
Facebook or Twitter account, the server returns a session cookie, which is a piece of data that indicates the user to the server and provides them access to their account. When the user login an online account i.e. This attack generated by saved cookies from your browser. Learn to manage your DNS server and firewall securely. Spoofing attacks can go on for a long period without being detected and can cause severe security issues. DNS Spoofing/ Cache Poisoning AttackĭNS Spoofing is a type of malicious attack wherein a user is forced to navigate to a fake website page disguised to look like a legitimate one, divert traffic or steal credentials of the users.Īttackers can poison a DNS cache by manipulating DNS resolvers into caching false information, with the result that the resolver sends the wrong IP address to users, and users attempting to navigate to a website will be directed to the wrong place. Moreover, do not log in through messages and emails. This attack requires persistence and excellent skills for making the victim login from your duplicate fake page.ĭouble-check the URL before entering your credentials or any personal information. This is the most effective technique because many users can not differentiate between the real and fake sites’ login pages and get fooled by giving their credentials. When a victim enters its credentials, it directly redirects to the hacker’s machine.

In this attack, a hacker will make a fake social media login page that looks legitimate and share it with victims to get login from a fake site. Phishing is the most common yet most effective tactic used by hackers to fool people and steal their information. Besides, use VPN and Proxy server to access the network. By using this tool, hackers can intercept between the machine and a server, captures the request that is generated by machine to the server, and alters it by requesting another thing from the server.Īlways use a good antivirus with a firewall that can detect the fake user. A user may think he is communicating with a legitimate user, but actually, all the conversation is passing through hacker, and he possibly alters their communication without their knowledge.įor this purpose, BurpSuite is the commonly used tool by hackers to perform a man in the middle attack. This type of attack occurs when a hacker privately steals and alters the communication between the sender and receiver. These are the most common attacks a hacker can perform: Man in the Middle Attack In this article, I will explain each tactic of a malicious hacker so that you will get an idea of how these hackers can hack social media accounts.

How Hacker Accesses Your Social Media Account How Hacker Accesses Your Social Media Account.
