Our post exposing islam was taken down on Facist Book aka Facebook at the request of the Muslim Brotherhood. I will not be silent and will not submit and pledge eternal hostility to the Religion of the Antichrist aka Islam.
Freedom Fighter Radio condones lone wolf attacks on ALL SOCIAL MEDIA platforms starting with facebook for their support of the Goat Humping Rag headed savages aka muslims.
Below the screenshot proof we have posted the video that Facebook and ALL social media platforms don’t want you to see
How to hack Facebook using Phishing attacks
Albeit very successful, a phishing attack is not an easy one to set up or pull off. The attacker needs to have some level of technical know-how and some Social Engineering skills to be able to entice their victim on to the phishing trap. But it is relatively very inexpensive to set up when compared to other attack methods.
1. First, the attacker needs to create and host a fake Facebook login page where the victim will input their username and password.
This fake page is usually an EXACT replica or clone of the original Facebook login page and it’s done in order to trick the victim into believing they are logging in to their Facebook accounts.
2. Secondly, they need to register a domain name that resembles the original and correct “www.facebook.com” domain name.
In the past attackers used to register look-alike or doppelganger domains names like “www.faceboook.com” (notice the triple (“O’s”) or “www.facebool.com”. All those have been cramped down on because the FBI, domain registrars and sometimes Facebook, regularly shut those down.
A recent and more disturbingly clever approach attackers have adopted is registering a single domain name and then using relevant sub-domain names for the different websites (e.g Facebook) they want to go after.
An example, in this case, would be something like “www.facebook.com.signin-evilsite.ru”. Or something else like “www.signin.facebook.com.account.badsite.com”. Or whatever they choose to use.
“Evilstie.ru” and “Badsite.com” in these examples are the domain names registered to the attacker. The “facebook.com.signin” and the signin.facebook.com.account” part are the sub-domains that deceive the victim to think they are actually logging in to Facebook.
3. Thirdly, the attacker thinks up a delivery method (Social Engineering), finds a victim and executes the phish.
This is where the attacker’s Social Engineering skills come into play. He may come under any pretext, but the aim is to get the link of the phishing page to his victim. And depending upon the Attacker’s pretext he may be sending a link to the phishing page either via an email or on Facebook Messenger after chatting for a while with the victim.
Whatever the delivery method or pretext (the fake reason to use that phishing link) the attacker chooses to use, once the victim enters their Facebook credentials – username and password – they go straight to the attacker where he is waiting to harvest them.
Sadly, this works all the time because people are not educated about this kind of attack methods and that is the reason for this post – to draw public attention to things like this.