SlideShare uma empresa Scribd logo
1 de 15
Presented By El Rumi
@IDSECCONF 2011
Social Network & Facebook
Social Network




        Social Network is a social structure made up of individuals (or
 organizations) called "nodes", which are tied (connected) by one or more
 specific types of interdependency, such as friendship, kinship, common
 interest, financial exchange, dislike, sexual relationships, or relationships of
 beliefs, knowledge or prestige.
 (source: http://en.wikipedia.org/wiki/Social_network)
Social Network & Facebook
Facebook




   A “social networking” site
   Framework for information
   Complex control of who can see what
   Users have a “profile” with a picture* and other personal details as they
    wish, including “limited profile”
   Based on “Networks”
   Facebook creates a newsfeed based on what your “friends” are doing


  (source: http://users.ox.ac.uk/~tony/facebook.ppt)
Facebook Account Security




  (source: https://www.facebook.com/help/?faq=212183815469410)
True Story....
Let’s Start The Game
Proof of Concept! (Identification)
Proof of Concept! (Penetration)
Proof of Concept! (Penetration)
Proof of Concept! (Penetration)
Proof of Concept! (Owned)
Can We Prevent This?
Change Security Question?




     (source: https://www.facebook.com/help/?faq=163063243756483)
So?
 Hide Your Sensitive Data From Public.
 Hide Your Email From Public.
 Make Security Question :
   With Different Thing Answer But Easy To Remember.
   With Right Answer But Encrypted (md5, sha1, rot13, etc)
Video Demo
“If any skiddy community gets too big, we shut them down.
If any lamer causes too much trouble, we shut them down. If
any group keeps fucking stuff up, we stop them.”
-Elz (Kecoak Elektronik)-

(source: http://kecoak.org/log/2010/12/25/owned-and-exposed-pwned-
some-skiddy/)

Mais conteúdo relacionado

Mais procurados

Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
nadikari123
 
FILM 260 Flipbook- Virtually Impossible? Privacy Within Social Media
FILM 260 Flipbook- Virtually Impossible? Privacy Within Social MediaFILM 260 Flipbook- Virtually Impossible? Privacy Within Social Media
FILM 260 Flipbook- Virtually Impossible? Privacy Within Social Media
NicoleDrutz
 
2013: Comp113 lecture 1 part two
2013: Comp113 lecture 1 part two2013: Comp113 lecture 1 part two
2013: Comp113 lecture 1 part two
COMP 113
 
Presentation social media
Presentation social mediaPresentation social media
Presentation social media
Eduardo Ferro
 
Cloud Computing, Social Networking and Social Media
Cloud Computing, Social Networking and Social MediaCloud Computing, Social Networking and Social Media
Cloud Computing, Social Networking and Social Media
Molly Immendorf
 

Mais procurados (20)

Social network privacy & security
Social network privacy & securitySocial network privacy & security
Social network privacy & security
 
FILM 260 Flipbook- Virtually Impossible? Privacy Within Social Media
FILM 260 Flipbook- Virtually Impossible? Privacy Within Social MediaFILM 260 Flipbook- Virtually Impossible? Privacy Within Social Media
FILM 260 Flipbook- Virtually Impossible? Privacy Within Social Media
 
Northern District Department Head Meeting
Northern District Department Head MeetingNorthern District Department Head Meeting
Northern District Department Head Meeting
 
YANCOI
YANCOIYANCOI
YANCOI
 
07 12 19 Technologies And Polarities
07 12 19 Technologies And Polarities07 12 19 Technologies And Polarities
07 12 19 Technologies And Polarities
 
Web 2thtrtgrst
Web 2thtrtgrstWeb 2thtrtgrst
Web 2thtrtgrst
 
2013: Comp113 lecture 1 part two
2013: Comp113 lecture 1 part two2013: Comp113 lecture 1 part two
2013: Comp113 lecture 1 part two
 
Internet
InternetInternet
Internet
 
Technology empowerment ict today
Technology empowerment ict todayTechnology empowerment ict today
Technology empowerment ict today
 
Class 3 ppt
Class 3 pptClass 3 ppt
Class 3 ppt
 
Web
WebWeb
Web
 
20090228 Cyber Safety
20090228 Cyber Safety20090228 Cyber Safety
20090228 Cyber Safety
 
Web2.0 An Introduction
Web2.0 An IntroductionWeb2.0 An Introduction
Web2.0 An Introduction
 
Presentation social media
Presentation social mediaPresentation social media
Presentation social media
 
New Media Technology- Cyber Society and the Interaction Channel
New Media Technology- Cyber Society and the Interaction ChannelNew Media Technology- Cyber Society and the Interaction Channel
New Media Technology- Cyber Society and the Interaction Channel
 
Media, Technology and Society - The new trends of social interaction
Media, Technology and Society - The new trends of social interactionMedia, Technology and Society - The new trends of social interaction
Media, Technology and Society - The new trends of social interaction
 
2.0
2.02.0
2.0
 
Cloud Computing, Social Networking and Social Media
Cloud Computing, Social Networking and Social MediaCloud Computing, Social Networking and Social Media
Cloud Computing, Social Networking and Social Media
 
What is Social Media?
What is Social Media?What is Social Media?
What is Social Media?
 
Social Media Beyond Facebook and Twitter
Social Media Beyond Facebook and TwitterSocial Media Beyond Facebook and Twitter
Social Media Beyond Facebook and Twitter
 

Destaque

Password hacking
Password hackingPassword hacking
Password hacking
Abhay pal
 
Phone security code unlock message
Phone security code unlock messagePhone security code unlock message
Phone security code unlock message
Mansoor Rafeeq
 
Butterfly group( facebook)
Butterfly group( facebook)Butterfly group( facebook)
Butterfly group( facebook)
bushra1413
 
Password Recovery Tools
Password Recovery ToolsPassword Recovery Tools
Password Recovery Tools
Andrey Belenko
 
All nokia master codes
All nokia master codesAll nokia master codes
All nokia master codes
Muhammad Sadiq
 

Destaque (17)

Password hacking
Password hackingPassword hacking
Password hacking
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hacking
 
Secret Codes
Secret CodesSecret Codes
Secret Codes
 
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
 
Phone security code unlock message
Phone security code unlock messagePhone security code unlock message
Phone security code unlock message
 
Samsung Mobile Phone Codes
Samsung Mobile Phone CodesSamsung Mobile Phone Codes
Samsung Mobile Phone Codes
 
Butterfly group( facebook)
Butterfly group( facebook)Butterfly group( facebook)
Butterfly group( facebook)
 
MEI Unlock - Use Any Network on your Smartphone without Restriction
MEI Unlock - Use Any Network on your Smartphone without RestrictionMEI Unlock - Use Any Network on your Smartphone without Restriction
MEI Unlock - Use Any Network on your Smartphone without Restriction
 
Password Recovery Tools
Password Recovery ToolsPassword Recovery Tools
Password Recovery Tools
 
All nokia master codes
All nokia master codesAll nokia master codes
All nokia master codes
 
Nokia secret codes.
Nokia secret codes.Nokia secret codes.
Nokia secret codes.
 
HOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGES
HOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGESHOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGES
HOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGES
 
Food Fight—MPI St. Louis
Food Fight—MPI St. LouisFood Fight—MPI St. Louis
Food Fight—MPI St. Louis
 
Facebook Not Just a Social Network!
Facebook Not Just a Social Network!Facebook Not Just a Social Network!
Facebook Not Just a Social Network!
 
Guide to hack Facebook Password
Guide to hack Facebook PasswordGuide to hack Facebook Password
Guide to hack Facebook Password
 
How to spy on facebook messenger
How to spy on facebook messengerHow to spy on facebook messenger
How to spy on facebook messenger
 
Facebook Messages Demystified
Facebook Messages DemystifiedFacebook Messages Demystified
Facebook Messages Demystified
 

Semelhante a How I Hack, Hacker Facebook Account

Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & Networks
Ray Brannon
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & Networks
Ray Brannon
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & Networks
Ray Brannon
 
Social Networking And Social Media May 5 2009 Final V1
Social Networking And Social Media May 5 2009  Final V1Social Networking And Social Media May 5 2009  Final V1
Social Networking And Social Media May 5 2009 Final V1
Molly Immendorf
 
Social media impact on existing social relationships
Social media impact on existing social relationshipsSocial media impact on existing social relationships
Social media impact on existing social relationships
Elizabeth Gestier
 
Social networking
Social networkingSocial networking
Social networking
Johan Koren
 
Production Assignment
Production AssignmentProduction Assignment
Production Assignment
crumbsy
 

Semelhante a How I Hack, Hacker Facebook Account (20)

Social Networks
Social NetworksSocial Networks
Social Networks
 
The Future of Social Networks: The Need for Semantics
The Future of Social Networks: The Need for SemanticsThe Future of Social Networks: The Need for Semantics
The Future of Social Networks: The Need for Semantics
 
อบรม1
อบรม1อบรม1
อบรม1
 
The Social Semantic Web: An Introduction
The Social Semantic Web: An IntroductionThe Social Semantic Web: An Introduction
The Social Semantic Web: An Introduction
 
DM110 - Week 4 - Social Networks
DM110 - Week 4 - Social NetworksDM110 - Week 4 - Social Networks
DM110 - Week 4 - Social Networks
 
Social Semantic Web (Social Activity and Facebook)
Social Semantic Web (Social Activity and Facebook)Social Semantic Web (Social Activity and Facebook)
Social Semantic Web (Social Activity and Facebook)
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & Networks
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & Networks
 
Chapter 5 Groups & Networks
Chapter 5  Groups & NetworksChapter 5  Groups & Networks
Chapter 5 Groups & Networks
 
Interactive Innovation Through Social Software And Web 2.0
Interactive Innovation Through Social Software And Web 2.0Interactive Innovation Through Social Software And Web 2.0
Interactive Innovation Through Social Software And Web 2.0
 
Social Networking And Social Media May 5 2009 Final V1
Social Networking And Social Media May 5 2009  Final V1Social Networking And Social Media May 5 2009  Final V1
Social Networking And Social Media May 5 2009 Final V1
 
Social media for social learning
Social media for social learningSocial media for social learning
Social media for social learning
 
Social Networking and Collaboration Tools for Enterprise 2.0
Social Networking and Collaboration Tools for Enterprise 2.0Social Networking and Collaboration Tools for Enterprise 2.0
Social Networking and Collaboration Tools for Enterprise 2.0
 
Social Media
Social MediaSocial Media
Social Media
 
Julie Clegg
Julie CleggJulie Clegg
Julie Clegg
 
Social media impact on existing social relationships
Social media impact on existing social relationshipsSocial media impact on existing social relationships
Social media impact on existing social relationships
 
Social networking
Social networkingSocial networking
Social networking
 
Data Accessibility and Me: Introducing SIOC, FOAF and the Linked Data Web
Data Accessibility and Me: Introducing SIOC, FOAF and the Linked Data WebData Accessibility and Me: Introducing SIOC, FOAF and the Linked Data Web
Data Accessibility and Me: Introducing SIOC, FOAF and the Linked Data Web
 
Challenging our Notions of Learning: Understanding How Web 2.0 Technology Wor...
Challenging our Notions of Learning: Understanding How Web 2.0 Technology Wor...Challenging our Notions of Learning: Understanding How Web 2.0 Technology Wor...
Challenging our Notions of Learning: Understanding How Web 2.0 Technology Wor...
 
Production Assignment
Production AssignmentProduction Assignment
Production Assignment
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Último (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

How I Hack, Hacker Facebook Account

  • 1. Presented By El Rumi @IDSECCONF 2011
  • 2. Social Network & Facebook Social Network Social Network is a social structure made up of individuals (or organizations) called "nodes", which are tied (connected) by one or more specific types of interdependency, such as friendship, kinship, common interest, financial exchange, dislike, sexual relationships, or relationships of beliefs, knowledge or prestige. (source: http://en.wikipedia.org/wiki/Social_network)
  • 3. Social Network & Facebook Facebook  A “social networking” site  Framework for information  Complex control of who can see what  Users have a “profile” with a picture* and other personal details as they wish, including “limited profile”  Based on “Networks”  Facebook creates a newsfeed based on what your “friends” are doing (source: http://users.ox.ac.uk/~tony/facebook.ppt)
  • 4. Facebook Account Security (source: https://www.facebook.com/help/?faq=212183815469410)
  • 7. Proof of Concept! (Identification)
  • 8. Proof of Concept! (Penetration)
  • 9. Proof of Concept! (Penetration)
  • 10. Proof of Concept! (Penetration)
  • 11. Proof of Concept! (Owned)
  • 12. Can We Prevent This? Change Security Question? (source: https://www.facebook.com/help/?faq=163063243756483)
  • 13. So?  Hide Your Sensitive Data From Public.  Hide Your Email From Public.  Make Security Question :  With Different Thing Answer But Easy To Remember.  With Right Answer But Encrypted (md5, sha1, rot13, etc)
  • 15. “If any skiddy community gets too big, we shut them down. If any lamer causes too much trouble, we shut them down. If any group keeps fucking stuff up, we stop them.” -Elz (Kecoak Elektronik)- (source: http://kecoak.org/log/2010/12/25/owned-and-exposed-pwned- some-skiddy/)