the question, you can click on Recover your account with help from friends. This allows you to choose between three and five friends.
It will send them passwords, which you may ask them for, and then type into the next page. You can either create three to five fake Facebook accounts and add your friend (especially if they just add anyone), or you can choose three to five close friends of yours that would be willing to give you the password.

How to Protect Yourself
Use an email address specifically for your Facebook and don't put that email address on your profile.
When choosing a security question and answer, make it difficult. Make it so that no one can figure it out by simply going through your Facebook. No pet names, no anniversaries—not even third grade teacher's names. It's as easy as looking through a yearbook.
Learn about recovering your account from friends. You can select the three friends you want the password sent to. That way you can protect yourself from a friend and other mutual friends ganging up on you to get into your account.

Method 2: Use a Keylogger


Software Keylogger

A software keylogger is a program that can record each stroke on the keyboard that the user makes, most often without their knowledge. The software has to be downloaded manually on the victim's computer. It will automatically start capturing keystrokes as soon as the computer is turned on and remain undetected in the background. The software can be programmed to send you a summary of all the keystrokes via email.

CNET has Free Keylogger, which as the title suggests, is free. If this isn't what you're looking for, you can search for other free keyloggers or pay for one.

Hardware Keylogger

These work the same way as the software keylogger, except that a USB drive with the software needs to be connected to the victim's computer. The USB drive will save a summary of the keystrokes, so it's as simple as plugging it to your own computer and extracting the data. You can look through Keelog for prices, but it's bit higher than buying the software since you have the buy the USB drive with the program already on it.

How to Protect Yourself
Use a firewall. Keyloggers usually send information through the internet, so a firewall will monitor your computer's online activity and sniff out anything suspicious.
Install a password manager. Keyloggers can't steal what you don't type. Password mangers automatically fill out important forms without you having to type anything in.
Update your software. Once a company knows of any exploits in their software, they work on an update. Stay behind and you could be susceptible.
Change passwords. If you still don't feel protected, you can change your password bi-weekly. It may seem drastic, but it renders any information a hacker stole useless.

Method 3: Phishing


This option is much more difficult than the rest, but it is also the most common method to hack someone's account. The most popular type of phishing involves creating a fake login page. The page can be sent via email to your victim and will look exactly like the Facebook login page. If the victim logs in, the information will be sent to you instead of to Facebook. This process is difficult because you will need to create a web hosting account and a fake login page.

If you want to know how to do this, follow the detailed instructions on Hacker9's website. Users are very careful now with logging into Facebook through other links, though, so that only adds to this already difficult process.

How to Protect Yourself
Don't click on links through email. If an email tells you to login to Facebook through a link, be wary. Check the URL. If you're still doubtful, go directly to the main website and login the way you always do.
Phishing isn't only done through email. It can be any link on any website. Even ads that pop up can be malicious. Don't click on any sketchy looking links that ask for your information.
Use an anti-virus like Norton or McAfee.

Method 4: Stealing Cookies


Cookies allow a website to store information on a user's hard drive and later retrieve it. These cookies contain important information that a hacker can sniff out and steal if they are on the same Wi-Fi network as the victim. They don't actually get the login passwords, but they can still access the victim's account.

Firesheep is a Firefox add-on that sniffs web traffic on an open Wi-Fi connection. It collects the cookies and stores them in a tab on the side of the browser.

From there, the hacker can click on the saved cookies and access the victim's account, as long as the victim is still logged in. Once the victim logs out, it is impossible for the hacker to access the account.

How to Protect Yourself
On Facebook, go to your Account Settings and check under Security. Make sure Secure Browsing is enabled. Firesheep can't sniff out cookies on HTTPS, so try to steer away from HTTP.
Full time SSL. Use Firefox add-ons such as HTTPS-Everywhere or Force-TLS.
Log off a website when you're done. Firesheep can't stay logged in to your account if you log off.
Use only trustworthy Wi-Fi networks. A hacker can be sitting across from you at Starbucks and looking through your email without you knowing it.
Use a VPN. These protect against any sidejacking no matter what website you're on.
Protecting Yourself: Less Is More

Social networking websites are great ways to stay connected with old friends and meet new people. Creating an event, sending a birthday greeting and telling your parents you love them are all a couple of clicks away.

Facebook isn't something you should steer away from, but you do need to be aware of your surroundings and make smart decisions about what you put up on your profile. The less information you give out on Facebook for everyone to see, the more difficult you make it for hackers.
Article Courtesy of Nelson Aguilar
Images by Digital Trends, Avitricks, eSecurity Planet, Phishing1122, Tech-Glide

Disclaimer: An author of this article is BrainBongo's contributor and the views/values expressed here do not necessarily reflect ours (Team BrainBongo).

You Might Also Like

12 comments

  1. How to keep your Facebook account safe from getting blocked?
    Click on the Link To Read : http://askmebuddy.in/keep-facebook-account-safe-getting-blocked/

    ReplyDelete
  2. I love it when folks get together and share opinions.
    Great site, stick with it!

    Also visit my web-site :: click here to investigate

    ReplyDelete
  3. Hi there! I just would like to offer you a huge thumbs up for
    the excellent info you've got right here on this post. I am
    returning to your blog for more soon.

    Here is my site :: Make Money

    ReplyDelete
  4. At this moment I am ready to do my breakfast, later than having my breakfast coming yet
    again to read further news.

    my homepage; uncle buck

    ReplyDelete
  5. Thank you, I've recently been searching for info approximately
    this topic for a while and yours is the best I have discovered so far.
    But, what in regards to the bottom line? Are you sure concerning the supply?


    My website: uncle buck

    ReplyDelete
  6. I am sure this article has touched all the internet visitors, its really really pleasant paragraph
    on building up new website.

    Feel free to visit my page; uncle buck

    ReplyDelete
  7. Hi! Do you use Twitter? I'd like to follow you if that
    would be ok. I'm undoubtedly enjoying your blog and look forward
    to new updates.

    Also visit my page: uncle buck (Iamnosy.com)

    ReplyDelete
  8. Thanks very interesting blog!

    Feel free to visit my web-site :: web site ()

    ReplyDelete
  9. You do not be a matter communicate in the elite media shopping if
    it seems corresponding it was stock for women and men to bear thing that is dry clear exclusively or give process only, you strength get coupons or allowance
    codes. in front you buy but in NFL Cheap Jerseys Jersyes China Wholesale Jerseys Cheap Jerseys Jerseys China World Cup Jerseys Jerseys China Wholesale NFL Jerseys China Jerseys World Cup Jerseys 2014 Cheap NFL Jerseys Cheap NFL Jerseys World Cup Jerseys 2014 China Jerseys Cheap NFL Jerseys
    Cheap China Jerseys Jersyes China Cheap NBA Jerseys Wholesale Jerseys Cheap Jerseys From China Wholesale Jerseys NBA Cheap Jerseys NBA Cheap Jerseys
    Cheap China Jerseys
    Jerseys China Online you've got enceinte videos is to locality the icebound drinkable ice cubes out of pocket.
    You can knowingness peachy virtually your stigma. Add
    a argonon-multicoloured region to ameliorate your ikon through vogue.
    When choosing a bit of jewelry that is really valuable!Getting The
    near Out Of Online buying Whether

    Here is my blog; Cheap Jerseys

    ReplyDelete
  10. The rewards of possessing your personal Minecraft server are: control of
    who logs in (good for parents), private on-line room for your kid and their buddies, ultimate control of hacking of
    products (the little ones like that) and even economic achieve by means of permissions of plugins.


    Visit my website ... download minecraft ps3

    ReplyDelete
  11. Important deliberations are a track record of calling back clients (existing or potential), working with you to find the best possible medical care and working with you at the end of the case to make definite that your decision is correct. Having an attorney who restricts your settlement to enhance his practice's bottom line on the case is merely not fair.
    Car Accident Lawyer

    ReplyDelete

If you like this post be sure to leave a comment and share with your friends.It will make my day....

About The Author

My photo

Am a young Tanzanian photographer, technology enthusiast with a long time passion for photography, film and advertising.

I also love to write about different subjects including photography, entrepreneurship, technology and personal development because these are the things that I am passionate about and literally sums up my life. 

Holla at Me

Name

Email *

Message *