Skip to main content

How to Hack Facebook Account Password - Loophole in fb Security



    There are various methods to hack facbook account password like Keyloggers, Phishing websites etc.. whereas bruteforcing, dictionary attacks, DDOS attack etc will not work directly due account lockout feature. Today in this post I am going to share a very effective way to hack facebook account I named it Hacking with Trusted Friends.
    Hacking of Facebook Account with Trusted Friends is also not so simple. To get started with it, you have to create three fake Facebook accounts and make sure they are in friend list of the person whose facebook account you are going to hack. If you can make this happen then roll up your sleeves to begin the real action.

Warning: The Sole purpose of this article is to highlight the loophole in security. I am not responsible if you use it with malicious intentions and get caught..!!

    It is only for educational purposes. Don’t use it with wrong intension.

How to Hack Your Friend’s Facebook Account:


  • First of all, create three new Facebook Accounts and add all these three accounts in your friend’s friend list. If you are done with the first step then you have done 90% of your work.
  • Click on Forgot your Password button. It will show three options to recover your password.
  • In the first option give his Email Address and in the Name field give your Friend’s Full Name, your name and click on Search button.
  • Now if everything goes well you will see the profile picture of that person. Here click on the No longer have access to these.
  • Now Enter your New Email address which doesn’t associated with any facebook account yet and click on Submit button.
  • Now you will be prompted to Security question. If you know the answer then it is well and good otherwise, give wrong answers for three times.
  • Now after three unsuccessful attempts, it will ask you to recover your account with trusted friend feature. Click on Continue button.
  • It will ask you to choose three friends. Select your created accounts from the list and click on Continue button each time.
  • After selecting three friends, Facebook will send security codes to the Email address associated with those fake accounts. Login to each account and fill the security codes in the same manner. Also check spam messages if it is not there.
  • Now you will get password Reset Email on Email Address that you have entered in 5th step (New Email address which doesn’t associated with any facebook account).
    That’s it..! You have hacked your friends Facebook Account. Enjoy..!!

Comments

Popular posts from this blog

SESSION HIJACKING

What is Session Hijacking ? Session hijacking is the act of taking control of a user session after successfully obtaining or generating an authentication session ID. Session hijacking involves an attacker using captured, brute forced or reverse-engineered session IDs to seize control of a legitimate user's Web application session while that session is still in progress. TCP session hijacking is when a hacker takes over a TCP session between two machines. Since most authentication only occurs at the start of a TCP session, this allows the hacker to gain access to a machine. Techniques : There are mainly three methods used to perpetrate a session hijack. These are: 1. Session Fixation: The session fixation attack is a class of Session Hijacking, which steals the established session between the client and the Web Server after the user logs in. Instead, the Session Fixation attack fixes an established session on the victim's browser, so the attack starts...

Major Cyber Attacks, Ransomware Attacks & Data Breaches — August 2025

  📌 Executive Summary August 2025 witnessed one of the most turbulent months in cybersecurity, with insurance giants, luxury fashion brands, airlines, and tech leaders like Google falling victim to attacks. Ransomware : Healthcare, energy, and government agencies remained prime targets. Data Breaches : Customer records in the millions exposed from airlines, fintech, and retail. New Malware & Vulnerabilities : Emerging strains like DeepHound RAT and new critical flaws in Microsoft Exchange raised red flags. Key Trend : Threat actors continue to shift toward supply chain attacks and extortion-focused ransomware campaigns  Timeline of Major Cyber Incidents — August 2025 🔒 Ransomware Attacks in August 2025 Ransomware continued to dominate the cyber threat landscape: Insurance & Finance : A major global insurer suffered system-wide downtime due to the BlackBasta group . Healthcare : Hospitals in the US and Europe disrupted by LockBit 4.0 , delayi...

Next-Gen Infrastructure: The Key to Unlocking Business Success

Key points Artificial Intelligence (AI)  is driving the need for next-generation data centers that can support high-performance computing , low-latency data transfer , and sustainable operations . AI data centers  are specifically designed to handle complex AI workloads , featuring specialized hardware accelerators , advanced cooling systems , and high-performance storage . Hyperscale cloud providers ,  neocloud providers , and  colocation specialists  are key players in the AI data center landscape, each offering unique advantages and challenges. As I report from the world of technology,  Artificial Intelligence (AI)  is moving at an unprecedented pace, with innovations expanding its capabilities at a rapid rate. This has significant implications for  enterprise architecture , as existing data center capabilities are no longer sufficient to support the demands of AI workloads. According to sources, the rapid evolution of AI requires  next-ge...