Disqus for Cyber Fort

Showing posts with label facebook. Show all posts
Showing posts with label facebook. Show all posts

Sunday 25 August 2013

Harness the power of social media

Be The First To Comment
Saturday, Aug 24, 2013, 7:28 IST | Agency: Daily Telegraph

Rebecca Burn-Callander talks to four entrepreneurs about their tried-and-tested tips for creating a social media sensation.


Facebook. Instagram. Pinterest. Myspace. Bebo. There are more than 200 social-networking sites active across the globe, hosting trillions of conversations and billions of gigabytes of data. Over the past few years, small businesses have begun to harness the power of these networks to talk about their brand, engage customers, drive leads and ramp up sales. But there are a few hard-and-fast rules that business owners should adhere to if they want to avoid going from social hero to hapless zero.

AVOID THE HARD SELL Coupons, discounts and competitions work well on social media. "Buy now" does not. "You want to create content that people find fun and want to share," says Amelia Harvey, founder of Collective, a yogurt manufacturer. "We never say, 'We're on promotion', or 'Go buy us'. We do talk about new flavours and new stockists but only in a way that informs and helps out our customers, never in a 'selling' way." Ms Harvey and fellow ex-Gu executive Mike Hodgson launched Collective in 2011.
The pair have used the company's social media feedback to get her products in front of new supermarket buyers. "It's incredibly compelling to have all these positive interactions with our customers - mostly unsolicited too. Being able to demonstrate the power of the brand to new stockists is probably one of the reasons why we're the fastest-growing yogurt brand in the UK right now." Collective's products are currently stocked in big stores such as Sainsbury's, Tesco, Morrisons, Boots and Waitrose and the business now turns over pounds 3.7m a year.
BE VISUAL "We spend upwards of pounds 20,000 each year on photographing and watermarking our products and share most of these images online," says Paul Charalambous, founder of Lego reseller Firestar Toys. "We are incredibly lucky to have a product that people want to look at and talk about to their friends." Firestar Toys currently boasts 45,000 Facebook fans, nearly 3,000 Twitter followers, and "pins" pictures regularly on Pinterest and Instagram as well as running a Google+ page. "We post cool Lego stuff on a daily basis," says Mr Charalambous. "We're probably most active on Facebook and Twitter but you have to be on Google+ because it's run by the biggest search engine in the world." Firestar Toys' visual approach to social media caught the attention of Fox Studios earlier this year. "We can customise Lego mini-figures to look like real people and are one of the only companies in the world with the sheer volumes of parts - such as hair, accessories, torsos - it takes to build a customised figure," says Mr Charalambous. "We can then print directly on to the figure or add branded T-shirts."
Firestar Toys shares images of these customisations on Facebook and Twitter and when an executive from Fox Studios was looking for bespoke Lego figures, these turned up in a Google Images search. "The studio had just wrapped up filming The Heat, starring Sandra Bullock, and wanted to create 50 Lego mini-figures of the two leads to give away to the cast," says Mr Charalambous. "We shipped the order and are now the official supplier of Lego figures for Fox." Martin McLaughlin, co-founder of pounds 1.2m-turnover popcorn maker Love Da Popcorn, also evangelises the benefits of running visual campaigns on social media.
"We put out a challenge asking people to post a photo that they believed truly represented our brand," he says. "A girl sent in a picture of her in a bath of popcorn, wearing a top hat, holding a glass of champagne and a pack of our sea salt and black pepper flavour. The image went viral, attracting nearly 6m hits. It was an incredible piece of free publicity for the business." DRILL
DOWN INTO YOUR DATA Social-media strategy should never be decided on a wing and a prayer. According to Shingo Murakami, managing director of Rakuten's Play.com, a global e-commerce retailer of music, films, books and clothes, it's all about using data to devise smart social campaigns. "Businesses should utilise customer insights from social media and tailor messages for consumers based on personal preferences and interests. We track individual fans to create much more targeted email communications based on a combination of social data and traditional customer relationship management data," says Murakami.
Rakuten's Play.com is reaping the rewards of this data-centric strategy; its social interactions are now contributing directly to sales: "We're able to measure the value of socially engaged fans versus those who have purchased directly via our website and our findings reveal that average revenue increases by 24pc once an existing customer becomes a fan," says Mr Murakami."
Moreover, by crunching its sales data, Rakuten's Play.com has discovered its customers are 30pc more valuable over the following six months if they are acquired via social media, compared with customers acquired through traditional online channels. Take conversation into the real world Smart business owners everywhere are taking the insights derived from social media and turning them into real-world actions.
When Love Da Popcorn's Mr McLaughlin was trying to decide whether to use paper or plastic for his product packaging, he turned to his Facebook fans for help. "Whenever we have questions about new flavours or little tweaks to the business, we always involve our community," he says. "About 10pc of our fans usually respond." In this case, the people chose paper over plastic, which was the ideal fit for the brand's retro-style look and feel.
Crowd-sourcing answers to challenges is one way to make use of the real-world benefits of social media but bridging the online-offline divide is also invaluable for cementing the relationship between a company and its customer. Mr McLaughlin recently launched "Operation Awesome" across all the company's social media platforms to see if the brand could successfully engage with customers offline as well.
"When someone posts a picture of themselves with our popcorn on Twitter or Facebook, we do 'something awesome' in return," he explains. "It's a kind of 'good deed generator'. We've given blood, released a load of helium balloons tied to lottery tickets, and even dressed the team up in silly costumes to cheer up a customer who was having a bad day." The campaign has proved so successful that it is now "logistically difficult to keep up with the volumes of posts," says Mr McLaughlin. But luckily, Love Da Popcorn has a back-up plan.
"Our Facebook community is so engaged that we're thinking of asking them to start doing awesome things on our behalf," he explains. "If we can make this work, it will be an incredible exercise in 'pass it on' good deeds. This could be truly amazing for the brand."


Read More

Wednesday 21 August 2013

Mark Zuckerberg launches Internet.org to connect ‘the next 5 billion’ people

Be The First To Comment
facebook founder
August 20, 2013 9:35 PM 


Facebook CEO Mark Zuckerberg and a slew of partners just launched Internet.org to bring digital connectivity to the world.
According to a press release, the founding members of the initiative include Facebook, Ericsson, MediaTek, Nokia, Opera, Qualcomm and Samsung. These technology giants have committed to developing joint projects, sharing knowledge, and mobilizing governments.
Aside from the societal benefits of bringing access, Facebook has plenty to gain from Internet.org. It’s a massive customer acquisition and expansion plan. Currently, one in seven people in the world use the social network. That number would drastically increase if the four billion people who live in poverty or in rural areas were granted Internet access.
Zuck announced the news on a rare Facebook status update this evening, which amassed thousands of likes in mere seconds. He wrote:

For nine years, we’ve been on a mission to connect the world. We now connect more than 1 billion people, but to connect the next 5 billion we must solve a much bigger problem: the vast majority of people don’t have access to the internet.
“I’m focused on this because I think it’s one of the greatest challenges of our generation. I’ve attached a rough plan I’ve written outlining the work Facebook is doing to solve this and how our industry can work together to connect the next 5 billion people.”

For those who are curious about the specifics, Zuckerberg admitted that he only has a “rough plan.” However, the New York Times reports that the primary goal for the project is to cut the cost of delivering Internet services on mobile phones, particularly in the developing world. The group intends to develop new business models that would allow phone companies to provide simple services like e-mail, and of course, access to social networking sites like Facebook or Twitter at no charge.
Indeed, developing countries in Asia and Africa offer a huge market opportunity for tech companies — if they can figure out how to get people connected.
Various tech and mobile executives voiced public support for the initiative, alongside Zuckerberg. Google is noticeably absent from the lineup, despite that the search giant has invested heavily on improving Internet access. The latest unconventional idea, dubbed “Project Loon,” would deliver WiFi — believe it or not — by balloon.
In a statement, Nokia CEO Stephen Elop said the European phone maker got involved as “universal internet access will be the next great industrial revolution.” Paul Jacobs, chief executive of Qualcomm, echoed similar statements. He said, “mobile has helped to transform many people’s lives in the emerging regions where often a computing device will be the first and only mobile experience they’ll ever have.”

Be warned, it’s filled with marketing jargon — but check out the full press release here.

internet.org

Is connectivity a human right ?

For almost ten years, Facebook has been on a mission to make the world more open and connected. Today we connect more than 1.15 billion people each month, but as we started thinking about connecting the next 5 billion, we realized something important: the vast majority of people in the world don’t have access to the internet.
Today, only 2.7 billion people are online — a little more than one third of the world. That is growing by less than 9% a year, but that’s slow considering how early we are in the internet’s development. Even though projections show most people will get smartphones in the next decade, most people still won’t have data access because the cost of data remains much more expensive than the price of a smartphone.
Below, I’ll share a rough proposal for how we can connect the next 5 billion people, and a rough plan to work together as an industry to get there. We’ll discuss how we can make internet access more affordable by making it more efficient to deliver data, how we can use less data by improving the efficiency of the apps we build and how we can help businesses drive internet access by developing a new model to get people online.
I call this a “rough plan” because, like many long term technology projects, we expect the details to evolve. It may be possible to achieve more than we lay out here, but it may also be more challenging than we predict. The specific technical work will evolve as people contribute better ideas, and we welcome all feedback on how to improve this.

read more at:- http://bit.ly/16vaQAW
Read More

Tuesday 20 August 2013

Top 5 Computer Programmers In The World

2 Comments
here is the world's top 5 programmers are who changed the completely of computer era and make it gift to us developing computer software, programs and also operating system

1. Dennis Ritchie
c,c++


Dennis MacAlistair Ritchie was an American computer scientist who "helped shape the digital era." He created the C programming language and, with long-time colleague Ken Thompson, the Unix operating system.

Dennis MacAlistair Ritchie (September 9, 1941 – c. October 12, 2011) was an American computer scientist who "helped shape the digital era."He created the C programming language and, with long-time colleague Ken Thompson, the Unix operating system. Ritchie and Thompson received the Turing Award from the ACM in 1983, the Hamming Medal from the IEEE in 1990 and the National Medal of Technology from President Clinton in 1999. Ritchie was the head of Lucent Technologies System Software Research Department when he retired in 2007. He was the 'R' in K&R C and commonly known by his username dmr.

2. Mark Zuckerberg

founder of facebook


Mark Elliot Zuckerberg is an American computer programmer and internet entrepreneur. He is best known as one of five co-founders of the social networking website Facebook.
Mark Elliot Zuckerberg (born May 14, 1984) is an American computer programmer and internet entrepreneur. He is best known as one of five co-founders of the social networking website Facebook. As of April 2013, Zuckerberg is the chairman and chief executive of Facebook, Inc. and in 2013 his personal wealth was estimated to be US$16.8 billion.
Together with his college roommates and fellow Harvard University students Eduardo Saverin, Andrew McCollum, Dustin Moskovitz and Chris Hughes, Zuckerberg launched Facebook from Harvard's dormitory rooms. The group then introduced Facebook onto other campuses nationwide and moved to Palo Alto, California, United States (U.S.) shortly afterwards. In 2007, at the age of 23, Zuckerberg became a billionaire as a result of Facebook and the number of Facebook users worldwide reached a total of one billion in 2012. Zuckerberg was involved in various legal disputes that were initiated by others in the group, who claimed a share of the company based upon their involvement during the development phase of Facebook.
Since 2010, Time magazine has named Zuckerberg among the 100 wealthiest and most influential people in the world as a part of its Person of the Year distinction. In 2011, Zuckerberg ranked first on the list of the "Most Influential Jews in the World" by The Jerusalem Post and has since consistently topped the list every year as of 2013.Zuckerberg was played by actor Jesse Eisenberg in the 2010 film The Social Network, in which the rise of Facebook is portrayed.

3. Steve Wozniak

Stephen Gary "Steve" Wozniak, known as "Woz", is an American inventor, computer engineer and programmer who co-founded Apple Computer with Steve Jobs and Ronald Wayne
Stephen Gary "SteveWozniak (born August 11, 1950),known as "Woz", is an American inventorcomputer engineer and programmer who co-founded Apple Computer (now Apple Inc.) with Steve Jobs and Ronald Wayne. Wozniak single-handedly invented both the Apple I and Apple IIcomputers in the 1970s. These computers contributed significantly to the microcomputer revolution.

4. Bill Gates

William Henry "Bill" Gates III is an American business magnate, investor, programmer, inventor and philanthropist
Gates is the former chief executive and current chairman of Microsoft, the world’s largest personal-computer software company, which he co-founded with Paul Allen.
He is consistently ranked in the Forbes list of the world's wealthiest people and was the wealthiest overall from 1995 to 2009—excluding 2008, when he was ranked third;in 2011 he was the wealthiest American and the world's second wealthiest person.According to the Bloomberg Billionaires List, Gates is the world's richest person in 2013, a position that he last held on the list in 2007.
During his career at Microsoft, Gates held the positions of CEO and chief software architect, and remains the largest individual shareholder, with 6.4 percent of the common stock. He has also authored and co-authored several books.
Gates is one of the best-known entrepreneurs of the personal computer revolution. Gates has been criticized for his business tactics, which have been considered anti-competitive, an opinion which has in some cases been upheld by the courts. In the later stages of his career, Gates has pursued a number of philanthropic endeavors, donating large amounts of money to various charitable organizations and scientific research programs through the Bill & Melinda Gates Foundation, established in 2000.
Gates stepped down as chief executive officer of Microsoft in January 2000. He remained as chairman and created the position of chief software architect. In June 2006, Gates announced that he would be transitioning from full-time work at Microsoft to part-time work, and full-time work at the Bill & Melinda Gates Foundation. He gradually transferred his duties to Ray Ozzie, chief software architect, and Craig Mundie, chief research and strategy officer. Gates's last full-time day at Microsoft was June 27, 2008. He remains at Microsoft as non-executive chairman.

5. Linus Torvalds
Linus Benedict Torvalds is a Finnish American software engineer, who was the principal force behind the development of the Linux kernel. He later became the chief architect of the Linux kernel, and now acts as the project's coordinator
Linus Benedict Torvalds (born December 28, 1969) is a Finnish American software engineer, who was the principal force behind the development of the Linux kernel. He later became the chief architect of the Linux kernel, and now acts as the project's coordinator. He also created the revision control system Git as well as the diving log software Subsurface. He was honored, along with Shinya Yamanaka, with the 2012 Millennium Technology Prize by the Technology Academy Finland "in recognition of his creation of a new open source operating system for computers leading to the widely used Linux kernel".

these are the best  5 top programmers our world ever get so ...leave comment if any plm u have rgds this...
 
Read More

Sunday 28 July 2013

Facebook keyboard shortcut 2013 Working Hot-Keys

1 Comment


Face book uses the combine keyboard shortcuts i.e. More than one keys to be pressed to access the shortcuts. Out of which some keys are depends upon the type of Operating system and the browser are you using.


For Windows Operating System:
Google Chrome          Alt
Mozilla Firefox            Alt + shift
Internet Explorer         Alt

For MAC OS X:

Firefox           Function + Ctrl
All other        Option + Ctrl
Note: All the shortcut keys works on the numbers that are placed on the top of the keyboard. Not from the notepad. If you are using Google Chrome (In Windows OS) then You have to press the ALT key and a number from shortcut simultaneously to use the shortcuts. Similarly for other browser with the operating system use their respective combo key.

Shortcuts
Functions
M
Open a new message *
?
Go to the Facebook Search
1
Home (News Feed)
2
Your profile page
3
Friend requests
4
Messages
5
Notifications
6
Your Account Settings
7
Your Privacy Settings
8
Go to the Facebook page
9
View Facebook Statements and Rights agreement
0
Open Facebook help center

There are also some Keyboard shortcuts which are used in Face-book Chat and it does not require any combo key.


ESC Closes the current chat window
SHIFT TAB- Hides the current chat window if no text is entered
TAB - Jumps to the next chat window
SHIFT + TAB- Jumps to the previous chat window

Hope you like this articles...

Read More

Thursday 25 July 2013

Apply Two Passwords to your Facebook Profile

1 Comment
Account hijacking is a big problem on Facebook, where attackers figure out your passwords and take over your account. While you should always select strong and unique passwords for each online account you have, it is increasingly clear that just relying on a password is not enough security. This is where two-factor authentication comes in.
Read More

Tuesday 16 July 2013

How to: Hack Any FB Account Using Cookie Stealing

5 Comments
Today in this article I am going to explain how to steal such cookies of different accounts using Cain – Abel and Wireshark software and how to use it to access our victim accounts.
First off I need to say that this will NOT steal anyones password unless they log in while you are monitoring them. This will however give you their cookies which you can use to steal there session and have full acess to their account. This will work for Facebook, a lot of emails (sorry no gmail), and just about any forum (except this one). If you are familiar with SSLstrip you can use this method to hijack any session (paypal, bank websites, any email, etc.)

Facebook Cookie Stealing And Session Hijacking

Wireshark Software to capture cookies:
Wireshark is the best free packet sniffer software available today. Actually, it was developed for making a network secure. But, the same software is now used by hackers to test for vulnerability and security loopholes in the network and to attack the network accordingly. Cookie stealing being one of the types of hacks implemented using this Wireshark software.
Requirements:
Cain and Abel : http://www.oxid.it/cain.html
Wireshark : http://www.wireshark.org/
Firefox 3 (or one compatable with add n edit) : http://www.oldapps.com/firefox.php?old_firefox=59
Add n Edit (cookie editor for firefox) : https://addons.mozilla.org/en-US/firefox/addon/add-n-edit-cookies/
Acess to the network with user you want to hack
Network traffic
Prerequisites: Download and install all above programs. To add “Add n Edit” to your browser just open firefox, go to tools, then click add-ons. you can drag and drop the program from wherever you saved it into the little box that popped up and install it from there.
Below, I have listed steps on how to capture Facebook and other accounts cookies. This will help you to know how Wireshark and Cain-Abel can be used to sniff packets and capture cookies.

First: Gain acess to the Network. Open networks or your own network would be easy but if you have a specific slave you want you should be able to gain acess using Backtrack.
Tip: use reaver to exploit WPS for WPA/WPA2 encryptions, WEPs are easy to crack given time and OPN means there is no password.
Second: Right click Cain and choose ‘run as administrator.’ on the top bar go to ‘configure’ and be sure to select your wireless card/adapter. now click where it says ‘Sniffer’ then this litte button towards the top left:

Next click any empty white box then the blue “+” symbol near the button you pressed just before. choose okay

should look like this:

These are all the devices it was able to detect.

Now we go to APR on the bottom bar. Once again click any empty white box then the blue cross. It’s easiest to just go one by one and choose all possibilities.
Now we have to poison them so we choose the little yellow hazard symbol towards the top left. should now look like this:
we are done here, just minimize Cain for now.
Third: Run wireshark as administrator. On the top bar choose ‘Capture’ then ‘Interfaces.’ Here you will have to choose your interface that is connected to the Network we are sniffing from. if you wait a few seconds you might see some traffic being collected as seen in my photo, just choose that interface b/c thats most likely it.
Wireshark will list and color-code all the traffic it sees for you. To make this simpler we can use the filter to only see the traffic we want, Type “http.cookie” in the filter. (Something to consider is to just filter to “http” and scroll through the entries looking for ones that start with the word “POST” this means that information was submitted to the webpage noted such as a username and a password! so if you see this just look through the details and you should see the info you want, most passwords will be hashed but use this site to decript them:http://www.md5decrypter.co.uk/ )
Here is an image:
You can either look through this information manually or use the search function to find what you want. In my case i want to hijack the session of a user on the forum freerainbowtables.com so i will use the search function (press Ctrl+F, or go to edit -> search) and type in the information i know for sure will be in the entry. if your hijacking someones facebook put ‘facebook’ there. Most of the time to be safe i do not use the first entry i see b/c this will only work if the person is auto logged in, so just go down a few more until you see one you think will work (just use common sense).
What we need are the cookies. Here are what mine look like and how to get there. With practice you will be able to tell which cookies are used for logins and be able to limit failed attempts.
Copy the cookies as value and save them into a notepad (shown in pic above). I would suggest to seperate everywhere you see a “;” bc this suggests that is the begining of the next entry. The text to the left of the = is the name of the cookie and the text to the right is its value.
Final: Open up your firefox browser with Add n Edit enabled. You can get to your add ons by going to tools and they should all be listed in the drop down tab. First go to the website you are hijjacking the session from then open your cookie editor. Should look something like this:

The last thing to do is to change your cookies to match the ones you captured. If the cookies given to you by the site expire (like the ones in my picture do) you will have to delete them and add all the ones we captured earlier in. if they do not expire you can just edit them. Bottom line is all the cookies must match the cookies you captures in the earlier steps EXACTLY! Make sure you do not add any extras and that you did not miss anything. Also all fields must be filled in (Path and Domain as well as Name and Value). My path is “/” and my domain is “.freerainbowtables.com”
mine looks like this:
You are now done, Just close the cookie editor and reload the webpage. If done correctly with the correct cookies you should be logged in as the user you attacked!
So guys, I hope this
Facebook Cookie Stealing And Session Hijacking
will help you to hacking facebook as well as different types of account like hotmail yahoo etc by stealing their cookies. If you have any problem in above Facebook Cookie Stealing And Session Hijacking tutorial, please mention it in comments.
Read More

Monday 1 July 2013

How To Find An Email Address of Facebook Friend

5 Comments
How to find an email on facebook ? This question is most famous and there are so many people out there who are asking this question. One of our reader has asked the same question on our Facebook page and we know that many readers also want to know the procedure to get email from facebook so in this tutorial we will discuss the best way to get the email address of a friend from Facebook profile.

Facebook has an advance and smart privacy setting and you can easily hide your email and other information from any person. So let suppose your friend is a master of Facebook privacy and you want to know his/her email address for whatever purpose.

Tutorial to Get Email Address From Facebook


In this tutorial we will show you the best and smart way to get email of a friend from facebook.

Requirement
  • Yahoo account
  • The person should be your friend on Facebook
  • A brain (Most important)
Go to address.yahoo.com and click the Facebook icon, a dialog box will be appear that will ask your permission.

It takes some time and than you are done, you can see email addresses of your friends. Check the name of the person to whom you have to find the email and than you can easily find any email of Facebook friend. 

 


NOTE: This post is for only educational purpose..

Read More

Wednesday 5 June 2013

Cyber Fort: How To Hack Facebook Accounts In 2013 - Top 5 Ways...

Be The First To Comment
Cyber Fort: How To Hack Facebook Accounts In 2013 - Top 5 Ways...: Is it Possible To Hack Any FaceBook Account ? 1.K eylogging  Difficulty -  Easy Success Rate - 90 %   K ey logging is one of th...
Read More

Tuesday 4 June 2013

How To Hack Facebook Accounts In 2013 - Top 5 Ways

Be The First To Comment

Is it Possible To Hack Any FaceBook Account ?

1.Keylogging 
Difficulty -  Easy
Success Rate - 90 %
 Key logging is one of the Easiest ways that you can use to Hack Face book Accounts. (Keylogging or keylogger) sometimes called a spying software is a small program which is used to monitor a local or a Remote PC, When a keylogger is installed on a victims computer it can monitor and capture each and every keystroke typed on the victims PC,the captured Keystrokes are sent to the Hacker.
No doubt, these keystrokes contain the victim’s Face book Account Password and other such credential data thus key logger can be used for many purposes such as monitoring, Hacking and many more.

2.Phishing
Difficulty - Moderate 
Success Rate - 70 %

Phishing is an attempt to criminally and fraudulently acquire sensitive information, such as user names, passwords and credit card details, by appearing as a trustworthy entity . There are many Ways by which a hacker can craft his Phisher (Fake Page) to fool the victim. In a simple phishingattack a Hacker will create a phisher ( fake login page) which exactly looks like the real facebook page and then asks the victim to login into that page,

Once the victim logins through the fake page the victims "Email Address" and "Password" is stored in a text file, The hacker then downloads the text file and get's his hands on the victims credentials. I have explained a step by step phishing process to Hack Facebook account  in the following Post.

3.Mobile Phone Hacking
Difficulty - Easy
Success Rate - 90 %


Many users access Facebook from their smart Phones. If you have access to the victims Mobile phone, You can easily install a Cell phone spying software and thus you can easily hack , Monitor the victims Facebook Account .Today there are Many Cellphone Spying  software's, 
Some of the Best are listed below.
 1.MSPY
       2.Spy Phone Gold 





4.Session Hijacking 
Difficulty - Moderate
Success Rate - 70 %
Session Hijacking can be often very dangerous if you are accessing Facebook on a http:// connection, 
  In a Session Hijacking attack a hacker steals the victims browser cookie which is used to authenticate a user on a website and uses to it to access victims account
                          Session hijacking is widely used on Lan's. I will soon be writing a tutorial on how to hack facebook Account by session Hijacking.

                   

5.Side Jacking Using Fire Sheep
Difficulty - Moderate
Success Rate - 60 %
Fire sheep is widely used to carry out side jacking attacks, Fire sheep only works when the attacker and the victim is on the same wifi network or in LAN .Fire sheep is an extension developed by Eric Butler for the FireFox web browser. The extension uses a packet sniffer to intercept unencrypted cookies from certain websites (such as Facebook and Twitter) as the cookies are transmitted over networks, exploiting session hijacking vulnerabilities.

 It shows the discovered identities on a sidebar displayed in the browser, and allows the user to instantly take on the log-in credentials of the user by double-clicking on the victim's name. I have written a step by step Tutorial on How to use Firesheep to Hack facebook Account.

Hope you Enjoyed reading the article , If you have any doubts Regarding the article Please let me know them via comments...





Read More