Social Engineering A Facebook Account Using Kali Linux

September 12, 2016 | Views: 87585

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Nowadays, Facebook “hacking” is not easy. But, I am here to help you by teaching some methods of Facebook hacking. Today, I’m going to teach you how to hack a Facebook account using Kali Linux. I will teach you some more easy methods of “hacking” Facebook accounts later.

Steps To “Hacking” a Facebook Account

#1. Install Kali Linux From Official Site After Installation, Open your Kali Linux terminal and type : 
cd /pentest/exploits/set 

#2. Now Type On Opened Terminal And type: ./set to open “Social Engineering Tool kit“.

#3. After SET Opening Select 1st Option 

  • 1) Social Engineering Attacks
    Type “1” and Hit Enter.

#4. Now Select Option 2 

  • 2) Website Attack Vectors

#5. Now just Select 4th Option 

  • 4 Tabnabbing Attack Method

#6. Now Select Option 2 

  • 2) Site Cloner

#7. Now Here you Need to Add your IP,

#8. Now Here you need to add the URL of  FB

Note: if you want to hack Facebook then put here Facebook URL.



#9. Just Hit Enter

#10. Paste Your IP in Address bar and Page  should be look like this..


When Victim Log in to your Page Details will come here.. 


**If you want to Know your IP Open new Terminal and type: ifconfig



Share with Friends
Use Cybytes and
Tip the Author!
Share with Friends
Ready to share your knowledge and expertise?
  1. Friends this is another type of phishing.

  2. Why i paste my IP address ? And why use FB URL , why not target URL ? If i want to hack someone ID , why i am using my ip & fb URL why not target URL ? I am confused .

    • we use own ip address because when victim type passowrd this passowrd come to own ip address,and we use fb URL becz we want to hack FB account, so, for making a fake fb login page, we use fb URL

  3. Yeah! How we can figure out attacking IP here?

  4. This instructions are not clear. Why would I put my IP address if I am trying to hack someone else account??? Can you please clarify??


  5. So the IP of the attacker is needed or is this a form of attack like arp poisoning where as long as you’re on the same network you can successfully launch the attack ? Just abit confused as where the IP comes in handy

    • Just think about the way how this exploit works. The Autor told something about Tabnabbing so Google it or try wikipedia

      After this it should be easy to figure it out why the atrackers IP is used 😉

Page 1 of 712345»...Last »
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge


We recommend always using caution when following any link

Are you sure you want to continue?