Tech Byte
4.77K subscribers
254 photos
3 videos
87 files
192 links
Tech tricks, news, hacking tutorials and dark web guides.

Admin : @anonyguy
Download Telegram
Hack Facebook Account Password Using Brute Force

1⃣. First lets know something about Brute force attacks, “A brute force attack is a trial-and-error method used to obtain information such as a user password or personal identification number (PIN).


2⃣. In a brute force attack, automated software is used to generate a large number of consecutive guesses as to the value of the desired data.”


But, In our case I’ll be using a Python script and a Long Dictionary Of passwords.


Requirement

A Kali Machine / Or Any Python Engine Will work!
Facebook.py ( v1 or v2 )
A FaceBook id
CrackStation Word List!

STEPS


Step 1. Install Python-mechanize using command mention below
~#apt-get install python-mechanize


Step 2. Add facebook.py using the command below
~# chmod +x facebook.py [*]
~# python facebook.py


Step 3. Now enter |Email| or |Phone number| or |Profile ID number| or |Username| of the victim,


Step 4. Now Give The "Path" Of Your CrackStation Word list


Step 5. Now it will try all passwords present in the word list, So relax as it will take time depending on speed of your processor and password strength of your victim!
Any Question @anonyguy
Join Us @Techbyte
For any adverisment contact @roml3n
ethical hacking tutorials will go simultaneously.More topics will be added as the series goes on.
Starting tomorrow, we will start fundamentals of hacking, and ethical hacking (step-by-step) series will start following it.
With that, all members are requested to participate in the event to fulfill the (100k+ learners in three months) target, by forwarding our posts for new members in your channel or group chat.
~Admin
To remove the password of the computer in BIOS take out the battery of the motherboard for few seconds
And put it back
It's coming, with tons of new features. It will be available for download in December.
paypal account Username: bswainca@yahoo.ca
Password: austin33 Address: General Delivery, A0A 1C0, Newfoundland, Bay Bulls
HACKING A TARGET PREFACE
this is my new unofficial guide to hacking
the definitions i will give you will not be standard but they will help you understand
PORTS
a port is a door into a computer. when you hack a computer, you do it through a port
there are 65535 ports [ways to enter a computer] but mostly only 2 or 3 ports are open
examples of ports include telnet(port23) http(port80) ssh(port22) and ftp(port21)
open ports can tell us what software is running on the system
for example if port1433(msSQL) is open then it means there is a database on the site
subdomains
companies use different sites to allow their staff to log into their network. if you can find one, then you can attack it with an sql or xpath injection
here is an example
if our target site is m.com, then login.m.com is where to login and registration.m.com is where to register
watch out for the next post.!
~halo Zorayo
Join our Group chat @GEEKernel Rules of the Group .
1. Posts should be original. Give proper credits if your posts are copied.
2. Strictly no promotion allowed. Do not try to promote your page or youtube channels, blogs or websites & no offers.
3. Use 'Report to admin' option if you find anything inappropriate. (Reply to that message with "@admin")
4. Respect each other. Any kind of misbehavior will lead to permanent ban.
5. Any kind of offensive comments on religions, states, Political Parties or ethic group is strictly not allowed.
6. Posting #NOC (Not Original Content) as #OC (Original Content) will lead to ban.
7. If anyone ever ask how to hack Facebook or anything else then he/she would be banned.
8. First try to find your question on google, if you don't find it there then leave a post here.
If you see any post not following rules, please free to report post to admin.
Breaking above rules = BAN
what is the difference between a password and a hash
hacking is just like cooking
when you have pepper and tomatoes you can make stew with it right?
but that doesnt mean that after making the stew, you can get the tomatoes and pepper back.
when you have a password, you can use it to make a hash but after that there is no way to get the password back just like there is no way to get tomatoes from stew
cracking a hash means that we have the stew and we want to see the ingredients that were used to make it
so...
we mix all the spices in the world in order to see if we can get the stew
if we fail, we try another combination until we get the same stew and then we will know how it was cooked
this can take a lot of time just as much as cracking hashes takes a lot of time
database administrators store their passwords hashed so that even when you hack them, you have to go through the process of cracking the hashes
just to make our work tougher
~halo zorayo
Cool Password Bro - Took Approx 72 Hours to Crack this + Evading WIDS, Patience is Key and it works 100% - I already knew I would get this result - If you know your Targets' Vulnerability, you will Succeed.
Ping
Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network. It measures the round-trip time for messages sent from the originating host to a destination computer that are echoed back to the source.
Giving it perspective, suppose you started a online multiplayer game, counterstrike. You aimed at the enemy and shot it, bulls eye, .. but wait a sec, the enemy just teleported somewhere else and shot you down.
What happened here? Your input took long time to reach the server and same for data transferring from server to you.
So, even if you have a fast internet of 100+ MBps, and slow ping rate, the webpages will load slow, messages will reach slow, and a real nightmare for gamers.
So, how to solve it?
Dns: The domain name system (DNS) is the way that internet domain names are located and translated into internet protocol (IP) addresses. The domain name system maps the name people use to locate a website to the IP address that a computer uses to locate a website.
In most of the cases, if your dns is good, the ping will be lower, and leading to faster internet.
To check ping speed, go to speedtest.net, and comment the results below.
To reduce the ping, join our group chat, and i'll provide you many ways of reducing it.
I've attached a cool looking speedtest result.
How ISP provide the internet?
imagine you are in a room, the room just have one door. And you need to go out of the room, how you do it?? You step out from the door. So the room is your lan, outside the door is the another network you want to reach, it may be the Internet. The gateway is the door, you step outside the room passing through the door. Now imagine you are inside a house, the house have one kitchen, one bathroom, and a room. Your router knows its own network, so if you ask it, where is the kitchen, it will reply where it is, but if you want to go outside of your house, the router will say, the exit door. Gateways, are a connection to everywhere else that is not designated as your network, you are in the 192.168.1.0/24 network, you want to query 8.8.8.8, your router will check it's own dns entries, and it will reply, I have no idea where this is, but I have a connection to outside that someone might know. So the packet will move forward, from your gateway, to isp router. And it will ask same query, hey isp, you know where is 8.8.8.8? Isp will say, its none of my clients, so it's somewhere outside my network, you know what, I have an outside gateway, I will forward you to it... And it will keep on and on, until it reaches the destination, or until it cannot be routed or ttl runs out of time... Is a big story, but that's how it works basically.
After 15 days of struggle Finally I gets In To Artist Nick Gubi's Twitter Account
The SS7 vulnerability
This is a topic in phreaking.
Copyright protected
You have a phone and a sim card right?
You can send messages and receive calls
What is call roaming?
When you leave your country to maybe Siberia. If you turn on call roaming, whenever you leave your country
Your phone will tell your ISP
Hey I am no longer in Ethiopia so send all my messages to Siberia so that I can receive them
Get it?
That's call roaming
You are roaming in another network in another country
How does ss7 work
An attacker will write a script that says
Hey I am at <attackers location> so send all my messages here
Even though you are not roaming
Your ISP will forward all your messages to the attackers number
Now imagine if the attacker tries to hack your TG account
Telegra will send you a message with a code
If your ISP forwards that message to the attacker, he can use it to get in to your account and you wouldn't even know
That's all for now
I am not a phreaker so this is all I can tell you
Don't forget to share
~halo zorayo
Finally!
Our brothers (and sisters did it)!
Facebook has been hacked!
Remember guys nothing is impossible
~kasahun(halozorayo:)
WELCOME TO THE FAMILY
who are hackers
hackers are people with the skill of entering remotely into computers to achieve a goal
are they bad?
generaly hackers dislike authority and the idea of peoples data being sold without their knowledge
so why do they hack?
for many reasons
mostly to tell people that their data is being collected and exploiting software so that programmers make safer apps
how do i become a hacker
just believe you are going to change the world
what do i need
if you want to use a phone to hack, make sure it has 2gig+ ram and install nethunter on it
if you have a pc just get any linux version
why linux
you can use any os to hack but linux is faster
what do i need to learn?
follow this posts and learn these in the order
python;ruby (beginner)
c (intermediate)
assembly (elite)
then learn about ports and standard hacking tools like hashcat, netcat nmap, psexec and metasploit
you will also need a stable internet connection
thats the minimum requirements
thanks!
welcome
~halozorayo join us @TechByte
A lot of people out there undervalue the power of hacking
a lot of people are so fascinated with hacking, seeing teens break into high tech companies
that they rush into hacking and by the time they realise they have been in facebook hacking groups who only talk about "how to hack NASA with html" for four years and accept that they cant be hackers
A hacker is made, not born
the truth is that "learning" hacking is not easy but once you do, hacking itself becomes very easy for you
to be a hacker, you have to surround yourself with hackers and learn more from them
after you learn to hack, you will see that anything can be hacked, it just takes time
let me give an example
whatsapp uses encryption so its fairly impossible to hack someones whatsapp account
a noob will turn away but a true hacker would wait for his victim to connect to a wifi network and send an update to the app
when the app installs this update, it becomes a trojan and now the hacker has full access to your whatsapp account
THINK!
~halozorayoo
JOHN THE RIPPER VS HASHCAT
*
JOHN
john is a very good password cracker and we hackers just love it.
It first tries to crack a hash with a dictionary attack, if it doesn't work, it tries a combination attack, only after that will it try to use a brute force attack
One thing about john is that he has an automatic hash detector
So if you don't know which type of hash, john can find it quickly, that's one thing hashcat doesn't have(if you don't know the type of hash, you can't crack it with hashcat)
*
HASHCAT
hashcat is another light weight tool which claims to be the world's fastest password cracker
in an earlier post, I used hashcat to crack a WiFi password
Let's talk about brute force attacks
You try all the possible combinations of words, letters and symbols
Brute force can never fail. But it takes a lot of time. (About 8 years for 9 characters if you use your second hand pc ,100 years if you use your phone), luckily we can use online rainbow tables and botnets to crack these in seconds.
One example is crackstation.net
But we know that most of us don't use symbols in our passwords
Our passwords are nothing like
Vrdj,:;?345%
Yep, that used to be one of my passwords
I am guessing your password is like
Password123
*
You write a word and add numbers right?
Some people even use only numbers
*smh*
That's why your account can be hacked easily.
Weak password!
Don't ask me to recover your account for you after you are hacked!
CHANGE YOUR F**KING PASSWORD RIGHT NOW!
*
That's why hash cat is the world's fastest cracker
I bet I can brute force your fb account within a week
But I am not here to fight you
Hashcat uses this brilliant smart cracking, taking a word and adding numbers so it doesn't take as long as Johnny the ripper
;)
That's another way of hacking a Facebook account
But since you guys hate the word brute force, I just keep it to myself
*
*
OK enough insults
The world is full of vulnerabilities and lazy programmers
It's our job to exploit them
#hack_teh_world
#
#for_the_lolz
#occupy_the_web
~halozorayo