If you’re looking to hack a Facebook account and do not want to use any of the usual methods, then you’ve come to the right place. Here you will find out how to hack a Facebook account using something called BackTrack 5.
Backtrack and Facebook hacking?
Now, you may be wondering, what is BackTrack 5? And will I need some superior hacking skills to be able to use it?
The answer to the first question is this. BackTrack was a Linux distribution. Yes, exactly that Linux you’re thinking about. BackTrack was focused on security based on the Ubuntu Linux distribution. It was aimed mainly at digital forensics and penetration testing use. In early 2013, BackTrack was rebuilt and released under the name Kali Linux.
Basically, it evolved from the merger of two competing distributions. Also, if you’re on the lookout for hacking Facebook accounts on your own then check out Hayy – they’re awesome at hacking Facebook accounts! We have WHAX, which is a Slax-based Linux distribution and Auditor Security Collection, which was a Live CD based on Knoppix. The two were joined together with the purpose of focusing on penetration testing. Eventually BackTrack resulted from the two. BackTrack users get access t comprehensive collections of security-related tools from port scanners to Security Audit. It supports Live CD and Live USB functionality and it allowed users to boot it directly from portable media without a need for installation, though that is still an option.
BackTrack tools are arranged into 12 categories:
• Information gathering
• Vulnerability assessment
• Exploitation tools
• Privilege escalation
• Maintaining access
• Reverse engineering
• RFID tools
• Stress testing
• Reporting tools
• MiscellaneousIf you didn’t understand any of that, here’s the description in a nutshell. BackTrack is software developed by Linux that among others, can gather information and assess system vulnerabilities. These features alone make it an ideal tool to use to hack into any Facebook account.
If you have BackTrack 5 already, then it’s time to go through the steps.
1. Open a new terminal type.
2. root@root:-# cd /pentest/exploits/set
3. root@root:-#/pentest/exploits/set# ./set (or u can simply open this (set)command from, application> backtrack> exploitation tools> social-engineer tools> social engineer toolkit> set.)
4. Then choose option 2 (website attack vector) from menu: set > 2
5. Then choose option 3(credential harvester attack method) set:webattack> 3
6. Then choose option 1 (web templates) set:webattack > 1 (Now from that option you have to select any one template. For example we selected template 5 (twitter)
7. set:webattack >select a template:5(for twitter) press return to continue.
8. Now convert your URL into Google URL using goo.gl(Url Shortener) and send this link address to your victim via Email or Chat
9. Now send your link that you converted from goo.gl to your intended victim. When the victim opens the link, he is redirected to a fake page to start working. When he inputs his Username and Password in the fake page, the Username and Password are displayed on SET.
Personally, I wouldn’t advice using this method if you’re not tech-savvy. Sure, the whole process is pretty much outlined already and all you have to do is copy and paste the codes. But if you’re not sure of what you’re doing and something didn’t work quite the way you were expecting it to, it’s just harder to find where the error is coming from if you’re a bit clueless, you know?
But that’s just me. If you want to go ahead and try this hack out, then go ahead. Let me just clarify that we don’t encourage hacking in general. It’s an activity that’s still illegal in many places. And it breaches the privacy of the person whose account you’re trying to hack. Nevertheless, if you’re doing this for educational purposes, then carry on.