Monday, 15 October 2012


TOP 10 WAYS OF HACKING FACEBOOK ACCOUNTS OR PASSWORDS 

Facebook is one of the most widely used social networking site with more than 750 million users, as a reason if which it has become the number 1 target of hackers, I have written a couple of post related to facebook hacking here at RHA, In my previous post which I wrote in 2010 related to facebook hacking and security 4 ways on How to hack facebook passwordI mentioned the top methods which were used by hackers to hack facebook accounts, however lots of things have changed in 2012, Lots of methods have went outdated or have been patched up by facebook and lots of new methods have been introduced, So in this post I will write the top 10 methods how hackers can hack facebook accounts in 2011.




10 Ways How Hackers Can Hack Facebook Accounts In 2011

So here are the top 10 methods which have been the most popular in 2011:


1. Facebook Phishing 




Phishing still is the most popular attack vector used for hacking facebook accounts, There are variety of methods to carry out phishing attack, In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real facebook page and then asks the victim to login into that page, Once the victim logins through the fake page the victims "Email Address" and "Password" is stored in to a text file, The hacker then downloads the text file and get's his hands on the victims credentials.

I have explained the step by step phishing process in my post below:

2. Keylogging 

Keylogging, according to me is the easiest way to hack a facebook password, Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A keylogger is basically a small program which once is installed on victims computer will record every thing which victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address. I have dedicated a half of my newsest book "An introduction to keyloggers, RATS And Malware" to this topic.

Ethical Hacking Book
3. Stealers 



Almost 80% percent people use stored passwords in their browser to access the facebook, This is is quite convenient but can sometimes be extremely dangerous, Stealers are software's specially designed to capture the saved passwords stored in the victims browser, Stealers once FUD can be extremely powerful. If you want to how stealers work and how you can set up your own one?, Kindly refer the book above.


4. Session Hijacking




Session Hijacking can be often very dangerous if you are accessing Facebook on a http:// connection, In a Session Hijacking attack a hacker steals the victims browser cookie which is used to authenticate a user on a website and uses to it to access victims account, Session hijacking is widely used on Lan's. I have already written a three part series on How session hijacking works? and also a separate post on Facebook session hijacking.


5. Sidejacking With Firesheep


Sidejacking attack went common in late 2010, however it's still popular now a days, Firesheep is widely used to carry out sidejacking attacks, Firesheep only works when the attacker and victim is on the same wifi network. A sidejacking attack is basically another name for http session hijacking, but it's more targeted towards wifi users.

To know more about sidejacking attack and firesheep, read the post mentioned below:

6. Mobile Phone Hacking



Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are lots of Mobile Spying softwares used to monitor a Cellphone.

The most popular Mobile Phone Spying softwares are:

1. Mobile Spy 
2. Spy Phone Gold

7. DNS Spoofing 


If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original facebook.com page to his own fake page and hence can get access to victims facebook account.


8. USB Hacking 

Usb password stealer
If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the browser, I have also posted related to this attack which you can read by accessing the link below:
9. Man In the Middle Attacks


If the victim and attacker are on the same lan and on a switch based network, A hacker can place himself b/w the client and the server or he could also act as a default gateway and hence capturing all the traffic in between, ARP Poisoning which is the other name for man in the middle attacks is a very broad topic and is beyond the scope of this article, We have written a couple of articles on man in the middle attacks which canb be accessed from the links mentioned below:
If you are really interested in learning how man in the middle attacks, you can view the presentation below by oxid.it.

10. Botnets 


Botnets are not commonly used for hacking facebook accounts, because of it's high setup costs, They are used to carry more advanced attacks, A botnet is basically a collection of compromised computer, The infection process is same as the keylogging, however a botnet gives you, additional options in for carrying out attacks with the compromised computer. Some of the most popular botnets include Spyeye and Zeus.

          HISTORY OFANONYMOUS



Anonymous (used as a mass noun) is a loosely associated hacktivist group. It originated in 2003 on the imageboard 4chan, representing the concept of many online and offline community users simultaneously existing as an anarchic, digitized global brain.[4] It is also generally considered to be a blanket term for members of certain Internet subcultures, a way to refer to the actions of people in an environment where their actual identities are not known.[5] It strongly opposes Internet censorship and surveillance, and has hacked various government websites. It has also targeted major security corporations.[6][7][8] Its members can be distinguished in public by the wearing of Guy Fawkes masks.
In its early form, the concept has been adopted by a decentralized online community acting anonymously in a coordinated manner, usually toward a loosely self-agreed goal, and primarily focused on entertainment. Beginning with 2008, the Anonymous collective has become increasingly associated with collaborative, international hacktivism. They undertook protests and other actions in retaliation against anti-digital piracy campaigns by motion picture and recording industry trade associations.[9][10] Actions credited to "Anonymous" are undertaken by unidentified individuals who apply the Anonymous label to themselves as attribution.[11] Some analysts have praised Anonymous as the freedom fighters of the internet,[12] and a digital Robin Hood,[13] although others have condemned them as "anarchic cyber-guerrillas".[14]
Although not necessarily tied to a single online entity, many websites are strongly associated with Anonymous. This includes notable imageboardssuch as 4chan, their associated wikisEncyclopædia Dramatica, and a number of forums. After a series of controversial, widely publicized protests,distributed denial of service (DDoS) and website defacement attacks by Anonymous in 2008, incidents linked to its cadre members have increased.[15] In consideration of its capabilities, Anonymous has been posited by CNN to be one of the three major successors to WikiLeaks.[16] In 2012, American magazine Time named Anonymous as one of the most influential groups of people in the world.[17]

Background

Origins as a concept and a meme

A member holding an Anonymous flier at Occupy Wall Street, a protest that the group actively supported, September 17, 2011
The name Anonymous itself is inspired by the perceived anonymity under which users post images and comments on the Internet. Usage of the term Anonymous in the sense of a shared identity began on imageboards. A tag of Anonymous is assigned to visitors who leave comments without identifying the originator of the posted content. Users of imageboards sometimes jokingly acted as if Anonymous were a real person. As the popularity of imageboards increased, the idea of Anonymous as a collective of unnamed individuals became an internet meme.[18]
Anonymous broadly represents the concept of any and all people as an unnamed collective. As a multiple-use name, individuals who share in the "Anonymous" moniker also adopt a shared online identity, characterized as hedonistic and uninhibited. This is intended as a satirical, conscious adoption of the online disinhibition effect.[19]


We [Anonymous] just happen to be a group of people on the internet who need—just kind of an outlet to do as we wish, that we wouldn't be able to do in regular society. ...That's more or less the point of it. Do as you wish. ... There's a common phrase: 'we are doing it for the lulz.'
—Trent Peacock. Search Engine: The face of Anonymous, February 7, 2008.[19]
Definitions tend to emphasize the fact that the concept, and by extension the collective of users, cannot be readily encompassed by a simple definition. Instead it is often defined by aphorismsdescribing perceived qualities.[4] One self-description, originating from a protest video targeted at the Church of Scientology, is:
We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us.[20]

Iconography and aesthetics

As a cyberculture, Anonymous aesthetics are based in various forms of shock humor, including genres of cringesurreal, and black comedy. Many people affiliated with Anonymous associate with the Guy Fawkes mask, either at protests, or within images spread online.[19]

Overview

[Anonymous is] the first Internet-basedsuperconsciousness. Anonymous is a group, in the sense that a flock of birds is a group. How do you know they're a group? Because they're traveling in the same direction. At any given moment, more birds could join, leave, peel off in another direction entirely.
—Chris Landers. Baltimore City Paper, April 2, 2008.[4]
Anonymous consists largely of users from multiple imageboards and Internet forums. In addition, several wikis and Internet Relay Chat networks are maintained to overcome the limitations of traditional imageboards. These modes of communication are the means by which Anonymous protesters participating in Project Chanology communicate and organize upcoming protests.[21][22]
A "loose coalition of Internet denizens,"[23] the group is banded together by the Internet, through sites such as 4chan,[21][23]711chan,[21] Encyclopædia Dramatica,[24] IRC channels,[21] and YouTube.[5] Social networking services, such as Facebook, are used for the creation of groups which reach out to people to mobilize in real-world protests.[25]
Anonymous has no leader or controlling party and relies on the collective power of its individual participants acting in such a way that the net effect benefits the group.[23] "Anyone who wants to can be Anonymous and work toward a set of goals..." a member of Anonymous explained to the Baltimore City Paper. "We have this agenda that we all agree on and we all coordinate and act, but all act independently toward it, without any want for recognition. We just want to get something that we feel is important done..."[4]
A statement attributed to a member of Anonymous has described Anonymous as containing every belief and lifestyle, and that the views of "the loudest" of Anonymous aren't necessarily the views of the rest of Anonymous.[26] Anonymous members have previously collaborated with hacker group LulzSec.

Membership

It is impossible to 'join' Anonymous, as there is no leadership, no ranking, and no single means of communication. Anonymous is spread over many mediums and languages, with membership being achieved simply by wishing to join.[27]
Anonymous protestors at the Brussels Stock Exchange, Belgium, January 2012

Commander X and the People's Liberation Front

A person known as Commander X provides interviews and videos about Anonymous.[28] He said that "we are not a terrorist organization".[citation needed]In 2011, he was at the center of an investigation into Anonymous by Aaron Barr, who claimed to have identified him as a San Francisco gardener. Interviewed following the attack on HBGary Federal, Commander X revealed that while Barr suspected that he was a leader of the group, he was in his own words a "peon". However, Commander X did claim to be a skilled hacker and founding member of an allied organization, the Peoples Liberation Front (PLF). According to Commander X, Peoples Liberation Front, a collective of hactivists founded in 1985, acted with AnonOps, another sub-group of Anonymous, to carry out denial-of-service attacks against government websites in Tunisia, Iran, Egypt, and Bahrain. Explaining the relationship between Anonymous and the PLF, he suggested an analogy to NATO, with the PLF being a smaller sub-group that could choose to opt in or out of a specific project. "AnonOps and the PLF are both capable of creating huge "Internet armies". The main difference is Anon Ops moves with huge force, but very slowly because of their decision making process. The PLF moves with great speed, like a scalpel."[29] On September 23, 2011, a homeless man in California named Christopher Doyon was arrested, under charges that he participated online as a part of a group called "PLF", and as "Anonymous".[30]He pleaded not guilty to charges.[31]

Low Orbit Ion Cannon

The Low Orbit Ion Cannon is a network stress testing application that has been used by Anonymous to accomplish its DDOS attacks. Individual users download the LOIC and voluntarily contribute their computer to a bot net. This bot net is then directed against the target by AnonOps.[32] Joining the bot net and volunteering one's resources for the use of the group is thus one way of being a "member," a concept that is otherwise hard to define.

Activities

Protest actions

The Pirate Bay

In April 2009, after The Pirate Bay co-defendants were found guilty of facilitating extensive copyright infringement "in a commercial and organized form", Anonymous launched a coordinated DDoS attack against the International Federation of the Phonographic Industry (IFPI), an organisation responsible for safeguarding recording artists' rights.[33] When co-founders lost their appeal against convictions for encouraging piracy, Anonymous again targeted the IFPI, labelling them "parasites". A statement read: "We will continue to attack those who embrace censorship. You will not be able to hide your ludicrous ways to control us."[34][35]
Anonymous supporters at anOccupy OKC rally near theOklahoma State Capitol Building.

Megaupload

On January 19, 2012, Megaupload, a website providing file sharing services, was shut down by the US Department of Justice and the Federal Bureau of Investigation.[36] This led to what Anonymous called "the single largest Internet attack in its history".[37] Barrett Brown, described as a spokesperson for the group Anonymous by news outlet RT, said the timing of the raid "couldn’t have come at a worse time in terms of the government’s standpoint".[37]

SOPA

With the Stop Online Piracy Act (SOPA) protests only a day old, it was claimed that internet users were "by-and-far ready to defend an open Internet".[37] Brown told RT that the Department of Justice website was shut down only 70 minutes after the start of the attack. Days later many of the sites were still down or slow to load. The attack disabled a number of websites, including those belonging to the Justice Department, the FBI, Universal Music Group, the Recording Industry Association of America (RIAA), the Motion Picture Association of America (MPAA), and Broadcast Music, Inc.[37] "Even without SOPA having been passed yet, the federal government always had tremendous power to do some of the things that they want to do. So if this is what can occur without SOPA being passed, imagine what can occur after SOPA is passed," Brown commented.[37] Although the actions of Anonymous received support, some commentators argued that the denial of service attack risked damaging the anti-SOPA case.[38][39][40]
The attack included a new, sophisticated method whereby internet users who clicked on links placed in chat rooms and on Twitter participated, some without their knowledge, in a denial of service attack, thereby breaking existing US law. Anonymous used "Low Orbit Ion Cannon" (LOIC) to attack supporters of SOPA on January 19, 2012. Anonymous claimed this to be their largest attack with over 5,635 people participating in the DDoS attack via LOIC.[41] LOIC was utilized by many attackers, despite the fact that a network firewall could easily filter out network traffic it generates, thus rendering it only partly effective. In addition, LOIC attacks were easily identified in system logs, making it possible to trace the attacker's IP address and allowing arrests to be made by these law enforcement agencies.

Kony

Anonymous has described the Kony 2012 campaign by Invisible Children as "propaganda". Although they support the campaign against Kony, they felt that the campaign is mainly a scam.[42]

Government websites

Anonymous claimed responsibility for taking down government websites in the UK in April 2012 in protest against government extradition and surveillance policies. A message was left on Twitter saying it was "for your draconian surveillance proposals".[43]

Occupy movement

Anonymous activists merged with Occupy Wall Street protesters. Anonymous members descended on New York's Zucotti Park and organized it partly. After it became known that some Occupy protesters would get violent, Anonymous used social networking to urge Occupy protesters to avoid disorder. Anonymous used Twitter trends to keep protests peaceful.[44]
A similar protest occurred outside the London Stock Exchange in early May 2012 during a May Day Occupy protest.[45]

Wanted criminals

Alleged Internet predator Chris Forcand, 53, was charged with child sexual and firearm offenses.[46] A newspaper report stated that Forcand was already being tracked by "cyber-vigilantes before police investigations commenced.[47] A television report identified a "self-described Internet vigilante group called Anonymous" who contacted the police after some members were "propositioned" by Forcand. The report stated this was the first time a suspected Internet predator was arrested by the police as a result of Internet vigilantism.[48]
In October 2011, "Operation Darknet" was launched as an attempt to cease the activities of child porn sites accessed through hidden services in the deep web.[49] Anonymous published in apastebin link what it claimed were the user names of 1,589 members of Lolita City, a child porn site accessed via the Tor network. Anonymous said that it had found the site via The Hidden Wiki, and that it contained over 100 gigabytes of child pornography. Anonymous launched a denial-of-service attack to take Lolita City offline.[citation needed]

Religious organisations

"Message to Scientology", January 21, 2008
The group gained worldwide press for Project Chanology, the protest against the Church of Scientology.[50]
The project was started in response to the Church of Scientology's attempts to remove material from a highly publicized interview with Scientologist Tom Cruise from the Internet in January 2008. The project was publicly launched in the form of a video posted to YouTube, "Message to Scientology", on January 21, 2008. The video states that Anonymous views Scientology's actions as Internet censorship, and asserts the group's intent to "expel the church from the Internet".
As of early 2011, the organisation has also targeted the Westboro Baptist Church, releasing several videos on a range of related topics, such as their controversial preaching against homosexuality. Several attacks have been made on the primary website, one that was even made while Shirley Phelps-Roper was debating a representative of Anonymous in a televised interview on the David Pakman show.

LGBT issues

On August 2012 Anonymous hacked into Ugandan government websites in protest of pending homophobic bills. A message stated :
"Anonymous will continue to target Ugandan government sites and communications until the government of Uganda treats all people including LGBT people equally".[51]

Cyber-attacks and other activities

The group is responsible for cyber-attacks on the Pentagon, News Corp and has also threatened to destroy Facebook.[52]
In October 2011, Anonymous hackers threatened the Mexican drug cartel known as Los Zetas in an online video after one of their members was kidnapped.[53]
In late May 2012 alleged Anonymous members claimed responsibility for taking down a GM crops website.[54]
In early September 2012 alleged Anonymous members claimed responsibility for taking down GoDaddy's Domain Name Servers, affecting small businesses around the globe. [55]
In mid-September 2012, Anonymous hackers threatened the Hong Kong government organization, known as National Education Centre. In their online video, Anonymous members claimed responsibility for leaking classified related government documents and taking down the National Education Centre website, after the Hong Kong government has repeatedly ignored months of wide-scale protests against the establishment of a new core Moral and National Education curriculum for children from 6-18 years of age. The new syllabus has come under heavy criticism and international media attention, as it does not award students based on how much factual information is learned, but instead grades and evaluates students based on their level of emotional attachment and approval of the Communist Party of China, almost in blind brain-washing fashion. [56]

Impact

Reception

KTTV Fox 11 investigative report on Anonymous.
On July 26, 2007, Fox affiliate KTTV in Los Angeles, California aired a report on Anonymous, calling them a group of "hackers on steroids," "domestic terrorists," and collectively an "Internet hate machine." The report covered an attack on a Myspace user, who claimed to have had his Myspace account "hacked" into seven times by Anonymous, and plastered with images of gay pornography. The Myspace user also claimed a virus written by Anonymous hackers was sent to him and to ninety friends on his Myspace contact list, crashing thirty-two of his friends' computers. The report featured an unnamed former "hacker" who had fallen out with Anonymous and explained his view of the Anonymous culture. In addition, the report also mentioned "raids" on Habbo, a "national campaign to spoil the new Harry Potter book ending," and threats to "bomb sports stadiums."[15][57]
The day following the KTTV report, Wired News blogger and journalist Ryan Singel derided the report, stating that Fox news service had confused the hacker group with "supremely bored 15-year olds who post obscene pictures" from the English-language imageboard website 4chan, and that the news report was "by far the funniest prank anyone on the board has ever pulled off."[58] In February 2008, an Australia-based Today Tonight broadcast included a segment of the KTTV report, preceded by the statement: "The Church of Scientology has ramped up the offensive against Anonymous, accusing the group of religious bigotry and claiming they are sick, twisted souls."[59]
Graham Cluley, a security expert for Sophos, argued that Anonymous' actions against child porn websites hosted on a darknet could be counterproductive, commenting that while their intentions appear beneficial, but the removal of illegal websites and sharing networks should be performed by the authorities, rather than Internet vigilantes.[60]
The English language edition of Al Jazeera published regular articles on Anonymous and its activism. The journal also ran opinion pieces on the group, sometimes laudatory, describing it as a future form of internet-based social activism:
"This is the future, whether one approves or not, and the failure on the part of governments and media alike to understand, and contend with the rapid change now afoot, ought to remind everyone concerned why it is that this movement is necessary in the first place."[61]
In January 2008, Search Engine, a Canadian radio show published by CBC Radio One, began reporting on Project Chanology. Host Jesse Brown called Anonymous "clowns," citing their lack of coordination, vulgar humor, and pack mentality, and invited them to confront him in person. On February 7, two members of Anonymous appeared on the show, explaining the nature of the group and the genuine criticism they held for Scientology.[19] After Anonymous held a protest in front of Scientology compounds around the world on February 10, 2008, Brown admitted that they had "proved me wrong."[62]
The nature of the protest was unprecedented—picketers wore masks and refused to divulge names—and sparked a follow-up discussion on the show about journalistic standards for source protection, and the meaning of identity. Brown brought the issue to his own workplace, interviewing CBC's president Hubert Lacroix in reaction to a conflict between him and an anonymous critic who went by the handle "Ouimet."[19]

Reaction from law enforcement agencies

Arrests

First, who is this group called Anonymous? Put simply, it is an international cabal of criminal hackers dating back to 2003, who have shut down the websites of the U.S. Department of Justice and the F.B.I. They have hacked into the phone lines of Scotland Yard. They are responsible for attacks against MasterCard, Visa, Sony and the Governments of the U.S., U.K., Turkey, Australia, Egypt, Algeria, Libya, Iran, Chile, Colombia and New Zealand.
—Canadian MP Marc Garneau, 2012[63]
In December 2010, the Dutch police arrested a 16-year old for cyberattacks against Visa, MasterCard and PayPal in conjunction with Anonymous' DDOS attacks against companies opposing Wikileaks.[64]
In January 2011, the FBI issued more than 40 search warrants in a probe against the Anonymous attacks on companies that opposed Wikileaks. The FBI did not issue any arrest warrants, but issued a statement that participating in DDOS attacks is a criminal offense with a sentence of up to 10 years in prison.[65][66]
In January 2011, the British police arrested five male suspects between the ages of 15 and 26 with suspicion of participating in Anonymous DDOS attacks.[67]
Matthew George, a Newcastle, New South Wales resident, concerned with forthcoming Australian internet filtration legislation, was arrested for his participation in Anonymous DDOS activities. George participated in Anonymous IRC discussions, and allowed his computer to be used in a denial of service attack associated with Operation Titstorm. Tracked down by authorities, he was fined $550, though he was not fully aware that his actions were illegal, and believed his participation in Operation Titstorm had been a legal form of civil protest. His experience left him disillusioned with the potential of online anonymity, warning others: "There is no way to hide on the internet, no matter how hard you cover your tracks you can get caught. You're not invincible."[68]
On June 10, 2011, the Spanish police captured three purported members of Anonymous in the cities of Gijon, Barcelona and Valencia. The operation deactivated the main server from which the three men coordinated DDoS attacks. This particular group had made attacks on the web servers of the PlayStation Store, BBVABankia, and the websites of the governments of Egypt, Algeria, Libya, Iran, Chile, Colombia and New Zealand. The operation revealed that their structure consisted of "cells" which at any given time could coordinate attacks through the downloading of software; the decision-making process to attack occurred in chat rooms. The Spanish national police stated that this operation corresponds to the fact that the Spanish government and NATO considers this group of hackers a threat to national security.[69]
On June 13, 2011, officials in Turkey arrested 32 individuals that were allegedly involved in DDoS attacks on Turkish government websites. These members of Anonymous were captured in different cities of Turkey including Istanbul and Ankara. According to PC Magazine these individuals were arrested after they attacked these websites as a response to the Turkish government demand to ISPs to implement a system of filters that many have perceived as censorship.[70][71]
During July 19–20, 2011, as many as 20 or more arrests were made of suspected Anonymous hackers in the US, UK, and Netherlands following the 2010 Operation Avenge Assange in which the group attacked PayPal, as well as attacking MasterCard and Visa after they froze Wikileaks accounts. According to US officials statements suspects' homes were raided and suspects were arrested in Alabama, Arizona, California, Colorado, Washington DC, Florida, Massachusetts, Nevada, New Mexico, and Ohio, as well as a 16 year old boy being held by the police in south London on suspicion of breaching the Computer Misuse Act 1990, and four being held in the Netherlands.[72][73][74][75]
On February 28, 2012, Interpol issued warrants for the arrests of 25 people with suspected links to Anonymous, according to a statement from the international police agency. The suspects, between the ages of 17 and 40, were all arrested.[76]
On September 12, 2012; Anonymous spokesman Barrett Brown was arrested at his home in Dallas on charges of threatening an FBI agent. Agents arrested Brown while he was in the middle of aTinychat session.[77]

Fear of retaliation

On January 28, 2012 American media outlet the Wall Street Journal claimed US law enforcement officers are concerned about cyber-retaliation attacks by the group. The US has been investigating WikiLeaks founder Julian Assange, although no charges have been filed and his legal team say the US has no jurisdiction, as the Australian citizen has committed no crimes on U.S. soil. The concern was caused by suspicion that Anonymous was involved in retaliatory attacks. A prosecutor in the investigation faced so many personal intrusions that colleagues became concerned about the possibility of bodily harm, according to journalist Devlin Barrett, who explained the Department of Justice was acting unusually by suppressing the names of officials in public statements to the press, but not in court documents. Mr Barrett said there was debate within the Department of Justice and the FBI over the release of names of officials working on the Megaupload case.[78