HACKING FACEBOOK FANPAGE (TUTORIAL)
I can teach you a few new hacking technique and additionally will increase your data in order that you will not become victim of such hacks, But Always remember:
Note: never use these tricks to hurt any innocent, simply increase your data and that i won't be accountable for any hurt caused created by you.
The purpose of this trick and hack is to attack a follower page by casual the admin by social engineering, I saw some folks turning into victim of this, therefore i made a decision to show you this technique.
Things we shall need:
Quote:
1. Facebook page hacking exploit.
2. A free hosting.
3. A key or script to run that "Facebook page hacking exploit.".
4. Your facebook email id.
Step 1
Facebook page hacking exploit:
Download this exploit from the link below.
PASSWORD FOR THE ARCHIVE : r3b3l or R3B3L
Now, when downloading it you may get key within it additionally, and additionally the exploit, initial we've got to edit it,
Editing the exploit:
First of all see you Facebook email id which you used to signup at Facebook, see the picture below, that's the pic of exploit:
Now change the highlighted id to yours Facebook id.
Step 2
Get free hosting:
Well t35 and 110mb won't help you in this hack better go to 000webhost.com and 0fees.net . If you don't know how to upload things to your hosting just read below.
Learn how to upload files to webhosting
Upload the exploit and i recommend change its name from pagehack.js to fanbooster.js or something more attracting.
Step 3
Using the exploit by Key or script:
There will be a text file in the downloaded ZIP FILE,named as 'Key for pagehack' open it, You will get a script in it, Now the main thing is social engineering, Now its up to you that how you give him key, Well Change the following part in the key to your own script path:
Change "//www.yourwebsite.com/pagehack.js" to your hosting , and also change the exploite name in this key if you have changed it while uploading as suggested.
Tip: Encode this in ASCII format, Victim might not know what is this.
Now, Give the key to victim (He must be admin of page) and ask him to paste this in browser address bar.
Tip: Tell him that it will make your page safe, or something else like attracting.
When he will put this key in address bar and that's it you will get a notification that you are admin of his page now.
Enjoy, But don't hack for bad cause, I will not be responsible for any consequences made by you.
Hope You Liked My TuT
Tags : hacking 2013,hacking 2014,hacking and securing ios applications,hacking art of exploitation,hacking android,hacking a terror network,hacking and stacking,hacking and securing ios applications stealing data hijacking software,hacking a google interview,hacking app,hacking apple,hacking books,hacking basics,hacking boots,hacking blackberry,hacking backtrack,hacking bluetooth,hacking beginner,hacking books for begginers,hacking computers,hacking cloud,hacking cookbook,hacking cell phones,hacking cd,hacking college,hacking c++,hacking crux 2,hacking code interview,hacking device,hacking democracy,hacking dvd,hacking dummies,hacking device for xbox360,hacking design,hacking ds,hacking exposed,hacking exposed 7,hacking electronics,hacking exposed mobile security secrets & solutions,hacking equipment,hacking exposed linux,hacking exposed 6,hacking exposed wireless,hacking etico,hacking for dummies,hacking for beginners,hacking for dummies 4th edition,hacking facebook,hacking flash drive,hacking for dummies kindle,hacking for beginners - new,hacking firefox,hacking for dummies 3rd edition,hacking google,hacking gear,hacking guide,hacking gmail,hacking games,hacking gadgets,hacking google maps and google earth,hacking healthcare,hacking hollywood,hacking harvard,hacking happiness,hacking hardware,hacking historical ontology,hacking healthcare a guide to standards workflows and meaningful use,hacking hot potatoes the cookbook,hacking hot potatoes,hacking ios,hacking introduction to probability and inductive logic,hacking ian,hacking introduction to probability,hacking in python,hacking iphone,hacking internet,hacking jacket,hacking jacket women,happy hacking keyboard,hacking knife,hacking keyboard,hacking kit,hacking kickstarter indiegogo,hacking kindle,hacking kali linux,hacking kali,hacking kindle fire,hacking leadership,hacking linux,hacking laptop,hacking linux exposed,hacking lab,hacking mobile,hacking mac,hacking magazine,hacking mobile phones,hacking mac os x,hacking matter,hacking myspace,hacking manual,hacking machine,hacking os x,
hacking oracle,hacking putty,hacking python,hacking politics,hacking programming,hacking phones,hacking program,hacking protection,hacking pc,hacking probability,hacking raspberry pi,hacking roomba,hacking representing,hacking remote,hacking red hat enterprise linux,hacking representing and intervening,hacking revealed,hacking rewriting the soul,hacking software,hacking secret ciphers with python,hacking stuff,hacking security,hacking supplies,hacking software for facebook,hacking systems,hacking stories,hacking secrets,hacking the art of exploitation,hatching twitter,hacking tools,hacking the art of exploitation 2nd edition,hacking the art of exploitation 3rd edition,hacking the future,hacking the xbox,hacking the next generation,hacking the kinect,best hacking u,hacking ubuntu,hacking usb,hacking vim,hacking voip,hacking video game consoles,hacking voip exposed,hacking voip protocols attacks and countermeasures,hacking vim 7.2,hacking with kali,hacking web apps,hacking wireless networks for dummies,hacking work,hacking wifi,hacking windows,hacking web services,hacking wireless,hacking wireless exposed,hacking xbox,hacking your education,hacking y seguridad en internet,hacking y seguridad voip.