How hackers really crack Facebook and hack || 2019 facebook Update


Soursec information link :

How hackers really crack facebook password and hack facebook || 2018 facebokk Update

Please Like this video ! Comment this video !! Share this video !!! Subscribe my this channel !!!!

In everyday life in online we see here a lot of websites to hack facebook account by a PIN code or with the mobile number bla bla bla….. . But according to me these all are fake. Because hacking a facebook account is not an easy task. And the hackers have to give a hard time their to hack a facebook account.
Whenever you just enter into your facebook account that time you need to give your email or phone number and password and click on login. But if your email or password is wrong then you can’t get the access and you might have to give the right email or password to get access. Now how is it possible to check your provided password is right or wrong.
In the backend of the facebook their have a database and in this database their your email and password are being saved. And from their they just match the password.
Now how they save it let’s talk about that. Whenever you are going to open a facebook account that time you give their your first and last name, email ID or phone number, password, gender, age everything which they want and when you click on the sign up that time all the information you provide here are saved in the backend database which I say you earlier. Here all the data will save as it is the name the email, the gender and age. But the password? It is not saved here as it. Earlier which password we used to open an account that is in the plain text and we all give password in plain text format. But facebook never save it as plain text. They make it in hashed format by converting it from plain text to hashed text.
Now the hackers just able to manage the facebook databases data of the account holder. Now they get all the information. Now if they give here the email and password here as it is and go to log in that time it never works. Because the password is encrypted and here your need the exact plain text which you provide here.
Now it’s time for the hacker. What they do to get the plain text? You think they convert the password from hashed text to plain text. But it is not possible to convert hashed text to plain text. Because it is a one way method. Now what they do? Now their have an idea to get the plain text of the hashed password if the password is so easy and used for a lot like……….
Here have a website it is a website of all used and easy password. Here if you search hashed password and if it matched here then congratulation hacker gets your password. But if you used here strong passwords with a lot of combination that time it’s quite impossible. Because it’s unique.
Now what the hackers do to hack your facebook password? Here now they use dictionary attack or brute force attack to hack your facebook password. In the dictionary attack here hackers manage a dictionary where all the possible and regularly used passwords are contained. Now they just search the password by giving a code. And they compare the password.
In the brute force attack here use algorithms that combine alpha-numeric characters and symbols to come up with passwords for the attack. For example, a password of the value “sajid1234” can also be tried as $ @jid1234 using the brute force attack. Here the hackers have given hard time if the password is long but if the password is short then they need a little time.
In rainbow table method uses pre-computed hashes. Let’s assume that we have a database which stores passwords as md5 hashes. We can create another database that has md5 hashes of commonly used passwords. We can then compare the password hash we have against the stored hashes in the database. If a match is found, then we have the password.
Here in guessing method Passwords such as sajid1234, sajid123Khan etc. are commonly used or set as default passwords. If they have not been changed or if the user is careless when selecting passwords, then they can be easily compromised.
In spidering method Most organizations use passwords that contain company information. This information can be found on company websites, social media such as facebook, twitter, etc. Spidering gathers information from these sources to come up with word lists. The word list is then used to perform dictionary and brute force attacks.

Join with me in my group :
Like my facebook page :
Follow me in Twitter :
Follow me in LinkedIn :
Follow me on Instagram :
My website :

Stai cercando prodotti per l’hacking, la sicurezza informatica e il penetration testing? Hai bisogno di bonificare il tuo smartphone, il tuo pc o il tuo sito da virus e malware? Devi rintracciare una persona o recuperare delle informazioni urgenti? Devi riprendere possesso di un account, una mail o di una password che ti hanno sottratto? Vuoi acquistare device già configurati per sperimentare tutte le tecniche di hacking in modo facile e veloce? Hai esigenze particolari in ambito software o hardware? Possiamo aiutarti!

Contattaci subito per avere un aiuto immediato : dettagliaci tramite mail o Whatsapp che tipo di supporto ti occorre e ti invieremo un riscontro immediato!

Compila e invia il modulo qui sotto per inviarci subito una richiesta di supporto

Scrivi il tuo indirizzo email qui

Scrivi qui come possiamo aiutarti – ti supportiamo immediatamente per ogni tua esigenza!