Ticker

6/recent/ticker-posts

Top 5 Methods To Access Any Social Media Account

Hello and welcome back friends we are come back with another excited explanation article in which we explain how bad guys or hackers gain access of victim social media account like Facebook, Instagram, GMail, etc. So let's explore things !

First of all we clear the main point as we all know popular social media websites like Facebook, Instagram, Gmail, etc are big companies and have their own team of cyber security experts so directly hacking someone's account from official websites is not possible. So the question is how bad guys or hackers access victim accounts ?



Let me explain it briefly. Bad guys or hackers access victim account by stealing password using different methods or attacks like Phishing Attack, MITM Attack, Backdoor or Spyware and one of the difficult "Bruteforce Attack". Different attack or method require different conditions.

Phishing Attack


It is the widely used attack for hacking different social media accounts of Facebook, Instagram, GMail, etc. In this attack hacker send or redirect victim to fake login page of target social media account which looks like as original login page of official website but when victim enter there details like Password, Credit Card, etc. then hacker retrieve it. We explained how to do it in Phishing Attacks article.

MITM Attack(Men In The Middle Attack)

This attack only possible when victim and hacker connected with same network like WiFi. By using network spoofing tools like Xerosploit for linux and Zanti for android. Hacker can redirect victim to phishing page, inject scripts, replace images, replace download file with trojans, etc and retrieve passwords and other important data or details.

Backdoor


Hacker install their payload or trojan in victim device by binding with another software, pdf file and even image file once victim open it in there device or system hack can access victim device without knowing victim. We explained it more in Exploitation articles.


Bruteforce Attack


It is used when victim have no any link with victim means not in any relation with victim and want to hack his/her account in this attack hacker collect information of victim(Information Gathering) as much as possible and make a wordlist of guesses passwords and also download passwords least leaked on darkweb and using some powerful tool which use one by one all passwords so this attack use lot of time it can be in minutes, hours or years. This technique is also known as password cracking. We described it more in Password Cracking articles.

I hop this information is helpful for you and i am able to clear your doubts and question if you still have any question or suggestion then feel free to comment below. Have a nice day.

[*] You can also follow us on Instagram and YouTube
[*] Our Github and Facebook Profiles.

Mohit Saran(Hacker's King)