Welcome back, my fellow hackerians! Today we'll be hacking Facebook profiles on your local network. You may think, "How is this useful, nobody but me is using my network." Well, you can use this on other Wi-Fi networks that are available for free (like at Starbucks) and crack their precious Facebook profile!
Quick note: This only works if your target is actually browsing through Facebook over http (not https) at the time you're doing the hack.
We are going to use a well known method called "The cookie injection method." This might be far off from becoming "elite," but you need to get familiar with your Linux distribution first.
For this hack, you'll need a few things. Nothing special, but you'll need this stuff. My best suggestion is that you first install BackTrack, Kali Linux, or Bugtraq because they have almost everything we need.
For this little magic trick, we'll need:
- A working Linux distribution (preferably Kali, Backtrack or Bugtraq)
- Wireshark (a packet sniffer)
- Firefox (web browser)
- Nmap (scanner)
- Greasemonkey (addon for Firefox)
- Cookie injector (script for Greasemonkey)*
Now let's start doing some magic! :D*
First, to actually connect to a target, we'll need an IP address. In order to get that, you'll need to do a network scan with Nmap. So go ahead and boot up your terminal and enter the following command:
- nmap -F 192.168.xx.xx/24
Note: If this doesn't work, use 10.0.x.x/24 instead.
This command will scan your network for any IP addresses connected to it. The -F gives the console the instruction to use "Fast mode." If done correctly, you should see something like this:
That's how your Nmap scan should look like.
Now we're going to start a man-in-the-middle attack, MITM for short.
An MITM attack is an attack were we spoof our MAC address so that when a server/responding person sends a message to the other, he won't be receiving that message, but he will receive messages that we send, as we're the Man in the middle.
This might help you understand:
A man-in-the-middle attack!
To start, enter the following command in a NEW terminal window:
- sudo echo 1 >> /proc/sys/net/ipv4/ip_forward
This will forward your IP address. Now we're starting the MITM by opening a NEW terminal window and entering this command:
- sudo arpspoof -i [Interface] -t [target] [default gateway]
If you don't know your interface and default gateway, start a new terminal and enter: ifconfig.
This is the result form the arpspoof.
Open (once again -_-) a new terminal window and enter the following command:
- sudo arpspoof -i [interface] -t [default gateway] [target]
Another result from the arpspoof!
Note: After you entered both the arpspoof commands DON'T CLOSE THE TERMINALS.
We need a few more things in order to complete this hack!
First install Firefox,
- sudo apt-get install wireshark
After that, open up a Wireshark session (open a terminal and enter sudo Wireshark as command). Select your interface and start capturing. At the top, you should see an input box where you can add filters. Now enter this filter:
- http.cookie contains DATR
Now you should get a list in Wireshark. Search for a cookie that contains the text GET. Locate it, click on it with the left mouse button, select copy, select bytes, select printable text only.
Wireshark result. The one you need is in the black circle.
Now go to Wireshark and go to Facebook. Make sure you're NOT logged in. If you are, go to settings and delete all the cookies. Then go back to the Facebook log-in page, press [ALT]+C, and paste the cookie. Press OK and refresh the page.
Here you can clearly see the cookie injector script input box.
If my magic worked, you should see the main Facebook timeline. If not, then you've done something wrong.
This hack may seem advanced, but it's actually really easy. Once you break down all the steps, it's a piece of cake! :D
Now that you've done this, it should be clear that Facebook security isn't very strong :P
Good luck, my fellow hackerians, and I'll see you next time!
Don't forget to give kudos and follow me for more hacking tutorials. Also, if you have any questions, don't be afraid to ask them!