Step By Step Facebook Account Hacking Using Kali Linux 100% Working
What is Linux Hacking Tools & Social Engineering Attack?
Social Engineering Attacks (from the hacking perspective) is quite similar to performing a magic show. The difference is, in Social Engineering Attacks, its a magic trick where the result is a banking account, social media, email, even access to a target computer. Who created the system? A HUMAN. Doing Social Engineering Attack is easy, trust me, it is really easy. No system is safe. Humans are the best resource and the end-point of security vulnerabilities ever.
Facebook is far from unhackable, but to do so, you will need some skills
If you have skill, luck, and knowledge of social engineering, you can get Facebook account credentials.
For this facebook hacking trick, you must have knowledge in kali linux as wll as basic understanding of “Networking”.
So here is steps, by using this you can probably gain access to someone’s Facebook credentials very easily with this little trick.
Step 1 :
Install Kali linux
To install kali linux you need to download it from kali linux site, then make a bootable pendrive/DVD. You can dual boot this with your windows or mac OS.
Within Kali, there is an app called the Browser Exploitation Framework (BeEF). It is capable of helping you hack the victim’s browser and take control of it. Once you have control of their browser, there are so many things you can do. One of them is to trick the user into giving away their Facebook credentials, which I’ll show you here.
Step 2 :
Fire up Kali, and you should be greeted with a screen like below. You start up BeEF by clicking on the cow icon to the left of the Kali desktop.
When you click on it, it starts BeEF by opening a terminal.
BeEF is an application that runs in the background on a web server on your system that you access from a browser. Once BeEF is up and running, open your IceWeasel browser to access its interface. You can login to BeEF by using the username beef and the password beef.
You will then by greeted by BeEF’s Getting “Started” screen.
Step 3 :
Attack On Victim’s Browser
The simplest way is to simply embed the code into your website and entice the user to click on it. This might be done by such text as “Click here for more information” or “Click here to see the video.” Use your imagination or you can use simply phishing methods.
The script looks something like below. Embed it into a webpage, and when someone clicks on it, you own their browser.
Step 4 :
Send a Dialog Box to the User
When you have hooked the victim’s browser, its IP address, along with the operating system and browser type icons, will appear in the “Hooked Browsers” panel on the left. Here, I have simply used my own browser to demonstrate.
If we click on the hooked browser, it opens a BeEF interface on the right side. Notice that it gives us the details of the browser initially. It also provides us with a number of tabs. For our purposes here, we are interested in the “Commands” tab.
Click on the “Commands” tab, then scroll down the “Modules Tree” until you come to “Social Engineering“ and click to expand it. It will display numerous social engineering modules. Click on “Pretty Theft,” which will open a “Module Results History” and “Pretty Theft” window.
This module enables you to send a pop-up window in the user’s browser. In our case, we will be using the Facebook dialog box.
If we click on the “Dialog Type“ box, we can see that this module can not only create a Facebook dialog box, but also a LinkedIn, Windows, YouTube, Yammer, and a generic dialog box. Select the Facebook dialog type,then click on the “Execute” button the the bottom.
Step 5 :
The Dialog Box Appears on the Target System
When you click “Execute” in BeEF, a dialog box will appear in the victim’s browser like that below. It tells the victim that their Facebook session has expired and they need to re-enter their credentials.
Although you may be suspicious of such a pop-up box, most users will trust that their Facebook session expired and will simply enter their email and password in.
Step 6 :
Harvest the Credentials
Back on our system in the BeEf interface, we can see that the credentials appear in the “Command results” window. The victim has entered their email address “email@example.com” and their password “sweetbippy” and they have been captured and presented to you in BeEF.
- Flipkart Interview Experience | On-Campus 2021
- Python Program To Add Two Numbers