Social Engineering A Facebook Account Using Kali Linux

September 12, 2016 | Views: 87725

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here


Nowadays, Facebook “hacking” is not easy. But, I am here to help you by teaching some methods of Facebook hacking. Today, I’m going to teach you how to hack a Facebook account using Kali Linux. I will teach you some more easy methods of “hacking” Facebook accounts later.

Steps To “Hacking” a Facebook Account

#1. Install Kali Linux From Official Site After Installation, Open your Kali Linux terminal and type : 
cd /pentest/exploits/set 

#2. Now Type On Opened Terminal And type: ./set to open “Social Engineering Tool kit“.

#3. After SET Opening Select 1st Option 

  • 1) Social Engineering Attacks
    Type “1” and Hit Enter.

#4. Now Select Option 2 

  • 2) Website Attack Vectors

#5. Now just Select 4th Option 

  • 4 Tabnabbing Attack Method

#6. Now Select Option 2 

  • 2) Site Cloner

#7. Now Here you Need to Add your IP,

#8. Now Here you need to add the URL of  FB

Note: if you want to hack Facebook then put here Facebook URL.

 

scr9

#9. Just Hit Enter


Scr10
 
 
#10. Paste Your IP in Address bar and Page  should be look like this..



login
 

When Victim Log in to your Page Details will come here.. 

 
result


**If you want to Know your IP Open new Terminal and type: ifconfig

 

 

scr7
Share with Friends
FacebookTwitterLinkedInEmail
Use Cybytes and
Tip the Author!
Join
Share with Friends
FacebookTwitterLinkedInEmail
Ready to share your knowledge and expertise?
40 Comments
  1. We can easily predict the difference between real domain name of facebook and your ip. Using your IP, is there any way to redirect the user into facebook’s real domain name?

    • I think the average Facebook user will see the IP address and not even know what it is. All they know is that they are on Facebook and that’s all they care about.

  2. 2-step authentication has also been done. Use your friend Google Gram, or Duck Duck Go to find out.

  3. If you want to attack some outside you will need to obtain a freedomain

  4. How would this work with the 2-step authentication?

  5. this method is poor if you have script it will work better share it with me if you have …..

Page 4 of 7« First...«23456»...Last »
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel