Skip to main content

Hacking Facebook using wireshark

Step 1:CYBERATOR

Download Following Tools and Scripts:

Cain and Abel(http://www.oxid.it/cain.html)
Wireshark (http://www.wireshark.org/download.html)
Mozilla Add-ons : GreaseMonkey (Search in Mozilla add-ons)
Cookie Injector Script (http://userscripts.org/scripts/source/119798.user.js)

Step 2:

Open Cain & Abel
Navigate to “Configure” menu and open configuration Dialog and check the configuration settings…


 Step 3:

 Click on (Start/Stop) Sniffing button.
 Clicktab.
 Click on button.


 Now, the following window will appear….


Now Click on OK button…..Scanning Starts

Step 4:

 Switch to tab listed below.
 Click on Button, a pop-up window will appear.

 Now Select the IP Address of the victim from the left panel of window and the Router IP in the right  panel…..as shown below:



Click OK button.

Step 5:

 Select the IP in the table.
 Click onbutton.



Step 6: On the Victim’s PC:

Start any Browser and open facebook.com (force Http)


   

Step 7: Now Back to Attacker’s Pc

 Open Wireshark
 Navigate to Capture>Interface (or press Ctrl+I)
 Select your active wireless adaptor

 

Step 8:

 Refresh victims Facebook page
 Open your Wireshark window, now you can see the flow of packets
 Type “http:cookie contains datr” in the filter box.
 Click on button.

  Search for “Generic.php” or “ai.php
 Right click on the particular packet then select “copy>bytes>Printable Text Only”.
 Right click on the particular packet then select “follow TCP Stream”.
 Open up your browser, open http://www.facebook.com.
 Press Alt+C (small wireshark cookie dump will appear).
 Paste the cookie that we copied earlier (Ctrl+v).
 Press OK.

Now reload the page….


We have the Session now…. :)

Comments

  1. this is rajasekar @ ramco institute of technology.
    please send me ur mail id sir---my mail id is "dhevasekar2@gmail.com"
    your way to facebook crack was so good....

    ReplyDelete

Post a Comment

Popular posts from this blog

SQLMAP - Using TOR proxy

Using SQLMAP with TOR OS: Windows 10 Compiler : Python 3.x Script : SQLMAP Proxy: TOR STEP 1: Download and install TOR  https://www.torproject.org/download/ STEP 2: Install TOR and Start TOR services After installing Tor, a new folder of Tor will be created (Desktop in my case) Navigate to the following location and start tor.exe Desktop\Tor Browser\Browser\TorBrowser\Tor STEP 3: Follow my previous post on SQLMAP to find a target Navigate to the SQLMAP folder in power shell. Execute the following commands- python .\sqlmap.py --tor --tor-type=SOCKS5 -u "https://www.fcibank.com.pk/index.php?route=common/page&pageid=%7B021A9F2C-951C-B9F7-D1B6-805BA07752DB%7D" --dbs STEP 4: Follow the same steps as in my previous post on SQLMAP to find Database names, Table names and dump the Tables. Just add the following option in it: .\sqlmap.py --tor --tor-type=SOCKS5 SQLMAP OPTIONS # Enumerate databases sqlmap --dbms=mysql -u " $URL " --dbs # Enumerate tables sqlmap --dbms=...

Android Hacking

Hacking Android using SPYNOTE Prerequisites: Android Device Windows 10 SpyNote Java  STEP 1: Download and Execute SpyNote (spynote.us is taken down by Department of Homeland Security) DOWNLOAD STEP 2: Provide the Port number and Java path if asked or leave everything as default.   STEP 3: Navigate to Tools menu and select Payload. Fill in the reverse IP and other app details. Here in this step you can configure the properties of the Payload If you plan to merge this payload with any legit application then browse that application here. STEP 4: Now click on build, it will trigger apktool and the apk will be created  . STEP 5:  Now copy the apk file to the android device using any medium like file sharing websites (mega.nz) STEP 6: Install the apk in the android device. You will get a session on the SPYNOTE interface. Right click on the session and explore multiple options. As you can see there are multiple options available now, in short the mobile device is in your co...

NMAP - NSE Scripts (Advanced)

Vulnerability scanning using NSE in Nmap.  Note: I have written this tutorial taking the fact into consideration that the user is well versed with basic NMAP commands. For basic NMAP commands please refer the cheat-sheet given below: Basic Scanning Techniques • Scan a single target :                                                                   nmap [target] • Scan multiple targets:                                                                nmap [target1,target2,etc] • Scan a list of targets                                               ...