[Boost-bugs] [Boost C++ Libraries] #9922: How you're able to hack a face book account

Subject: [Boost-bugs] [Boost C++ Libraries] #9922: How you're able to hack a face book account
From: Boost C++ Libraries (noreply_at_[hidden])
Date: 2014-04-18 09:07:09


#9922: How you're able to hack a face book account
-------------------------------------------------+-------------------------
 Reporter: aileenomar@… | Owner: marshall
     Type: Feature Requests | Status: new
Milestone: To Be Determined | Component: array
  Version: Boost 1.34.0 | Severity:
 Keywords: hack facebook hack facebook hack | Optimization
  facebook |
-------------------------------------------------+-------------------------
 1. Phishing

 Phishing is still the most famous attack vector employed for hacking Face
 Book accounts. There are variety methods to carry out phishing assault. In
 a straightforward phishing attacks a hacker generates a fake log in page
 which exactly looks like the actual Facebook page and after that requests
 the casualty to log in. Once the casualty log in through the fake page
 the, the victims "E-Mail Address" and "Code Word" is saved directly into a
 document, and the hacker subsequently downloads the text file and gets his
 hands on the sufferers qualifications.
 Keylogging is the easiest means to hack a Fb password. Keylogging
 sometimes can be therefore dangerous that even a person with good
 familiarity with computers can fall for it. A Keylogger is essentially a
 modest program which, once is installed on victim's computer, will
 document every thing casualty types on his/her computer. The logs are then
 send back to the attacker by either FTP or straight to hackers email
 address.
 3. Stealer's

 Nearly 80% percent individuals use stored passwords within their browser
 to get the Face Book. This can be quite suitable, but can sometimes be
 incredibly dangerous. Stealer's are applications's specially-designed to
 capture the saved passwords kept in the casualties Internet browser.
 4. Session Hijacking

 Session Hijacking can be typically very dangerous if you should be getting
 Face Book on a http (non secure) connection. In Session Hi-Jacking
 assault, the sufferers browser cookie that's used to authenticate the
 consumer on a website, and use it to access the
 [http://browse.Deviantart.com/?qh=&section=&global=1&q=casualties+account
 casualties account] is stolen by a hacker. Session hi-jacking is popular
 on WiFi connections, and LAN.
 Sidejacking assault went common in late 2010, nevertheless it's still-
 popular now a days. Firesheep is broadly used to carry out sidejacking
 assaults. Firesheep just works when the attacker and sufferer is on the
 exact same WiFi network. A sidejacking attack is essentially another title
 for http session hi-jacking, but it is more targeted towards WiFi users.
 6. Mobile Phone Hacking

 1000000S of Facebook users access Facebook through their cellular phones.
 In circumstance the hacker can gain access to the victims mobile phone
 then he can probably gain access to their
 [http://Search.Usa.gov/search?query=FB+account FB account]. Their are a
 lots of Cellular Telephone Spying software's used to surveil a Phone. The
 most popular Mobile Phone Spying applications's are: Cellular Telephone
 Spy, and Secret Agent Phone Gold.
 If both the victim and attacker are on the same network, an attacker can
 use a DNS spoofing attack and change the original Facebook page to his own
 phony page and thus can get access to victims Facebook account.
 8. USB Hacking

 If an attacker has physical access to your own computer, he could merely
 add an USB programmed with a perform to mechanically extract saved
 passwords in the Internet browser.
 9. Man In the Middle Assaults

 If attacker and the casualty are on a
 [http://www.encyclopedia.com/searchresults.aspx?q=switch-based+network
 switch-based network] and on the exact same LAN, a hacker can place
 himself between the host and the client, or he could behave as a default
 gateway and thus gaining all the visitors in between.
 10. Botnets

 Botnets will not be normally used for hacking Face-Book accounts, because
 of it's high set up costs. They're used to take more advanced strikes. A
 Botnet is essentially a set of endangered computer. If you cherished this
 report and you would like to acquire extra info with regards to
 [http://www.hackfacebooknow.com/ facebook hack] kindly go to the web-page.
 The infection process is same as the essential logging, nevertheless a
 Botnet provides you with added options for carrying out attacks with the
 endangered computer. Some of typically the most popular Botnets contain
 Zeus and Spyeye.

-- 
Ticket URL: <https://svn.boost.org/trac/boost/ticket/9922>
Boost C++ Libraries <http://www.boost.org/>
Boost provides free peer-reviewed portable C++ source libraries.

This archive was generated by hypermail 2.1.7 : 2017-02-16 18:50:16 UTC