Ad on my site

Friday, 4 December 2015

Method of Phishing

 PHISHING

This option is much more difficult than the rest, but it is also the most common method to hack someone’s account. The most popular type ofphishing involves creating a fake login page. The page can be sent via email to your victim and will look exactly like the Facebook login page. If the victim logs in, the information will be sent to you instead of to Facebook. This process is difficult because you will need to create a web hosting account and a fake login page.
The easiest way to do this would be to follow our guide on how to clone a website to make an exact copy of the facebook login page. Then you’ll just need to tweak the submit form to copy / store / email the login details a victim enters. If you need help with the exact steps, there aredetailed instructions available by Alex Long here on Null Byte. Users are very careful now with logging into Facebook through other links, though, and email phishing filters are getting better every day, so that only adds to this already difficult process. But, it’s still possible, especially if you clone the entire Facebook website.

HOW TO PROTECT YOURSELF

  • Don’t click on links through email. If an email tells you to login to Facebook through a link, be wary. First check the URL (Here’s a great guide on what to look out for). If you’re still doubtful, go directly to the main website and login the way you usually do.
  • Phishing isn’t only done through email. It can be any link on any website / chat room / text message / etc. Even ads that pop up can be malicious. Don’t click on any sketchy looking links that ask for your information.
  • Use anti-virus & web security software, like Norton or McAfee.

New website for learning "hacking"

Hello guys, Today I create a new  site which is highly dedicated for providing the educational purpose of Hacking, creating virus and some other malicious programs.
Since there is so many site which say that he providing the besthackersoftwares for hacking famous social networks like- Facebook, Google+,Twitter but the result is not completelly furnished. These softwares are very expensive and all of them are fake.
By this site I provide you the best tutorial materials which are created by the top most famous Ethical hacker from all over the world.