Skip to content
  • Home
  • Services
    • Web Designing & Development Services
    • Digital Marketing & SEO Services
  • Blog
  • Contact Us
  • About Us
  • Resources
    • Downloads
    • SEO Podcasts
  • 9711082330
  • 9711082330
  • Home
  • Services
    • Web Designing & Development Services
    • Digital Marketing & SEO Services
  • Blog
  • Contact Us
  • About Us
  • Resources
    • Downloads
    • SEO Podcasts

Hack Facebook complete tutorial with Kali Linux and Preventive Measures

  • by Khushank Raj Mahawan
  • December 19, 2020October 3, 2021
  • 7 Comments
Facebook Hacking Tutorial

Wondering how to access and use your friend`s social media account without letting him know? Want to know how to hack Facebook? In this article, I will explain everything about Facebook hacking.

Pre-Requisites:

Social Engineering

Social Engineering deals with the ability of a person to manipulate someone`s mind to get information. Playing with someone`s mind to use their private information, sensitive data, and other important details without letting them know. It can be their credit card details, bank details, medical details, salary slips, etc. Hackers use multiple social engineering techniques for the same.

Shockingly, in more than one-third of all cybercrimes or cyber-attacks, hackers use Social Engineering tools and techniques. This happens at both the individual and enterprise levels on a large scale.

To hack Facebook account of your friend, we will also do the same.

Phishing

Phishing, a type of social engineering technique that uses emails or webpages as attack vectors.  In this type of fraud, an attacker sends an impersonated email that looks legitimate to everyone. Actually, an email or webpage is created using some templates of any well-reputed authority or organization. The email or webpage looks exactly like an official one for any Bank, Social Media networks, enterprises or companies, colleges, or even friends or family.

Since this duplicate email or webpage looks pretty much same as that of an original mail or, a victim fails to recognize it.

Consequently, a victim gives all his/her private information like credentials (ids & passwords), credit card numbers, or bank details. Either as a reply to that phishing mail or fill these details in the input fields of that phishing page.

To trick into the mind of our friend, we will be creating phishing page of Facebook.

Hosting page on Internal or global Network

Now in our case when we talk about hacking through phishing pages, the pages must be accessible by people we want to hack. It can be done in two ways:

  1. Either host the webpage on a global network.
  2. Or else you need to let the victim enter your network using wifi. We will be using this method.

A phishing page for Facebook can be created in 2 ways, manually or through a tool that automates or processes. So we are using a tool.

Facebook Hacking with Kali Linux through Phishing using an automated tool named social-engineering toolkit.

Things to be known before we begin with Facebook hacking:

  1. I am using our own system for this entire process. In our system, I have my host OS like windows 10 and Kali Linux as a virtual machine in VMWare.
  2. Kali uses a NAT adapter. It basically means, apart from a network that my system uses to connect with the outside world through hub and wifi, I have another network created by VMWare.
  3. So my host machine and Virtual machine are connected in that particular network. It means I have my own internal network.
  4. If you need to use your outside network, use a bridge network adapter connection. With this, your page can be accessed through the IP of your kali Linux from devices connected to your wifi as well.
  5. IP Address of Kali Linux: 192.168.91.128
  6. IP Address of host machine: 192.168.91.129

Steps for Facebook hacking with Kali Linux and Preventive Measures

  • Start with running our tool i.e. social-engineering toolkit.
setoolkit
  • In latest versions of kali linux, it will ask you to run the setoolkit as root. To do so, type
sudo setoolkit

It requires the password.

How to hack facebook using kali linux setoolkit
  • Once the setoolkit executes, the terminal will look a bit colorful and you will see 6 options to choose from. Those 6 options are as follows:
  1. Social Engineering attacks
  2. Penetration Testing
  3. Third-Party Modules
  4. Update the Social-Engineering toolkit
  5. Update SET Configuration
  6. Help
Options available in setoolkit in kali
  • Since we already know about phishing. It is a type of social engineering attack. So choose option 1.
  • The next screen requires you to choose from the following available options:
  1. Spear-Phishing Attack vectors
  2. Website Attack vectors
  3. Infectious Media Generator
  4. Create a payload and listener
  5. Mass-Mailer attack
  6. Arduino-based attack vectors
  7. Wireless Access Point attack vectors
  8. QRCodes attack vectors
  9. Powershell attack vectors
  10. Third-Party modules.

We use option 1 for email-based phishing and option 2 for web page based phishing (in our case also). Rest all of these terms are self-explanatory.

setoolkit to create a facebook phishing page.webp
  • After choosing option 2, You will see the following options to choose from:
  1. Java Applet Attack
  2. Metasploit Browser Exploit
  3. Credential Harvester method
  4. Tabnabbing
  5. Web Jacking
  6. Multi-Attack Web
  7. HTA attack

Explanations of all the options are given just above these options. As we need the username and password of our friend, we use the credential harvester method. Choose 3

Credential-harvester-to-get-facebook-password-of-victim
  • In the next step, you have 3 options on your screen with their explanations.
  1. Web templates
  2. Site cloner
  3. Custom Import

Although you are free to choose either 1 or 2, I am using site cloner in this.

setoolkit-site-cloner-for-website-hacking
  • Confirm the IP address you want to use to receive the credentials and press enter.
phishing attack listeners in setoolkit
  • Just type the URL you need to clone. As we want to go with Facebook, just type the URL of Facebook and press enter. Do not close your terminal
url-of-website-you-want-to-clone
  • And that is it, just open the IP address of Kali machine in the browser of your victim machine(Host machine in our case)
facebook-phishing-page
  • Yes, you created a Facebook phishing page, Test it by typing your own credentials and click login. You will be redirected to original Facebook page where original login form comes.
redirected-phishing-page
  • Now come back to your terminal, and scroll a bit. Yeah, we got the credentials.
facebook account is hacked

So you can use this method to hack the Facebook account of your friend.

Preventive measures to keep your Facebook account safe and secure from phishing attacks and hacks

  • Do not trust emails, links, or messages blindly
  • You must understand the difference between sensitive and non-sensitive data. It helps you to know your own limit i.e. the extent to which you want to share your information.
  • Crosscheck the links and URLs carefully. Like, there are attackers who use look-alike domains like
    • For Facebook pages, they use fakebuk. This is called typosquatting.
    • Check for the SSL. (The lock sign-in URL) As people usually don’t use SSLs for phishing pages
  • Always confirm the credibility of a link or mail or even a page from the sender or authority.
  • Use two different email addresses. One for the purpose of privacy and one to use publically. It helps to avoid too much spamming.
  • Avoid opening emails or attachments or links from an unknown sender.
  • Use anti-phishing tools, add-ons, and plugins like cloudphish or Netcraft

Learn about the most dangerous cyber attack and its working

previousShopify or WooCommerce, Which one is better for your eCommerce store?
nextSSH Protocol | Complete Process, Attack, and Security. Everything you need to know

7 thoughts on “Hack Facebook complete tutorial with Kali Linux and Preventive Measures”

  1. zoritoler imol June 8, 2022 at 10:50 am

    Hey I am so thrilled I found your blog, I really found you by mistake, while I was researching on Askjeeve for something else, Anyhow I am here now and would just like to say thanks for a tremendous post and a all round exciting blog (I also love the theme/design), I don’t have time to go through it all at the moment but I have saved it and also included your RSS feeds, so when I have time I will be back to read much more, Please do keep up the excellent job.

    Reply
  2. Bert Heglin June 18, 2022 at 3:13 am

    I like what you guys are up also. Such intelligent work and reporting! Carry on the excellent works guys I?¦ve incorporated you guys to my blogroll. I think it will improve the value of my website 🙂

    Reply
  3. Cristie Bruney June 18, 2022 at 5:48 am

    I’ll right away seize your rss as I can not find your e-mail subscription hyperlink or newsletter service. Do you’ve any? Kindly permit me recognize in order that I could subscribe. Thanks.

    Reply
  4. Dorothea Thilges June 18, 2022 at 6:01 am

    I am really inspired together with your writing talents as neatly as with the format in your blog. Is that this a paid subject or did you customize it your self? Anyway keep up the nice quality writing, it is uncommon to peer a great blog like this one these days..

    Reply
  5. Antony Sansouci June 18, 2022 at 7:40 am

    Some really prize content on this website , saved to bookmarks.

    Reply
  6. hire a hacker June 22, 2022 at 8:56 am

    Hello! Would you mind if I share your blog with my zynga group? There’s a lot of people that I think would really enjoy your content. Please let me know. Thank you

    Reply
  7. offshore company registration June 28, 2022 at 4:16 am

    Excellent read, I just passed this onto a friend who was doing a little research on that. And he just bought me lunch since I found it for him smile Thus let me rephrase that: Thanks for lunch! “Curiosity will conquer fear even more than bravery will.” by James Stephens.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Free SEO Case study: How I generated 300k Impressions per month for a client
  • How can schools and universities conduct practicals online?
  • Cross site scripting attack and types. How to prevent web apps from XSS?
  • A career in Artificial Intelligence, Future & Scope
  • How to start SEO Agency in less than Rs. 999 a month

Loved my work?

Categories

  • Cloud computing
  • Computer Network
  • Cybersecurity
  • Digital Marketing
  • Internet Of Things
  • Latest Technology
  • Python programming
  • Web Technologies
Contact us

Phone & Email +91 9711082330, 8130127169

[email protected]

Quick Links
  • Home
  • Website Development
  • SEO & Digital Marketing
  • Blog
  • Contact
Knowledge Center
  • SMB Pentesting with Metasploit to hack windows 7
  • Create your own Spyware to Hack Android phones
  • Technical SEO basics
  • SNMP Protocol in Computer Network
  • How to do Keyword Research
Learn about
  • Computer Network
  • CyberSecurity
  • Digital Marketing
  • Latest Technologies
  • Web Technologies

ALL RIGHTS RESERVED | COMPUTER SERVICE SOLUTIONS