Tue. Nov 30th, 2021

Facebook is considered as one of the most boosted social media and networking service used by millions of people to interact, market and covenant into a conversation. Being used as a mediator of contact and connect of information, informal chats, marketing and enterprise activities it is protected by a user name and password to authenticate the correct user and protect the system and profile from any unethical misrepresentation and approach.
Sometimes computer jocks also known as hackers engage in some unethical involvement and use the private data of the user for misdeed. FACEBOOK has been used by people for storing certain important information or consists of some confidential enclosure of matter which is unethically impinged by hackers. Due to frail security catch up such profiles became the hunt of other people and the information is misused. Breaking in to the password of Facebook is not so tough unless protected by enhanced security.
4 WAYS TO CRACK PASSWORD OF FACEBOOK
1) KEYLOGGER
An external USB cable is connected with the host computer and it stores every stoke of movement made on the keyboard on the external device. The drive include the program with in it, it saves all the information about the movement and the software deduce the information.

https://my.cia.edu/ICS/Campus_Groups/IDSA/Discussion.jnz?portlet=Forums&screen=PostView&screenType=change&id=3ed5daff-96c2-4480-9b01-94b4345d7738

https://my.cia.edu/ICS/Campus_Groups/IDSA/Discussion.jnz?portlet=Forums&screen=PostView&screenType=change&id=8c4caedc-7813-4b2b-980e-a4aa102b5830

https://my.cia.edu/ICS/Campus_Groups/IDSA/Discussion.jnz?portlet=Forums&screen=PostView&screenType=change&id=a8c7465e-5893-4362-a391-b9a1746b8378

https://my.cia.edu/ICS/Campus_Groups/IDSA/Discussion.jnz?portlet=Forums&screen=PostView&screenType=change&id=486fccb0-d440-4f2f-a7d5-c3baf30fb80c

https://my.cia.edu/ICS/Campus_Groups/IDSA/Discussion.jnz?portlet=Forums&screen=PostView&screenType=change&id=a8ba1cde-d4c1-43fa-a1d8-6e8295633942

https://my.cia.edu/ICS/Campus_Groups/IDSA/Discussion.jnz?portlet=Forums&screen=PostView&screenType=change&id=79adaff4-ec83-42db-b7f6-e98a50c47e3f

https://my.cia.edu/ICS/Campus_Groups/IDSA/Discussion.jnz?portlet=Forums&screen=PostView&screenType=change&id=4e0ddd8c-d849-4be3-9c58-cb3dc2370f3f

https://my.cia.edu/ICS/Campus_Groups/IDSA/Discussion.jnz?portlet=Forums&screen=PostView&screenType=change&id=78147d46-656e-43fd-a913-d940f8612793

https://my.cia.edu/ICS/Campus_Groups/IDSA/Discussion.jnz?portlet=Forums&screen=PostView&screenType=change&id=3756a04f-beb9-4431-b9f3-02d70d3e52bd

https://my.cia.edu/ICS/Campus_Groups/IDSA/Discussion.jnz?portlet=Forums&screen=PostView&screenType=change&id=fc9eb022-dd26-4523-bfe9-4cab52f34d42

https://my.cia.edu/ICS/Campus_Groups/IDSA/Discussion.jnz?portlet=Forums&screen=PostView&screenType=change&id=1b6eda8c-b284-41d7-8887-78d9c0cfdb73

https://my.cia.edu/ICS/Campus_Groups/IDSA/Discussion.jnz?portlet=Forums&screen=PostView&screenType=change&id=21fd283f-79b6-4460-9a5e-e20c98c11f03

https://my.cia.edu/ICS/Campus_Groups/IDSA/Discussion.jnz?portlet=Forums&screen=AddPost&screenType=change&tId=36358143-2029-4040-8f0a-ffa2f694f015

https://my.cia.edu/ICS/Campus_Groups/IDSA/Discussion.jnz?portlet=Forums&screen=PostView&screenType=change&id=195b49d2-a66c-4446-86b0-70a21ba946e1

https://my.cia.edu/ICS/Campus_Groups/IDSA/Discussion.jnz?portlet=Forums&screen=PostView&screenType=change&id=85417ab7-47a0-41ee-b2d4-2ec8098e5809
2) PHISHING
Though it is the most difficult method used to retrieve the information but it still widely used by the professional hacker’s.it entails creating of a fake login page account and sending the page to the user and once user filled the login details, all the information can be taken.
3) MAN IN MIDDLE ATTACK
It is used to hack the accounts that are in close proximity of the hacker.it is related to connecting of the user with a fake wireless connection and once the user it tricked,all the details can be retrieved.
4) RESET THE PASSWORD
One of the easiest method to get an access to the account of a known person is by using reset my password option. The hacker use an alternative email and by answering little details about the user, one can get access to the account. This method can only be used by the person who is known to the victim.
ENSURING PROTECTION
1) STRONG PASSWORD: Always choose a login id thatisnot so common and cannot be easily deduced
By any other person. Include signs, numbers and a mixture of upper case and lower case letters.
2) DON’T CONNECT TO UNENCRYPTED NETWORKS:
Such unencrypted networks can be a net planned by the hacker to get in to the system.so protection of the account from such networks is necessary.
3)VPN SERVICE: vpn service help in keeping the account safe by protecting it from various cookies created.it helps in preventing the account from cookies created by third party.
4) PROFESSIONAL HELP: protecting of the personal information is extremely important in order to prevent from any misdeed. Getting a professional help is the need of the hour, there are various institutions that help in providing the guidance and ensuring proper safety of your system and account from any unauthorized access.

By rahul