05-22-2014, 02:53 PM
05-22-2014, 09:22 PM
use keyloger etc.....
05-22-2014, 11:46 PM
I wanna learn too pm me on forums
05-23-2014, 04:56 AM
This ain't 4chan - We are not your Personal Army - and while it's a BlackHat Forum, it's geared towards Digital Marketing - You want an actual hacking forum, but they're going to tell you the same thing I am about to say right now:
"Educational Use Only" Use this info at your own risk....
Only Ways to Hack Facbook
1. Phishing, either a fake email account that looks like its from FB, or a site/fb app, that redirects and tells the user they need to reenter their details
2. Bruteforcing the account - which considering the average password is about 8-19 characters, could take you more than a year.
3. Keylogger - they need to download something from you that logs their keyboard input, usually this is something run in the background
4. Remote Access/Tunneling - You basically either need to again have them install something, or you need to crack open their IP address to take over their computer.
5. Educated Guess Work - Some People still use names of bfs/gfs, husband/wife, date of birth, city born in, pet names, etc...
Remember - These are all considered to be cyber crimes, and if caught, you will be punished - typical hackers shield themselves behind multiple proxies, servers, and encryptions...
Look up those topics, and I'm sure you'll find what you're looking for, but I guarantee you, you will be mostly wasting your time - just let whatever it is go and do something else.
"Educational Use Only" Use this info at your own risk....
Only Ways to Hack Facbook
1. Phishing, either a fake email account that looks like its from FB, or a site/fb app, that redirects and tells the user they need to reenter their details
2. Bruteforcing the account - which considering the average password is about 8-19 characters, could take you more than a year.
3. Keylogger - they need to download something from you that logs their keyboard input, usually this is something run in the background
4. Remote Access/Tunneling - You basically either need to again have them install something, or you need to crack open their IP address to take over their computer.
5. Educated Guess Work - Some People still use names of bfs/gfs, husband/wife, date of birth, city born in, pet names, etc...
Remember - These are all considered to be cyber crimes, and if caught, you will be punished - typical hackers shield themselves behind multiple proxies, servers, and encryptions...
Look up those topics, and I'm sure you'll find what you're looking for, but I guarantee you, you will be mostly wasting your time - just let whatever it is go and do something else.