How to hack Facebook account is very simple when you read the content on this page. It is advise not to use them as criminality but as knowledge. The method deals with exploiting a simple vulnerability that he could’ve used to hack into other people’s Facebook accounts easily and make any type of changes.
How To Hack Facebook Account At Ease
With his Facebook hack, Anand Prakash was able to view messages, stored information of credit/debit cards, personal pictures and more.
This vulnerability deals with the password reset feature in Facebook. Whenever a user forgets the Facebook password, the social networking website allows the user to reset it by entering the email address or phone number.
Then, Facebook sends a 6-digit security code to let you change your Facebook password.
To protect an account from brute force attacks, the account holder is allowed to try up to 12 codes before getting blocked on Facebook’s main site www.facebook.com.
Anand looked out for the same issue on Facebook’s beta sites beta.facebook.com and mbasic.beta.facebook.com. He was surprised to see that limiting feature of 12 attempts was not implemented on these websites.
Using the Forgot Password feature, he tried to brute force the 6-digit password reset code on Facebook beta sites. As a result, he was able to hack his Facebook account and reset the password.
Read Also: How To Recover Hacked Facebook Account
Which is the vulnerable request that was exploited to hack Facebook?
On the Facebook’s beta page, Anand was able to brute force “n” in the following request and gain the complete control of the account:
After discovering this flaw, Anand reported it to Facebook Team on February 22. The social media website has now fixed this flaw and awarded him a bug bounty of $15,000.
If you spot some kind of vulnerability in any website or application, feel free to drop an email at email@example.com — we’ll be glad to feature you on fossBytes.
Feel free to ask questions and contributions about How To Hack Facebook Account using the comment sections below.