- Stealing Cookies
If you watched the video that I posted above, you undestand how Facebook works by storing cookies on your computer.
You can also steal cookies through a different form, such as this explained on this tutorial.
How to steal cookies (Easy)!
The “cookie” is basically the piece of file that maintains the records that you have done on your account. If you get access to these cookies, you can log in as whoever you want.
- Footprinting your victim
What is Footprinting?
Basically it’s collecting information about your target’s computer and themselves.
Personally, I like to open a text editor and save any information I can find about them so I do not forget about it if I need use of it in the future.
To put it in the most simplistic language, it’s stalking your victim for information that you can use in order to gain access.
Information such as Age, Date of Birth, Place of Birth, Parents names, Sibling names, family names, pet names, e-mail are the most common information that you can possible acquire.
Websites such as:
Make it extremely easy to search names, e-mails, etc to dig information about whoever you want. There are more websites in which I personally use to dig information about people, but I will not mention them since I do not want the news station going crazy on a new rage of identity exposers.
Again, I have written tutorials on this subject on how to protect your identity online.
The tutorial itself can be used to test the information of others as well without their acknowledgement.
All the information that you are able to collect, save it on a text editor such as notepad and save the information.
Do you have the IP of the target?
You can dig more information with the IP adddress. Information that can be very useful, incase if you want to blackmail.
I covered all the things that you can do with an IP to collect more information regarding your target.
- How you have to think
This is the classic part of every hacking process.
Any time you want to hack anything, you need the following things:
- You need a plan
- You need a strategy
- You need executions
- You need results
- You need to clean up all the evidence
You need to know how to do Social Engineering like a hacker would. Social engineering itself takes lots of clear thinking and noticing every single detail to the point of perfection.
I posted an E-book on the subject if you want to learn like a professional.
The Art Of Human Hacking
You can’t simply lie to someone’s face online or offline because people aren’t exactly stupid.
You have to think exactly what you want to say and how to say it.
You need to know what your target likes, what your target is likely to fall gullible for, what your target dislikes, what your target wants, what your target hates or love, etc…
The other most common form is creating a bogus fake profile and adding them through Facebook by posing as an attractive female or male, depending on what gender they are and their sexuality.
- Spoofing e-mails to the victim (Use direct URL or Phisher)
Tut on spoofing
This is another form of attack that you can take to fool your target into believing that you are Facebook staff.
Using spoofed e-mails, you can send an e-mail as whoever you want.
Get your self a webhosting and upload the file to use it.
You can use that particular Spoofer that I use. It’s someone’s scripting, but I edit it slightly so it doesn’t go into spam.
You can send them an e-mail such as this:
Your account has had multiple login attempts from Sandusky, Ohio, and we want to verify that your account is safe.
We will need to verify through a few questions.
What is your D.O.B?
What is your confirmation phone number?
What is your current password?
What passwords have you recently changed?
Thank you for your cooperation.
Again, the spoofed e-mail is using Social Engineering to fool the target. You can customize your fake e-mail message however you want.
I can sell you a Facebook phisher for $10, send me a PM if anyone is interested.
That is what you will get for $10, so you can just send them a fake URL using http://dot.tk
Basically, you will see free hosting from SPAM and then shorten your URL using http://dot.tk
To anything you want like, for example:
You will receive logs like these.6) Slightly re-touch RATs, keyloggers, Phishers because I have already explained in dept on my other tutorial. (On other forums (deepweb i will be posting more here soon)
If you want a keylogger, you can contact me or use google!
I personally recommend this really good keylogger if you want to spend a bit of extra money with assistance included.
Buy now, the best keylogger and RAT in the market for a good price with a lot help included!
I see the same question all the time, Which is the best/favorite RAT?
-Based on my personal experience, I can say that DarkComet and Cybergate are the best for RATs being free.
I will not go into teaching you how to set those up because there are already a ton of tutorials on how to do that.
Can’t go into the conversations of Phishers since it’s against the rules. If you want to buy the one I offer, send me a PM.
I want to say that you should definitely without a doubt read my other threads if you want to make any progress taking over any account. I consider this tutorial alone rather vague simply because I have already explained in more details on the other threads. Be sure to scroll up at the very top for the links.