Hacking techniques used by hacker to hack facebook, google, twitter account

Here i am going to talk about some hacking techniques most commonly used by hacker to hack your facebook, gmail,twitter or any account on the internet you have. So that you could aware about these techniques and always alert whenever some one try to hack your account.



But if you are not aware about these powerful hacking techniques then you may be hacked by any hacker and become victim. So read all the techniques very carefully and double check your system or environment if you feel something bad then must take any action to prevent yourself to be hacked.
hacking-techniques

Hacking techniques used by hacker

1. Phishing

Phishing is the oldest and most commonly used hacking tricks, In this technique hacker creates replica website of most popular website like facebook, gmail, twitter, linked etc and host this duplicate website on any sever with sub domain like http://facebook.example.com and sent this link to victim with some attractive message, As soon as victim click on the link and try to login on facebook. Then victim’s username and password mailed to hacker’s email id or stored on hacker’s datababe. So always check URL on browser address bar after that use login and be safe.

2. Session Hijacking

Session Hijacking is also one of the dangerous hacking techniques if you are accessing any popular website on non secure (http://) connection. In this technique hacker hacks victim’s browser cookie which is used to authenticate user’s connection on the website and hacker use victim’s cookie to gain access their account. Session Hijacking most commonly used over LAN or wifi network. There is lot’s of session hijacking tools available on internet, Firesheep is one of the very popular package for session hijacking.

3. Keylogging

Keylogging is the easiest way to hack a users account password. Keylogging software is very dangerous even you have good knowledge about computer, In this technique hacker install Keylogging software on victim computer and Keylogging records all action and keystrokes taken by victim and all logs sent to hacker’s email id.

4. Mobile Phone Hacking

Todays every body using smartphone we installed apps of all the popular websites, And access their account via apps it makes things easier but some time it also dangerous if any how hacker gain access control of victim’s samrtphone, there is a tool called metaexploit which designed for penetration testing this tools have lot’s of payload for android phone using these payloads hacker can take control of victim’s smartphone and record victim’s action over phone. So don’t install unknown source of apps on your phone.


5. Password Stealer’s

Almost every body use stored passwords in their browser to access the their account. This is quite convenient, but can sometimes be extremely dangerous. Password Stealer’s are software’s specially designed to capture the saved passwords stored in the victims Internet browser. So try to avoid saving your password on browser.

6. USB Hacking

You may have listen about this technique, If attacker has privilege to access your computer, Then attacker stored some auto-run software in his/her pen drive and as soon as attacker insert usb drive in user’s computer, A password Stealer program automatically runs and user’s all saved password will be stored attacker’s usb drive.

7. DNS Spoofing

If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and attacker creates fake page of the website for example he/she change the original Facebook page to his own fake/duplicate page and When ever victim try to login on their facebook page via hacker’s fake page you may got hacked. This technique works over LAN and WiFi.

8. Social Engineering

Social Engineering is simple attack made by hacker, in this method hacker collect information about victim as much as he can from various methods. If victim has simple password like his birthday date, mobile number, school name, girlfriend name and pets name etc , A good hacker can easily judge your account password and may hack your account, So don’t share your all information to anyone and try to make your password more strong how much your password will strong hacker may not judge your password easily.

9. HTML Source Code hacking

If you have saved your account password on the browser and if attacker used your computer then he/she can view your saved password on the browser setting and also can view password by changing source code of the page using firebug or inspect element feature of the browser attacker can easily change <input type =”password”> into <input type =”text”> via html source code. See on image.
View-password-text

I hope you have been aware about basic hacking techniques used by hacker to hack your accounts.

If you like this post please don’t forget to subscribe my public notebook for more useful stuff