Hacking techniques used by hacker to hack facebook, google, twitter account

Here i am going to talk about some hacking techniques most commonly used by hacker to hack your facebook, gmail,twitter or any account on the internet you have. So that you could aware about these techniques and always alert whenever some one try to hack your account.



But if you are not aware about these powerful hacking techniques then you may be hacked by any hacker and become victim. So read all the techniques very carefully and double check your system or environment if you feel something bad then must take any action to prevent yourself to be hacked.
hacking-techniques

Hacking techniques used by hacker

1. Phishing

Phishing is the oldest and most commonly used hacking tricks, In this technique hacker creates replica website of most popular website like facebook, gmail, twitter, linked etc and host this duplicate website on any sever with sub domain like http://facebook.example.com and sent this link to victim with some attractive message, As soon as victim click on the link and try to login on facebook. Then victim’s username and password mailed to hacker’s email id or stored on hacker’s datababe. So always check URL on browser address bar after that use login and be safe.

2. Session Hijacking

Session Hijacking is also one of the dangerous hacking techniques if you are accessing any popular website on non secure (http://) connection. In this technique hacker hacks victim’s browser cookie which is used to authenticate user’s connection on the website and hacker use victim’s cookie to gain access their account. Session Hijacking most commonly used over LAN or wifi network. There is lot’s of session hijacking tools available on internet, Firesheep is one of the very popular package for session hijacking.

3. Keylogging

Keylogging is the easiest way to hack a users account password. Keylogging software is very dangerous even you have good knowledge about computer, In this technique hacker install Keylogging software on victim computer and Keylogging records all action and keystrokes taken by victim and all logs sent to hacker’s email id.

4. Mobile Phone Hacking

Todays every body using smartphone we installed apps of all the popular websites, And access their account via apps it makes things easier but some time it also dangerous if any how hacker gain access control of victim’s samrtphone, there is a tool called metaexploit which designed for penetration testing this tools have lot’s of payload for android phone using these payloads hacker can take control of victim’s smartphone and record victim’s action over phone. So don’t install unknown source of apps on your phone.





HostArmada Affordable Cloud SSD Shared Hosting