I am describing this technique 1st because it’s the most basic and also the most popular method for hacking Facebook password. You can also search on Google the numerous popular Facebook hacking methods and you will find Phishing strategy on the top always. And I am describing the methods based to their reputation.
I know now you want to know which my preferred method for Coughing Facebook account passwords is and I will certainly tell it’s simply PHISHING.
Most effective technique for advanced Hackers and my 2nd preferred too. Its level of popularity is little but lower than Phishing only simply because it involves you to download hack tool and then make your key logger and send it to sufferer which is a lengthy procedure and also unsecured too as you don’t aware that the key logger that you installing is himself contain some spyware or basically a key logger attached with it. Key logging becomes simpler if you have physical access to victim laptop or computer as only thing you have to do is install a key logger and direct it to your location so that it will send all recorded keystrokes to pointed location. What a key logger does is it records the key strokes into a log file and then you can use these logs to get required Facebook password and thus can hack Facebook password.
If Facebook hacker or any particular Key logger, by some means, hacks your main Gmail or yahoo account which you are using as main email address, then this information account can easily hack your Facebook password utilizing “Forgot password” trick. The Hacker will simply ask Facebook to send password to the main email address and ask Facebook directors to send the reset email to your primary email address- which is already hacked. Thus, your Facebook account password will be reset and it will also be hacked.
So, often remember to protect your primary email deal with that you have used to create Facebook account and try to keep unidentified or ineffective mail id as your main email address in Facebook.
A social design attack is one in which the designed victim is somehow tricked into doing the attacker’s bidding. An example would be replying to a phishing email, pursuing the link and entering you’re banking credentials on a fake website. The stolen credentials are then used for almost everything from finance fraud to outright identity theft. An old adage comes to mind here, “it pays to be suspicious”. With socially designed attacks, the reverse is also true – if you aren’t suspicious, you likely will end up paying. In addition to phishing, social design attacks can come in many forms – email that masquerades as breaking news alerts, or greeting cards, or announcements of bogus lottery winnings. Pump and dump stock scams are also a form of social engineering, playing on the recipients’ natural desire to take advantage of a good deal. It’s essential to remember that if something sounds too good to be true, it’s probably a scam. Social engineering attacks are also often used to trick users into infecting their own systems – for example, by hiding the malware as a video codec or Flash update. An email is sent enticing the recipient to view a bogus video clip, the victim visits the link contained in the email and installs the “codec/update” which turns out to be a backdoor Trojan or keystroke logger.