Hack facebook accounts on your network-2

Hey!
Im back with the second part of the post. At the end of the last post, we successfully re-routed all the traffic from the victim’s computer to the router through our computer.Next, we have to capture their facebook cookies through wireshark. So How do you go about doing that? It’s very simple actually.
  • Open up wireshark
  • Goto capture – > Interfaces in the top menu and select your interface. It’s usually the one which has an IP address and  a certain number of packets flowing through it.
  • Next goto capture and click on start.. It should look something like this.



This window has all the packets sent from the victim’s/victims’ computer to the router and all the packets sent from the router to the victim.
Next in the filter type  “http.cookie contains datr”.  You ask why? Because, when a user logs in to facebook, he is given some cookies which is unique to him. If we replace our cookies with the victim’s cookies, we can login to his account as then facebook wont know the difference.





 You now have the cookies. To get the information stored in the cookies,  right-click on any one of the cookie and click on Follow TCP stream.
In the TCP stream look for the line  Cookie: ( and all cookie names). If it doesn’t come, select some other packet in wireshark and click on follow tcp stream for that. You can see the source IP and destination IP in wireshark. So if you have more than one source IP , then you know you have the cookies of more than one account on your LAN. This is what I got when I did it.




So now you have it :D . The datr cookie, c_user cookie, lu cookie, sct cookie, w cookie and xs cookie. These are the main cookies you need.
Now open firefox and goto http://www.facebook.com. Once there, click on cookies in the web developer add on which you had installed in the last post. Then do the following
  • ·         Clear session cookies
  • ·         Delete domain cookies
  • ·         Delete path cookies.



IMPORTANT: Once you do this, again type http://www.facebook.com in the URL and click enter. Basically you are reloading facebook after deleting all cookies.
Now login to your account with your username and password. After logging in , click on cookies in web developer add-on and click on “view cookie information”.
And there you have all your cookies :p. Now what to do?! I guess you know it by now. !
Click on “edit cookie” for each cookie there and replace the cookie value with the value you got through wireshark.
If you did not get all the  cookies in wireshark its OK! But mainly, you should look to replace the datr cookie, c_user cookie, lu cookie, sct cookie, w cookie and xs cookie.





fter replacing all the  cookie values with the ones you got in wireshark, just refresh the facebook page. And thats it! You are in to the victim’s account! You have HACKED a facebook account on your network.
Wish you a Happy Hacking !..

Comments

  1. Find the happy hours that serve actual facebook for hors devors.
    When I was in facebook blog there were ones that had wings, brats,
    pizza taco bars etc you can buy one beer and eat dinner there
    not a bad deal. I always had a backpack and found the smaller bathrooms
    with one stall and or ones that you could lock the door and stole all my
    tp for the whole time I was in school. Never take all the paper leave one
    roll so no one gets suspicous,. Yeah it was the crappy one ply sandpaper
    stuff but it was still free and with the price now days for toilet paper
    I may have to start finding places to steal it again..
    click hear link facebook feltörése

    ReplyDelete
  2. .you must got a real facebook hacker hear

    http://hackxfbx.blogspot.in/

    OR

    do u wand a real facebook hacker pls click hear

    hack your friend fb account software free download

    ReplyDelete
  3. This comment has been removed by the author.

    ReplyDelete
  4. Nice post . I have also an article on Facebook Hacking so have a look:
    Ultimate Facebook Hacking Tutorials

    ReplyDelete


  5. if you require services of a certified and experienced ethical hacker for your general ethical and specialized Hacks with proof ?
    + Access various social networks (facebook, twitter,
    Instagram, Google+, etc)
    + Specialized and experienced hacking into Educational
    Institutions, Change of Grades, Clearing of Criminal Records,
    Blog Hack, Clear Credit Card Debts, Drop Money Into Credit
    Cards, Smartphone Hacks, Bank Account Hacks in various parts
    of the world etc,
    + Hack into email accounts (gmail, yahoo, aol, etc)
    CONTACT : GREENFR1007@GMAIL.COM or SKYPE : SATISH.ANCHAN4


    521365

    ReplyDelete
  6. hackerkane167@gmail.com
    hello everybody if you Need a good hacker? A senior member of ice fog hackers.A professional in the areas mentioned below:
    1.Facebook,whats app,emails,twitter and Instagram hack
    2- Hacking computer system
    3- Cloning of phones
    4- Changing DMV records without leaving traces
    5- Changing school grades without leaving traces
    6- Retrieving hacked social media accounts
    7- Credit card hack
    8- Clearing criminal records
    9- Clearing of bad driving records without leaving traces
    10- Website hack
    11- Retrieving hacked social media accounts
    12- P.I - Private investigator like cheating husbands or wives and any other P.I activities and so many other services.
    13- Catch hacker scammers
    14- Wire transfer to any bank
    15- Retrieval of hacked accounts (Facebook,twitter,instagram,zoosk,match etc..)
    16- Bank login
    16- Phishing emails. to mention a few..He is at your service if you need him. Contact hackerkane167@gmail.com is the best of hacker try Kane you will happy about your work

    ReplyDelete
  7. Hack with comfort and get your job done systematically without a bridge 
    of security alert. It's frustrating not getting the value of your money 
    on services paid for. If you are in need of safe exploit in hacking, 
    make the right decision of using cybergod40@gmail.com, and keep 
    tab on any subjects be it spouse, employees and friends information from
    social media, Phones, websites and erasing of certain confidential 
    records you don't want to be at public domain, hack formula don't brag 
    about hack exploit it is what we do best

    ReplyDelete

Post a Comment

Popular posts from this blog

How to hack your xbox 360 completely

Defusing Fork Bomb

Wii Remote IR Camera Hack with Arduino Interface