What is Hacking?
Types of Hacking
Types of Hackers
History of Hacking
Facebook Hacking
Methods of Facebook Hacking
Ways to Recover Hacked Facebook Account
How to Protect Yourself ?
Xploit Software As Example of FB Hacking
What is hacking?
It is a term refers to an array of activities which are done
to intrude some one else’s personal information space so as to
use it for malicious, unwanted purposes.
1. Ethical Hacking
White –hat hacking , penetration testing
With permission and authorized
Doing by white-hat hacker that employed by accompany or
organization
Legal
Defensive and protective purposes
2. Malicious Hacking
Black –hat hacking , criminal hacking
Without permission and unauthorized
Doing by black-hat hacker for stealing personal and important
information
Illegal
Malicious and destructive purposes
1 • Black Hat Hackers
2 • White Hat Hackers
3 • Gray Hat Hackers
The first hackers appeared in the 1960's at the Massachusetts Institute of
Technology (MIT), and their first victims were electric trains.
During the 1970's, appears phone hackers a different kind of hacker to hack
the telephonic system and make phone calls for free, like John Draper.
By the 1980's, The BBS used by hackers specialized in tips on how to break
into computers, how to use stolen credit card numbers and share stolen
computer passwords.
1986 that the US government realized the danger that hackers represented to
the national security, making computer breaking a crime across the nation.
During the 1990's, internet hackers appears.
Today, we are accustomed to hackers, crackers, viruses, Trojans, worms and
all of the techniques we need to follow to combat them.
Ian Murphy Kevin Mitnick Johan Helsinguis
Linus Torvalds Mark Abene Robert Morris
1- Reset the Password
• By knowing the email's victim, and without
knowing the password, all you have to do is choose
three friends to send a code to.
2- Use a keylogger software
• By installing this software in the victim's node for
recording all key strokes and send detailed report
to hacker.
keylogger software
3- phishing
By creating a fake login page, and It need:
create a web hosting account and a fake login page.
Have complete information about how to clone a website to make an
exact copy of the Facebook login page.
4- Stealing Cookies
• By using Firesheep which is a Firefox add-on that sniffs web traffic on an
open Wi-Fi connection. It collects the cookies and stores them in a tab on
the side of the browser.
• From there, the hacker can click on the saved cookies and access the
victim's account, as long as the victim is still logged in. Once the victim logs
out, it is impossible for the hacker to access the account.
It is where the password has been changed but your
Facebook account still have your associated email address
or mobile number.
Enter your see your profile
(email or with recovery email
Set your
mobile number or address Enter the
Forgot new password
and recovery code
Password? username or to continue. and get back to your
mobile number Facebook account
name) select one of them , then
in the textbox click ok
2. Password Changed & No Access to
Associated Email
In this case hacker changed your Facebook password and
you lost or forgot password of your email resulting you
have no access to Facebook associated email.
In this way, we use hacking method (reset a password) to
recovering our Facebook account
2. Password Changed & No Access to
Associated Email
Forgot Password option
Enter your email or mobile number or username or name in the textbox and click search.
Click “No longer have access to these?” at the bottom of the reset password dialog box.
Enter a new email address or phone that you know you can access and click Continue.
You will be directed to extended recovery options. It may vary for different Facebook accounts
1- security questions
2- trusted contacts
you'll see a URL.Click Reveal My Trusted Contacts and type the full name of one of your trusted contacCall your friends and
give them the URL so that they can open the link and give the security code to you.ts.
Use the security codes from your trusted contacts to access your account
3. Password & Associated Email Address
Changed
Here the hacker changed your password as well as
your associated email address. This case is
somewhat hard to recover since the hacker blocked
a way to recover. We have two options in this case.
You should either have access to mobile number or
old email address.
Recover using Mobile Number
4. Recover using Email Change Notification
This method can be applied only if
you try in few days after your
account was hacked.
• 10 best anti-hacking software for Windows 10
1. Windows Defender Advanced 2. Anti-Hacker 7.0
Threat Protection.
3. Enhanced Mitigation Experience
4. Malwarebytes Anti-Malware
Toolkit
• 10 best anti-hacking software for Windows 10
5. McAfee Security Scan Plus 6. Spybot Search & Destroy –
free edition
7. HitmanPro 8. Trojan Remover
• 10 best anti-hacking software for Windows 10
9. SUPERAntiSpyware 10. Reason Core Security