SudoDragon
Infinity Member
- Joined
- September 6, 2025
- Messages
- 534
- Reaction score
- 1,273
- Points
- 93
- Thread Author
- #1
. This could be easier done by people who are friends with the person they're trying to hack.
These work the same way as the software keylogger, except that a USB drive with the software needs to be connected to the victim's computer. The USB drive will save a summary of the keystrokes, so it's as simple as plugging it to your own computer and extracting the data.
There are several options available for hardware keyloggers. Wired keyloggers like the Keyllama can be attached to the victim's computer to save keystrokes and works on any operating system — provided you have physical access to retrieve the device later..
How to Protect Yourself
How to Protect Yourself
- The first step would be to get your friend's Facebook email login. If you don't already know it, try looking on their Facebook page in the Contact Info section. Still stuck? Hackers use scraping tools like TheHarvester to mine for email addresses, so check out our guide here to find a user's email that you don't already know.
- Next, click on and type in the victim's email. Their account should come up. Click This is my account.
- . This doesn't help, so press No longer have access to these?
- It will now ask How can we reach you? Type in an email that you have that also isn't linked to any other Facebook account.
- It will now ask you a question. If you're close friends with the victim, that's great. If you don't know too much about them, make an educated guess.. Now you have to wait 24 hours to login to their account.
- If you don't figure out the question, you can click on Recover your account with help from friends. This allows you to choose between three and five friends.
- ..
- Use an email address specifically for your Facebook and don't put that email address on your profile.
- When choosing a security question and answer, make it difficult. Make it so that no one can figure it out by simply going through your Facebook. No pet names, no anniversaries — not even third grade teacher's names. It's as easy as looking through a yearbook.
- Learn about recovering your account from friends.. That way you can protect yourself from a friend and other mutual friends ganging up on you to get into your account.
- 2) Use a KeyloggerSoftware Keylogger
A software keylogger is a program that can record each stroke on the keyboard that the user makes, most often without their knowledge. The software has to be downloaded manually on the victim's computer. It will automatically start capturing keystrokes as soon as the computer is turned on and remain undetected in the background. The software can be programmed to send you a summary of all the keystrokes via email.
Null Byte features an excellent guide on how to get a keylogger on a target computer to get you started. If this isn't what you're looking for, you can search for free keyloggers or try coding a basic keylogger yourself in C++.
These work the same way as the software keylogger, except that a USB drive with the software needs to be connected to the victim's computer. The USB drive will save a summary of the keystrokes, so it's as simple as plugging it to your own computer and extracting the data.
There are several options available for hardware keyloggers. Wired keyloggers like the Keyllama can be attached to the victim's computer to save keystrokes and works on any operating system — provided you have physical access to retrieve the device later..
How to Protect Yourself
- Use a firewall. Keyloggers usually send information through the internet, so a firewall will monitor your computer's online activity and sniff out anything suspicious.
- . Keyloggers can't steal what you don't type..
- Update your software. Once a company knows of any exploits in their software, they work on an update. Stay behind and you could be susceptible.
- .. It may seem drastic, but it renders any information a hacker stole useless.
- 3) PhishingThis option is much more difficult than the rest, but it is also the most common method to hack someone's account. The most popular type of phishing involves creating a fake login page. The page can be sent via email to your victim and will look exactly like the Facebook login page. If the victim logs in, the information will be sent to you instead of to Facebook. This process is difficult because you will need to create a web hosting account and a fake login page.
How to Protect Yourself
- Don't click on links through email. If an email tells you to login to Facebook through a link, be wary. First check the URL (Here's a great guide on what to look out for). If you're still doubtful, go directly to the main website and login the way you usually do.
- Phishing isn't only done through email. It can be any link on any website / chat room / text message / etc. Even ads that pop up can be malicious. Don't click on any sketchy looking links that ask for your information.
- Use anti-virus & web security software, like Norton or McAfee.
- 4) Man in the Middle AttackIf you can get close to your target, you can trick them into connecting to a fake Wi-Fi network to steal credentials via a Man In The Middle (MITM) attack.. Once the victim connects to your fake network, you can inspect the traffic or route them to fake login pages. You can even set it to only replace certain pages and leave other pages alone.