Facebook account hijacking
There are few cross paths in hijacking a Facebook account.It all starts with clicking on forgot your password. when you click on the this link few of the options comes which can lead to the compromising of your Facebook account.
1.By clicking on the forgot your password,Facebook will land you to the page to identify your account .
Once you typein the username or email or phone number of the person and then By identifying the account Few options will come containing all those emails which you have provided to the Facebook earlier .
then clicking on the No Longer Have Access to these account will take you to page asking you to enter the email address where Facebook can reach to you...
2.After Entering the valid email which is not associated with any of the Facebook account..the security question of the person you are trying to hack will come .
Make Sure You provide the email address not associated with the Facebook account. if provided email is already in use by another account then warning will appear.
Make Sure You provide the email address not associated with the Facebook account. if provided email is already in use by another account then warning will appear.
Now if you are using this a known person's account you can either give the answer or click on the link below the Security question trusting your friends,
if you are unable to guess answers to the security question click on the link below to the security question here you are asked to choose 3 trusted friends to whom the Facebook will send the codes to open your account .
Now the 3 friends are chosen by the FB using a special algorithm which it uses to show you friend suggestions..
Facebook selection algorithm can be overridden in 8 simple steps and that includes workaround on the captcha .then comes the Facebook recovery protocol.
As after MZ's fan page was hijacked,the Facebook has announced new features in account recovery.
Facebook’s
revised recovery protocol now is that in the event that you no longer
have access to the email(s) that you provided them, it all ends there.
You will be advised that you try to recover your email with the recovery
protocol of you email provider.
How To secure your account from this Attack
Comments
Post a Comment
Queries And Suggestions are always welcome