FacebookHackingHacking facebookHacking tutorials

Top 10 ways to hack Facebook account 2014

Hi everyone! I am back with a new article on one of my favourite topics- How to hack facebook account. With this highly detailed tutorial you all will be able to hack into anyone’s facebook account very easily. This tutorial includes 10 methods and everything and all the thought processes which are very important to hack facebook account.

I am writing this tutorial on the requests of my members as they all want only one thing and that is the method to hack facebook. Also, all other tutorials are outdated and no longer work as they are not including the security updates that Facebook implemented not so long ago. So today in this tutorial i will be listing all methods to hack facebook account, and i will be listing it from top to bottom. So stay calm and enjoy the post from beginning 😉

So let us begin!!

10. Botnets 

Botnets are not commonly used for hacking facebook accounts, because of it’s high setup costs, They are used to carry more advanced attacks, A botnet is basically a collection of compromised computer, The infection process is same as the keylogging, however a botnet gives you, additional options in for carrying out attacks with the compromised computer. Some of the most popular botnets include Spyeye and Zeus.

9. Man In the Middle Attacks

If the victim and attacker are on the same lan and on a switch based network, A hacker can place himself b/w the client and the server or he could also act as a default gateway and hence capturing all the traffic in between, ARP Poisoning which is the other name for man in the middle attacks is a very broad topic and is beyond the scope of this article.

8. USB Hacking 

If an attacker has physical access to your computer, he could just insert a USB programmed with a function to automatically extract saved passwords in the browser.
Read more about USB Hacking:

7. DNS Spoofing 

If both the victim and attacker are on the same network, an attacker can use a DNS spoofing attack and change the original facebook.com page to his own fake page and hence can get access to victims facebook account.

6. Mobile Phone Hacking

 Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are lots of Mobile Spying softwares used to monitor a Cellphone.

5. Sidejacking With Firesheep

Sidejacking attack went common in late 2010, however it’s still popular now a days, Firesheep is widely used to carry out sidejacking attacks, Firesheep only works when the attacker and victim is on the same wifi network. A sidejacking attack is basically another name for http session hijacking, but it’s more targeted towards wifi users.

4. Session Hijacking

Session Hijacking can be often very dangerous if you are accessing Facebook on a http:// connection, In a Session Hijacking attack a hacker steals the victims browser cookie which is used to authenticate a user on a website and uses to it to access victims account, Session hijacking is widely used on Lan’s.


  • You will be logged out when user is logged out.
  • You will not get the password of the user’s account.
  • Will not work if the user is using HTTPS connections.


  • Always work on SSL secured connections.
  • Always keep a look at the url if the http:// is not changed to https:// it means that sniffing is active on your network.

3. Stealers 


Almost 80% percent people use stored passwords in their browser to access the facebook, This is is quite convenient but can sometimes be extremely dangerous, Stealers are software’s specially designed to capture the saved passwords stored in the victims browser, Stealers once FUD can be extremely powerful.

2. Keylogging 

Keylogging, according to me is the easiest way to hack a facebook password, Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it. A keylogger is basically a small program which once is installed on victims computer will record every thing which victim types on his/her computer. The logs are then send back to the attacker by either FTP or directly to hackers email address.


Keyloggers are often detected as threats by good antiviruses. Hacker must find a way to protect it from antivirus.PREVENTION:

  • Execute the file only if you trust the sender.
  • Use online scanner such as novirusthanks.org
  • Use good antivirus and update it regularly .
Read More about Keyloggers:


1. Facebook Phishing

Phishing still is the most popular attack vector used for hacking facebook accounts, There are variety of methods to carry out phishing attack, In a simple phishing attacks a hacker creates a fake login page which exactly looks like the real facebook page and then asks the victim to login into that page, Once the victim logins through the fake page the victims “Email Address” and “Password” is stored in to a text file, The hacker then downloads the text file and get’s his hands on the victims credentials.


Users nowadays are aware of these type of attacks and one can not be easily fooled using this attack. You need some social engineering to trick someone.


  • Always check the page URL before logging in. This is the most trusted and effective way one can use to avoid himself from phishing.
  • Other way is to use some good Antivirus software which will warn you if  you visit a harmful phishing page.
    Even if somehow you have already entered your credentials in a phisher, Immediately Change your password.
Read More about Phising:




the authorHarinder
blacklisthackers.com is created and owned by Harinder(Aarav).Aarav is a technology Blogger from India(Dehradun). He’s Quiet type and Creative Guy who enjoys creating and exploring new trends on the WEB. Currently pursuing B.tech from DIT University.


Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.