HackingHacking facebookHacking tutorials

How to hack Facebook (Tutorial) – Updated methods

Hacking Facebook! A detailed tutorial.

Hi everyone! I am back with a new article on one of my favourite topics- How to hack facebook account. With this highly detailed tutorial you all will be able to hack into anyone’s facebook account very easily. This tutorial includes all the methods and everything and all the thought processes which are very important to hack facebook. I will cover the following topics under this article-



1. Key loggers
2. Rats
3. Phishing
4. Social Engineering

I am writing this tutorial on the requests of my members as they all want only one thing and that is the method to hack facebook. Also, all other tutorials are outdated and no longer work as they are not including the security updates that Facebook implemented not so long ago.

So let us begin!!

I have seen that 99.9% of the tutorials on hacking facebook as of now recommend Phishing, keylogging, RATing, and even Social Engineering as the most notable methods to take over a Facebook account and essentially “hack it”. Before, we go any further. Let me say that Facebook cannot be hacked with a program of any kind. If you see anyone claiming that they have a program to hack Facebook, they are lying.

Now, why are key loggers, phishers, social engineering, and some RATs bad?

-Key loggers only record the keys pressed on the keyboard.

-Phishers essentially do the exact same thing as key loggers, however the slave must do it manually.

-Social Engineering is the trickiest and I would probably say the hardest method of stealing Facebook account nowadays.

-RATs are probably the best road to take if you plan to steal a Facebook account because you have access to Socks5. Socks5 being their own system.


Ah! One of my favourite methods. Keylogging is perhaps the best and the easiest way to hack a facebook account. Keystroke logging, often referred to as keylogging or Keyboard Capturing, is the action of recording (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. It also has very legitimate uses in studies of human-computer interaction. There are numerous keylogging software-based approaches to acoustic analysis. You can learn more about them from here-  http://blacklisthackers.com/index.php/keyloggers/

Now, Actual Spy Keylogger- Download from here! and to make it full version click this.

2. RATs

I see the same question all the time, Which is the best/favorite RAT?

-Based on my personal experience, I can say that DarkComet and Cybergate are the best for RATs being free.

For Dark Comet:- Download from here!

For Cybergate:- Download from here!

I will not go into teaching you how to set those up because there are already a ton of tutorials on how to do that.


Umm.. As Phishing is illegal I am not going to post anything about it.


-Ah, the classic stories of “My friend hacked my facebook” or “How can I hack my friend?” or my personal favorite “How to hack my girlfriend’s Facebook?”

A common mistake by layman who do not know much about the internet is giving information out without actually knowing that they are giving the information out.

Social Engineering on Facebook seems like a joke considering that you aren’t going to ask the person their password and e-mail for you to log in. Even if they do in fact give you their information voluntarily, it’s pointless.

Why is it pointless? Well, Facebook has become smarter on their security.

Basically, it comes down to this.

Facebook will detect ‘Suspicion’ on the account that you are logging in and it will not allow you to log in under that account simply because their logs of the original account owner do not match with your IP or the IP your are hidden behind.

1) Suspicion

2) Security question

3) Confirm Identity

4) Confirm identity by identifying the friends on that account.

Now to retrieve back to the very beginning of this tutorial, I said that Key logging, Phishing, Social Engineering, and RATs were the common methods associated with hacking a Facebook account.

I will respectfully correct my mistake and as well as the other tutorials on here.

1) Even if you do manage to steal the password and e-mail using Keylogs, the problem of suspicion will appear.

2) Even if you do manage to steal the password and e-mail using Phishing, the problem of suspicion will appear.

3) Even if you do manage to crack the password out of your target through Social Engineering, the problem of suspicion will appear.

4) RATs are probably and definitely the best way to go into “hacking” a Facebook account simply because you will have full access to their computers. You can change their info through computers and the problem of suspicion will not appear.

RATs are NOT the only possible way to get in! Keylogging, Phishing, and Social Engineering might work as well.

I believe that Facebook compares the ranges of IP based on the ISP of the target. Now, if that’s the case…Simply do a whois on the slave using the RAT.

If you do not know what whois is, it’s basically a query that searches where the target is located. Normally you can double click on the slave when they are online on the RAT and see where they are from and look at their IP.

Now, you don’t really need a RAT to tell you where the slave lives or his IP. If you already have his IP or location through other methods such as reverting you’re good to go.

However, if you do not have any information at all what so ever, you can try searching on these sites to revert info about the target.





Now, once you have an IP or ISP, or location the next part is looking for a Sock5 to hide behind so Facebook thinks that you are only using a different computer in the same area. You can also spoof the IP, but I will not go into that.

I thought about this method as I was showing a friend through Teamviewer the pictures that Facebook was showing me to identify the target’s friends. And obviously, I was clueless because I did not know of the people.

What did I do? Well, as you can see the picture #4:

1. Suspicion-


2.  Security question-


3. Confirm identity-


4.Confirm identity by identifying the friends on that account.

Facebook provides the names of the target’s friends. So, use that information to essentially bypass the security of identification by searching those names on Facebook search and matching the faces based on the Target’s friends.

Note that will need an extra Facebook account to search, otherwise Facebook does not let you search. Close the ‘Suspicion’ page and log in to your extra or your actual Facebook account and search for the Target’s friends.

Be sure to notice where your target lives so on the results you can compare whether if the friend is the matching face or not. Be sure to notice the names of the friends as well.

For example, if the name choices are:
George Bush
Adolf Hitler
Barrack Obama
Mohammed Ali
Lee Chang

And the picture given is of an middle eastern descent looking person, you should obviously go with the name that sounds middle eastern.

Once you match the faces for the identification questions. You should be able to get in without a problem.

To wrap it up,

I will warn you one one important thing, if you do not have access to their e-mails. They will get an e-mail notifying that someone is trying to log in on their accounts and your IP will be shown to them.

So, what that means is to always hide behind a VPN or a proxy so you can’t be traced back.

Try to take over their e-mails if you want or simply delete the notification e-mails so they do not notice.

Taking over the e-mail will be an obvious sign that they got hacked and they might try to retrieve the e-mail password, so be sure to change the e-mail password and security questions immediately so they cannot get it back. Only take over the e-mail once you have completely stolen and gained access to the Facebook account because they can easily change the e-mail on the Facebook account and you’ll be screwed.

So by all these amzaing, yet useful methods you can easily hack facebook account of any user you wish too. I am glad to share this information with you. Hope this was useful for you. If you face any problem, do comment. I will be glad to lend a helping hand.


NOTE:- This article is for educational purposes only. This site is no way responsible for any misuse of the information or/and any damage to you and done by you.

the authorHarinder
blacklisthackers.com is created and owned by Harinder(Aarav).Aarav is a technology Blogger from India(Dehradun). He’s Quiet type and Creative Guy who enjoys creating and exploring new trends on the WEB. Currently pursuing B.tech from DIT University.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.