This Hacker Can Hack Any Facebook Account !


Here is a big issue arises on the internet to hack any Facebook account. That is really hard to find a way to hack someone’s Facebook account by which hacker can see all conversations, post anything as well as any payment card details and hacker have the power to do anything with that account. 

But recently here is a ‘simple vulnerability’ found on Facebook that will give us the power to access any Facebook account of any user even it could be done without any user interaction. Which you can hack any Facebook account by setting a new password and can see all messages, personal photos as well as his/her details of under credit/debit cards stored etc. 

This vulnerability is found by bug hunter Anand Prakash from India who has discovered a Password Reset Vulnerability in Facebook. Facebook acknowledged this issue and fixed it and also rewarded by $15,000 USD considering the impact of this vulnerability. 

HOW IT WORKS :

This is a simple but also critical vulnerability that will give an endless opportunities to reset any account’s password. 

As you know that whenever we forget our password of our Facebook account then we have the option to reset the password by entering our phone number or email address on Facebook. And then Facebook send a 6 digit code on our phone number or email address by which we can set our new password. 

And for ensuring the genuinely of the user, Facebook gave the chance to the account holder for trying a dozen codes before the account confirmation code is blocked due to the blocking process of brute force that has only limited chance to attempts the code. 

The Security researcher describes in his blog post that, the Facebook had not implemented the rate-limiting in its process of  password reset on the beta sites such as beta.facebook.com & mbasic.beta.facebook.com.

He tried to brute force the 6-digit code on the beta pages of Facebook. There is a window of ‘Forgot Password’ and found that there is no limitation for attempting that number of codes on that beta pages.

POC Video:


Here’s a proof-of-concept(POC) video demonstration by Anand Prakash which shows that how the attack works.

VULNERABLE REQUEST:

POST /recover/as/code/ HTTP/1.1 Host: beta.facebook.com
lsd=AVoywo13&n=XXXXX
Brute forcing the "n" successfully allowed me to set a new password for any Facebook user.
Anand discovered this simple as well as critical vulnerability in February and then he reported it to Facebook on February 22. Then the social network giant immediately fixed this issue and had rewarded him by $15,000 USD for considering the rigorousness and impact of the vulnerability.
3

Tools: Hh_server

The Hack server works behind the scenes to keep your codebase in constant sync for the hh_client typechecker. However, the serverhh_server can also be used for some primary standalone functionality as well.
If you want to see all the options available to hh_server, see the help via hh_server --help.

Check and Exit

If you want to typecheck a file or a directory of files without the overhead of a constant server running combined with hh_client, you can do a quick and dirty check with hh_server.
hh_server --check <path> 
Like with running hh_client, you must ensure that the root of your path has an empty .hhconfig file.
Specify a dot . to represent checking the current path.

Automatic Type Annotations

hh_server provides a mode where you can take a Hack file or project of Hack files and automatically add type annotations to those files.
NOTE: This only works on <?hh files.
hh_server --convert <path to files to convert> <path to top level of project>
Many times the two paths are the same. However, this does give you the flexibility of converting only a subset of a project. Normally, the path to the top level of the project has the .hhconfig.
This process annotates with soft type hints via @. This is because the annotation is far from perfect and we would rather have warnings thrown rather than fatal at runtime.
For example, the following unannotated Hack file:
<?hh

function foo($x) {
  if ($x + 3 < 10) {
    return false;
  }
  return true;
}

function bar($y) {
  if ($y) {
    return "Hi";
  }
  return null;
}
might be converted to:
<?hh

function foo($x): @bool {
  if ($x + 3 < 10) {
    return false;
  }
  return true;
}

function bar($y): @?string {
  if ($y) {
    return "Hi";
  }
  return null;
}
1
With having more than 200 million active users, WhatsApp is really one most amazing and effective cross platform messenger today. In addition to Live Chat, WhatsApp is coming with several mesmerizing features such as sharing multimedia files and other data with which this application is pulling a large number of Smartphone users. In fact, it has more users than Facebook and Twitter, according to a recent survey. Apart from doing some well-known and most sought-after tasks, there are some other tactics you can try in WhatsApp but you may not know.
Whatsapp-tricks-and-tips

Untold WhatsApp Tricks
1.    Last Seen Timestamp can be hidden: Majority of Smartphone users don’t like to see ‘Last Seen Timestamp’ on their timeline. Though iOS users can hide timestamp on their Apple devices by going through advanced settings, this feature was not available in Android phones till today. Now you can hide these notifications in your Android phone.
Full details can be found HERE
2.    Auto Image Download Can Be Disabled: Sharing files seems very amazing these days. But images are automatically downloaded in your device from the latest version of WhatsApp even if you don’t want. And it doesn’t have any option to disable it. Due to this reason, data of large amount can be consumed. Now a hack is available with which you can disable the auto image download in new WhatsApp version.
Full details can be found HERE
3.    Spy on WhatsApp Account of Someone Else: Even though WhatsApp is very much secured messenger app but it still has a little loophole which lets you spy on WhatsApp account of your friend directly from your own phone. Each WhatsApp account has given a separate Media Access Control (MAC) address. If any of your friends change their device their MAC address will also be changed. Hence, they will be prompted to verify their account again in WhatsApp. It means one cannot use two or more devices to access single WhatsApp messaging account. But there are still some amazing ways to access WhatsApp account of your friends and have a close look on what they are doing.
Full details can be found HERE
4.    Create Fake Conversation on WhatsApp: Have you ever imagined you can create fake conversation on WhatsApp that never made? So, sit back and relax and think to come out with your naughty side. You can make your own conversations in WhatsApp and prank all your buddies by sharing it to them and check out how they react by seeing it.
Full details can be found HERE
5.    Sharing APK, PDF and ZIP Files: More often than not, all of us get stick in some circumstances where we are required to share ZIP, APK or PDF files on this messenger. Later on, you realize that you don’t have provision in this application for sharing such types of files. Don’t worry! You can share them with some tactics.
Full details can be found HERE
6.    Extend Free Subscription for up to 2022: Whether you are using Blackberry, Android, Windows, or Symbian, you can use WhatsApp only for one year. Afterwards, you can use this application by paying $0.99. But you can extend the period easily and quickly.

3
Writing and using free software is not just a type of programming, it is a kind of philosophy. While knowing a programming language is all you need to program, this article is about how to join the community, get friends, do great work together, and become a respected specialist with a profile you cannot get anywhere else. In the world of free software you may rather easily get tasks that in a company only the elite, top-level programmers are allowed to do.

Think about the amount of experience this can bring. However, if you once decided to become a free software hacker, you must be ready to invest some time into achieving this goal. This remains true even if you are an IT student already. Also, this article is not about how to become a cracker.

STEPS
  1. Image titled Become a Free Software Hacker Step 1
    1
    Get a good Unix distribution. GNU/Linux is one of the most popular for hacking, but GNU Hurd, BSD, Solaris and (to some extent) Mac OS X are often used.
  2. Image titled Become a Free Software Hacker Step 2
    2
    Learn how to use the command line. You can do much more with Unix-like operating systems if you use the command line.
  3. Image titled Become a Free Software Hacker Step 3
    3
    Learn some popular programming language until you reach a more or less satisfactory level. Without this, you cannot contribute code (the most important part of any software project) to the free software community. Some sources suggest to begin at once with two languages: one system language (C, Java or similar) and one scripting language (Python, Ruby, Perl or similar).
  4. Image titled Become a Free Software Hacker Step 4
    4
    To be more productive, learn NetBeans or some other similar integrated development tool.
  5. Image titled Become a Free Software Hacker Step 5
    5
    Learn and use advanced editor like vi or Emacs. They have a higher learning curve, but you can do much more with them.
  6. Image titled Become a Free Software Hacker Step 6
    6
    Learn version control. Version control is likely the most important cooperation tool for shared software development. Understand how to create and apply patches (text difference files). Most free software development in the community is done creating, discussing and applying various patches.
  7. Image titled Become a Free Software Hacker Step 7
    7
    Find a suitable small free software project which you could easily join to get experience. Most of such projects now can be found on SourceForge.net. The suitable project must:
    1. Use the programming language you know.
    2. Be active, with recent releases.
    3. Already have three to five developers.
    4. Use version control.
    5. Have some part you think you can immediately start implementing without modifying the existing code too much.
    6. Apart from the code, a good project also has active discussion lists, bug reports, receives and implements requests for enhancement and shows other similar activities.
  8. Image titled Become a Free Software Hacker Step 8
    8
    Contact the administrator of the selected project. In a small project with few developers your help will usually be immediately accepted.
  9. Image titled Become a Free Software Hacker Step 9
    9
    Carefully read the rules of the project and more or less follow them. The rules of the coding style or necessity to document your changes in a separate text file may first appear ridiculous to you. However, the purpose of these rules is to make the shared work possible - and the most projects do have them.
  10. Image titled Become a Free Software Hacker Step 10
    10
    Work in this project for several months. Listen carefully to what the administrator and other project members say. Apart programming, you have a lot of things to learn. But if you really do not like something, just go away to another project.
  11. Image titled Become a Free Software Hacker Step 11
    11
    Do not stick with the underground project for too long. As soon as you find yourself successfully working in that team, it is time to look for the serious one.
  12. Image titled Become a Free Software Hacker Step 12
    12
    Find a serious, high level free software or open source project. Most such projects are owned by GNU or Apache organizations.
  13. Image titled Become a Free Software Hacker Step 13
    13
    As we are doing a serious jump now, be ready for the far cooler acceptance.You will likely be asked to work for some time without direct write access to the code repository. The previous underground project should, however, have taught you a lot - so after several months of the productive contribution you can try to demand rights you think you should have.
  14. Image titled Become a Free Software Hacker Step 14
    14
    Take and do a serious task. It is time. Do not be afraid. Go on even after you discover that the task is lots more difficult than you initially thought - in this step it is important not to give up.
  15. Image titled Become a Free Software Hacker Step 15
    15
    If you can, apply with your serious task to the Google's "Summer of Code" to get some money from this adventure. But just do not care if the application is not accepted as they have far fewer funded positions than really good hackers.
  16. Image titled Become a Free Software Hacker Step 16
    16
    Look for a suitable conference happening nearby ("Linux days" or something similar) and try to present your project there (all project, not just the part you are programming). After you tell you are representing a serious free / open source project, the organizers frequently release you from the conference fee (if they do not, the conference is likely unsuitable anyway). Bring your Linux laptop (if you have one) and run demos. Ask the project administrator for the material you may use when preparing your talk or poster.
  17. Image titled Become a Free Software Hacker Step 17
    17
    Search the web for announcements about an install party happening nearby and try to join it first time as a user (watch for all problems and how hackers solve them) and next time as an installer.
  18. Image titled Become a Free Software Hacker Step 18
    18
    Complete the task, cover with automatic tests and contribute to the project.You are done! To be sure, try to meet some hackers of the project physically and have a glass of beer.
  19. Image titled Become a Free Software Hacker Step 19
    19
  20. Image titled Become a Free Software Hacker Step 20
    20
    For better understanding, look into a real example of the development history for a free software project (above). Each raising curve represents a contribution (lines of code) from a single developer. Developers tend to become less active over years, but the project frequently even accelerates as new people join. Hence if you already come with some useful skills, there are no reasons why the team would not invite you.
3


In computer security, a hacker is someone who focuses on security mechanisms of computer and network systems. There is a community and shared culture of expert programmers and networking wizards that traces its history back through decades to the first time-sharing minicomputers and the earliest ARPAnet experiments. The members of this culture were the first "hackers." Breaking into computers and breaking phone systems have come to symbolize hacking in popular culture, but hacking culture is much more complex and moralistic than most people know. Learn basic hacking techniques, how to think like a hacker, and how to gain respect in order to crack your way into the complex world of hacking.

Part1
Fundamentals

  1. Image titled Become a Hacker Step 4


    1. 1
      Run Unix. Unix is the operating system of the Internet. While you can learn to use the Internet without knowing Unix, you can't be an Internet hacker without understanding Unix. For this reason, the hacker culture today is pretty strongly Unix-centered. A Unix like Linux can run alongside Microsoft Windows on the same machine. Download Linux online or find a local Linux user group to help you with installation.[1]
      • A good way to dip your toes in the water is to boot up what Linux fans call a live CD, a distribution that runs entirely off a CD without having to modify your hard disk. This is a way to get a look at the possibilities without having to do anything drastic.
      • There are other operating systems besides Unix, but they're distributed in binary — you can't read the code, and you can't modify it. Trying to learn to hack on a Microsoft Windows machine or under any other closed-source system is like trying to learn to dance while wearing a body cast.
      • Under Mac OS X it's possible to run Linux, but only part of the system is open source — you're likely to hit a lot of walls, and you have to be careful not to develop the bad habit of depending on Apple's proprietary code.
    2. Image titled Become a Hacker Step 5
      2
      Write HTML. If you don't know how to program, learning basic HyperText Mark-Up Language (HTML) and gradually building proficiency is essential. What you see when you look at a website of pictures, images, and design components is all coded using HTML. For a project, set out to learn how to make a basic home page and work your way up from there.
      • In your browser, open the page source information to examine the HTML to see an example. Go to Web Developer > Page Source in Firefox and spend time looking at the code.
      • You can write HTML in a basic word processing program like Notepad or Simple text and save your files as "text only," so you can upload them to a browser and see your work translated.[2]
      • You'll need to learn to format tags and learn to think visually using them.[3] "<" is used to open a tag and "/> is used to close it. "
        " is the opening for a line of paragraph code. You'll use tags to signal anything visual: italics, formatting, color, etc. Learning HTML will help you to understand better how the Internet works.
    3. Image titled Become a Hacker Step 3
      3
      Learn the language of programing. Before you start writing poems you have to learn basic grammar. Before you break the rules you have to learn the rules. But if your ultimate goal is to become a hacker, you're going to need more than basic English to write your masterpiece.[4]
      • Python is a good "language" to start off with because it's cleanly designed, well documented, and relatively kind to beginners. Despite being a good first language, it is not just a toy; it is very powerful, flexible, and well-suited for large projects.Java is an alternative, but its value as a first programming language has been questioned.[5]
      • If you get into serious programming, you will have to learn C, the core language of Unix. C++ is very closely related to C; if you know one, learning the other will not be difficult. C is very efficient with your machine's resources, but will soak up huge amounts of your time on debugging and is often avoided for that reason, unless the efficiency of your computer is especially important.
      • It is probably a good idea to use a good starting platform such as Backtrack 5 R3, Kali or Ubuntu 12.04LTS.

    Part2
    Hacking Attitudes

    1. Image titled Become a Hacker Step 1
      1
      Think creatively. Now that you've got the basic skills in place, you can start thinking artistically. Hackers are like artists, philosophers, and engineers all rolled up into one. They believe in freedom and mutual responsibility. The world is full of fascinating problems waiting to be solved. Hackers take a special delight in solving problems, sharpening their skills, and exercising their intelligence.
      • Hackers have a diversity of interests culturally and intellectually, outside of hacking. Work as intensely as you play, and play as intensely as you work. For true hackers, the boundaries between "play," "work," "science," and "art" all tend to disappear, or to merge into a high-level creative playfulness.
      • Read science fiction. Go to science fiction conventions, which is a great way to meet hackers and proto-hackers. Consider training in a martial art. The kind of mental discipline required for martial arts seems to be similar in important ways to what hackers do. The most hacker-ly martial arts are those which emphasize mental discipline, relaxed awareness, and control, rather than raw strength, athleticism, or physical toughness. Tai Chi is a good martial art for hackers.
    2. Image titled 441133 5
      2
      Learn to love solving problems. No problem should ever have to be solved twice. Think of it as a community in which the time of everyone is hackers is precious. Hackers believe sharing information is a moral responsibility. When you solve problems, make the information public to help everyone solve the same issue.
      • You don't have to believe that you're obligated to give all your creative product away, though the hackers that do are the ones that get most respect from other hackers. It's consistent with hacker values to sell enough of it to keep you in food and rent and computers.
      • Read older pieces, such as the "Jargon File" or "Hacker Manifesto" by The Mentor. They may be out of date in terms of technical issues, but the attitude and spirit are just as timely.[6]
    3. Image titled 441133 6
      3
      Learn to recognize and fight authority. The enemy of the hacker is boredom, drudgery, and authoritarian figures who use censorship and secrecy to strangle the freedom of information. Monotonous work keeps the hacker from hacking.
      • Embracing hacking as a way of life is to reject so-called "normal" concepts of work and property, choosing instead to fight for equality and common knowledge.
    4. Image titled 441133 7
      4
      Be competent. So, anyone who spends time on Reddit can write up a ridiculous cyberpunk user name and pose as a hacker. But the Internet is a great equalizer, and values competence over ego and posture. Spend time working on your craft and not your image and you'll more quickly gain respect than modeling yourself on the superficial things we think of "hacking" in popular culture.
    5. Image titled 441133 8
    1. 1
      Write open-source software. Write programs that other hackers think are fun or useful, and give the program sources away to the whole hacker culture to use. Hackerdom's most revered demigods are people who have written large, capable programs that met a widespread need and given them away, so that now everyone uses them.
    2. Image titled 441133 9
      2
      Help test and debug open-source software. Any open-source author who's thinking will tell you that good beta-testers (who know how to describe symptoms clearly, localize problems well, can tolerate bugs in a quickie release, and are willing to apply a few simple diagnostic routines) are worth their weight in rubies.
      • Try to find a program under development that you're interested in and be a good beta-tester. There's a natural progression from helping test programs to helping debug them to helping modify them. You'll learn a lot this way, and generate goodwill with people who will help you later on.
    3. Image titled 441133 10
      3
      Publish useful information. Another good thing is to collect and filter useful and interesting information into web pages or documents like Frequently Asked Questions (FAQ) lists, and make those generally available. Maintainers of major technical FAQs get almost as much respect as open-source authors.
    4. Image titled 441133 11
      4
      Help keep the infrastructure working. The hacker culture (and the engineering development of the Internet, for that matter) is run by volunteers. There's a lot of necessary but unglamorous work that needs done to keep it going — administering mailing lists, moderating newsgroups, maintaining large software archive sites, developing RFCs and other technical standards. People who do this sort of thing well get a lot of respect, because everybody knows these jobs are huge time sinks and not as much fun as playing with code. Doing them shows dedication.
    5. Image titled 441133 12
      5
      Serve the hacker culture itself. This is not something you'll be positioned to do until you've been around for a while and become well-known for one of the four previous items. The hacker culture doesn't have leaders, exactly, but it does have culture heroes and tribal elders and historians and spokespeople. When you've been in the trenches long enough, you may grow into one of these.
      • Hackers distrust blatant ego in their tribal elders, so visibly reaching for this kind of fame is dangerous. Rather than striving for it, you have to sort of position yourself so it drops in your lap, and then be modest and gracious about your status.
2

Kategori

Kategori

MY BLOGGER. Powered by Blogger.

Recent Comments

Formulir Kontak

Name

Email *

Message *

Followers

love hacker triks

love hacker triks

Flickr

Featured Post

Popular