Facebook vulnerability exploitation

4
Facebook vulnerability exploitation-social engineering This method is meant to exploit the ignorance of people when submitting credential such as user names and passwords commonly known as social engineering or manipulation Spoof –we will clone Facebook login template to the link created. Requirements 1. Kali Linux operating system installed. 2. Interesting topic that people can follow a link about example earn money, reduced prices and others be creative. 3. Internet access. 4. Facebook login address the www thingy. 5. The kali Linux ip address try www.whatismyip.com to get yours Steps Hoping you got your kali Linux os powered on we can begin By clicking this it will open a terminal. Poker face ruhiu [email protected]

Transcript of Facebook vulnerability exploitation

Page 1: Facebook vulnerability exploitation

Facebook vulnerability exploitation-social engineering

This method is meant to exploit the ignorance of people when submitting credential such as user names and passwords commonly known as social engineering or manipulation

Spoof –we will clone Facebook login template to the link created.

Requirements

1. Kali Linux operating system installed.2. Interesting topic that people can follow a link about example earn money, reduced prices

and others be creative.3. Internet access.4. Facebook login address the www thingy.5. The kali Linux ip address try www.whatismyip.com to get yours

Steps

Hoping you got your kali Linux os powered on we can begin

By clicking this it will open a terminal.

[email protected]

Page 2: Facebook vulnerability exploitation

The following will be a continued procedure of command s expected of you to enter.

Choose; note use the numbers and press enter

a) Social engineering attacksb) Credential harvester attack methodc) Web templatesd) facebook

Note where to input the ip address.

[email protected]

Page 3: Facebook vulnerability exploitation

The ip address above will get cloned to the facebook login page.Though it can be hard to convince someone to take the ip address we shall convert it to a link we use

www.bitly.com copy the ip address to the shorten box and click on it. You get the following result

You can attach the link to an eye catching comment on Facebook or a tweet on tweeter. If someone follows the link and enters their info it will be send back to in the terminal.

This is meant for educational purposes of Facebook vulnerability by use of social engineering. Have fun

[email protected]