sexta-feira, 19 de janeiro de 2024

Hacking Facebook By Using PHP Script | Social Engineering Attack | LAN And WAN (Same Or Different Networks)


This Video is absolutely for Educational Purposes only, please don't do any illegal activity. If you do then I'm not responsible for your illegal activity. The purpose of this video is to show you How hackers can hack your social media by using their own local servers.

Basically these type of attacks  known as Social Engineering attacks or Phishing. Attacker just send the duplicate vulnerable HTML page to the victim, when victim enters any type of information to that vulnerable page it'll automatically received by the attacker.

Phishing is a form of fraud in which an attacker masquerades as a reputable entity or person in email or other communication channels. The attacker uses phishing emails to distribute malicious links or attachments that can perform a variety of functions, including the extraction of login credentials or account information from victims.

How phishing works 

Phishing attacks typically rely on social networking techniques applied to email or other electronic communication methods, including direct messages sent over social networks, SMS text messages and other instant messaging modes.

Phishers may use social engineering and other public sources of information, including social networks like LinkedIn, Facebook and Twitter, to gather background information about the victim's personal and work history, his interests, and his activities.

Hacking by PHP

As PHP is server side scripting language so first of all you have need to install a local server (WAMP, XAMPP or LAMPP) over your system. Because if there is no any server running on your system then you can't even run your PHP script. So if you wanna do a programming with PHP this is the first step to download and install a server from the Internet. You can easily download and install servers by watching my videos. Just visit my YouTube channel and watch there.



Hacking Facebook By Using PHP Script | Social Engineering Attack | You can perform this attack over LAN and WAN (Same or Different Networks)

Related articles


  1. Pentest Tools Download
  2. Hack Tools
  3. Underground Hacker Sites
  4. Black Hat Hacker Tools
  5. Pentest Tools List
  6. Blackhat Hacker Tools
  7. Hacker Tools Mac
  8. Hacking Tools For Windows Free Download
  9. Pentest Tools Nmap
  10. Hacking Tools
  11. Hacking Tools Usb
  12. Hack Tools
  13. Hacker Tools Linux
  14. Nsa Hacker Tools
  15. Hacking Tools For Games
  16. Hacker Tools Mac
  17. Hacker Tools Linux
  18. Hack Rom Tools
  19. Hack Tools For Windows
  20. Hacking Tools For Windows 7
  21. Top Pentest Tools
  22. Hacking Tools Mac
  23. Pentest Tools Port Scanner
  24. Hacking Tools Free Download
  25. Pentest Tools Website Vulnerability
  26. Hacking Tools For Kali Linux
  27. Pentest Tools For Ubuntu
  28. Hak5 Tools
  29. Pentest Tools For Android
  30. Hacking Tools Online
  31. Hacking App
  32. Hack Tool Apk
  33. Black Hat Hacker Tools
  34. Hack App
  35. Hacking Tools For Mac
  36. Wifi Hacker Tools For Windows
  37. Hacking Tools For Kali Linux
  38. Hack Tools For Mac
  39. Hacker Tools For Pc
  40. Ethical Hacker Tools
  41. Hacking Tools For Mac
  42. Hack Tools Mac
  43. Pentest Tools For Mac
  44. Hackrf Tools
  45. Install Pentest Tools Ubuntu
  46. How To Install Pentest Tools In Ubuntu
  47. Pentest Tools Open Source
  48. Hacking Tools
  49. Wifi Hacker Tools For Windows
  50. Hack Tools For Windows
  51. Tools Used For Hacking
  52. Hacks And Tools
  53. Hacking Tools Usb
  54. Pentest Automation Tools
  55. Hack Tools Online
  56. Pentest Tools Review
  57. Pentest Tools For Windows
  58. Pentest Tools List
  59. Hacking Tools For Kali Linux
  60. Hacker Tools Linux
  61. Wifi Hacker Tools For Windows
  62. Hack Tools Pc
  63. Hacking Tools Kit
  64. Pentest Tools Windows
  65. Hack Tool Apk
  66. Growth Hacker Tools
  67. Black Hat Hacker Tools
  68. Pentest Tools Url Fuzzer
  69. Android Hack Tools Github
  70. Hacking Tools Usb
  71. Pentest Recon Tools
  72. Hacking Tools Usb
  73. Pentest Tools Kali Linux
  74. Hack Tools Pc
  75. Hack Tools Mac
  76. Hacking Tools For Windows
  77. Hacker Tools Github
  78. Underground Hacker Sites
  79. Hacker Tools Online
  80. Pentest Tools Alternative
  81. What Are Hacking Tools
  82. Pentest Tools Android
  83. Hack Apps
  84. Growth Hacker Tools
  85. Hacker Hardware Tools
  86. Growth Hacker Tools
  87. Hack Tools Pc
  88. Hacking Tools For Windows
  89. Hacking Tools For Beginners
  90. Pentest Tools Linux
  91. Hacking Tools For Beginners
  92. Pentest Tools Android
  93. Pentest Tools Nmap
  94. Pentest Tools Windows
  95. Hacking App
  96. Hak5 Tools
  97. Hacking Tools Github
  98. Pentest Tools Download
  99. Hak5 Tools
  100. What Is Hacking Tools
  101. Pentest Tools Tcp Port Scanner
  102. Hacking Tools 2019
  103. Pentest Tools Alternative
  104. How To Hack
  105. Hacker
  106. Tools Used For Hacking
  107. Hacking Tools Hardware
  108. Hacks And Tools
  109. Hacker
  110. Hack App
  111. Pentest Tools Online
  112. Hack Rom Tools
  113. Pentest Recon Tools
  114. Hacker Tools Software
  115. Game Hacking
  116. Hacking Tools 2020
  117. Hacker Tools Github
  118. Pentest Tools Alternative
  119. Hak5 Tools
  120. Hack Tools Online
  121. Hacker Tools 2019
  122. Hacker Tools Windows
  123. Hacker Tools Free Download
  124. Tools 4 Hack
  125. Hack Tools Online
  126. Pentest Tools For Windows
  127. Wifi Hacker Tools For Windows
  128. World No 1 Hacker Software
  129. Hacker Tools Windows
  130. Hacking Tools And Software
  131. Pentest Box Tools Download
  132. Pentest Tools Tcp Port Scanner
  133. Hacking Tools 2020
  134. Easy Hack Tools
  135. Android Hack Tools Github
  136. Underground Hacker Sites
  137. Hack Tools 2019
  138. Android Hack Tools Github
  139. Hack Tools 2019
  140. Hacking Tools Online
  141. Hacking Tools For Mac
  142. Usb Pentest Tools
  143. Hacking Tools For Kali Linux
  144. Termux Hacking Tools 2019
  145. Game Hacking
  146. Pentest Tools Kali Linux

Nenhum comentário: