Search Result For "download-facebook-account"

Showing posts sorted by relevance for query download-facebook-account. Sort by date Show all posts

OK. So yous are an active Facebook User. Imagine, exactly imagine, roughly grieved enemy of your reports your posts, as well as Facebook ends upward deleting your account. How would yous feel?
Ruined?

Well, non now. Facebook, the most pop social networking site, has a ways to tackle this situation. It does as well as then past times allowing yous to download all your draw of piece of job organization human relationship information at the click of a button.

While this has been requested past times users for years now, Facebook has rattling late introduced the characteristic of downloading your Facebook account. The download is inward the shape of a cypher file containing all your profile pictures, the photos yous convey been tagged in, wall posts as well as videos. Your messages, friend list, photos, events, likes (and well-nigh everything yous convey e'er uploaded on Facebook) is likewise included inward the downloaded cypher file. Upon unzipping the downloaded cypher file, yous volition respect a uncomplicated HTML file of your profile amongst offline links to the higher upward stated things.

Downloading your draw of piece of job organization human relationship volition non hateful that Facebook volition delete your profile. It volition solely serve equally a backup as well as a leisure action to rate fourth dimension to on Sundays.

 roughly grieved enemy of your reports your posts Download Facebook Account's Pictures as well as Data

You tin exactly download your draw of piece of job organization human relationship past times next the steps given below:-
  1. Login to Facebook.
  2. Click on the Settings icon at the correct side of the overstep navigation bar.
  3. Navigate to Account Settings.
  4. Click on Download a re-create of your Facebook data at the halt of the page.

This link volition solely survive available afterward Facebook has finished creating an archive of your account. They volition shipping an e-mail to yous when the download is ready. This additional safety stair out has been wisely added past times Facebook as well as then that no ane else downloads your personal information.

There is an expanded version of the archive that contains much to a greater extent than information, similar the log of your Facebook login activity.

Although this is a expert feature, Facebook offers no agency to re-import this information from your difficult crusade to your draw of piece of job organization human relationship or to a novel account, if yous wishing to practise a novel Facebook draw of piece of job organization human relationship containing all your onetime data.

This category consists of articles published on related to cyberspace in addition to the WWW (www).

This category consists of articles published on  related to cyberspace in addition to th Internet

Facebook
  1. How hackers hack Facebook Account & How to destination them?
  2. Cool Facebook Status, Chat Tricks in addition to Tips
  3. Why Facebook is Blue  inwards Color?
  4. Download Facebook Account's Information & Pictures
  5. Change Facebook Theme Color, Appearance, Skin, Style or Template
  6. Facebook's Recent Updates: Trying to manage off Google Plus
  7. Facebook Tricks, Tips & Hacks

Google
  1. Google Tricks, Easter Eggs & Secrets
  2. Google - I'm Feeling Lucky Tricks & Jokes
  3. I'm Feeling Lucky Easter Eggs on Google

Blogging
  1. What is a Blog?
  2. Guest Blogging has Disadvantages that could Harm your Blog
  3. Use Long tail Keywords to Boost Blog Traffic
  4. Health Tips for Bloggers: Stay Healthy While you lot Blog
  5. Discover New Blog Post Ideas alongside Google Analytics
  6. Blogging Tips: five Ways to Get More Leads
  7. How to Add the Facebook "Like" Button to Blogger or WordPress
  8. 5 Tips to Enhance Your Blog

Accessing Blocked Websites
  1. How to Access Blocked Websites
  2. Best Ways to Access Blocked Websites, Unblock Restricted Sites
  3. How to Unblock Websites at School, Work, Home or Anywhere

Webmasters

  1. Get Popular on the Internet
  2. Best Web Hosting Options for Your WordPress Blog 
  3. Freelance Writing: The Beginner's Guide to Writing Online 
  4. Get Twitter followers in addition to Facebook Fans using Online Tools
  5. Virtual Private Servers Or Dedicated Servers? 
  6. Which Website Platform Is Right For You?
  7. How Google Plus tin forcefulness out alter SEO
  8. Twitter SEO: How to Use Twitter to Get Higher Rankings?
  9. Why a successful Email Campaign tin forcefulness out boost your Business

Tips, Tricks & Advice

  1. How to Save Money Shopping Online using Coupons
  2. How to Follow Search Terms in addition to Keyword Mentions on Twitter
  3. Have a functional Website every bit your wallpaper
  4. Cool JavaScript Tricks: Edit Websites inwards Browser (Live)
  5. How to Download Flash Videos inwards Computers in addition to Mobiles
  6. 7 Wi-Fi Tweaks to Boost Your Speed
  7. Should You Be Interested inwards Cloud Computing?
  8. Wirelessly Transfer Files on Android devices alongside Dropbox

This is the Archive page of , containing each article published on this tech blog.


SQL Injection attacks with Havij

This is a fictional adventure with fictional characters that have fictional (non)skills based on true events. This post was created for informational purposes only and no admins lost their job during the writing of this story. It was inspired by Troy Hunt's "Hacking is child's play" article.

Bob, a 20-something year old boy, never considered himself a computer “guru”. He started using computers around the age of 18, late compared to his friends. What he lacked in experience, he gathered through patience.
Saturday morning news, July 2012: Yahoo voices was breached, half a million emails and passwords were leaked. The attack was made possible due to a SQL injection flaw on their servers.

yahoo voices logo
 
SQL injection? Sound like a medical term. Bob moves to his computer and starts typing:
sql injection attacks
He goes through the results, reads various topics and his eyes fall on: 
Havij - an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page.
Havij SERP results from google search
 
He was never very tech-savvy so this might be what he was looking for. Another search follows:
havij torrent
Bam, first results, his beloved piratebay. The torrent is small in its size so it should be ready soon enough. In the meantime he'll grab a coffee, smoke a cigarette or two and wait.
Minutes later when he returns, the download session is complete. He registers – by using the all-too-easy provided steps - and fires-up the application. 

Havij default first screen

But, he remembers that he needs some websites to test it on. Opens Firefox again, set's the homepage to google.uk and enters:
inurl:newsitem.php?num=

Google results for inurl dork

This is the google “dork” he choose from a list. It's an example of “advanced search string operators” - termed by some people as “dorking”. Since Bob is inexperienced, he doesn't really care what these are or why they're named “dorks”. 
He starts copying and pasting the available results into Havij. First site doesn't work, Havij returns:
MySQL error based injection method cant be used!
MySQL time based injection method can't be used!
He moves on to the other results. Finally, one site seems to be vulnerable, he pressed “Analyze” and in less than 5 seconds:
Havij table results

This is getting interesting. From all the tables, only one seems to have the data he's looking for: labeled_user. He selects the table and clicks on “Get columns”. The important columns are there:
☐ forename
☐ surname
☐ username
☐ password
☐ email
He selects three of them: email, username and password, then presses on “Get data”. Finally, he has access to the admins usernames and passwords. But the passwords are encrypted so he needs to dig-on.

Table results with username and passwords

Havij has an MD5 decryption option available, let's try that one. He tries with the first encrypted password - Havij is using online resources to decrypt passwords.
Success! The results came in seconds and the password has been revealed: johnC1980 – it's a combination between the name of the web admin and his birthday dates - common password combination. Bob moves to the “Find admin” tab and clicks on start. The program found something like nameofthesite.co.uk/admin . He pastes the link into his browser and tries the username and password combination:

admin

John121980

Admin cpanel login screen
 
He's in. It was easier than he thought and now he has access to admin panels of this recruitment agency from the UK. He'll dig more into it tomorrow but for now he's done. He wants to celebrate his script-kiddie success.

Bob's back early in the morning. What if those five users are “recycling” their passwords? This was usually the cause for many famous successful break-ins in the past.
People are lazy and they don't want to remember 12 passwords used on 12 different websites: what they do instead? They use the same password for all sites. You got access to one, you have access to all of them.
After two hours, Bob was able to access John's Gemail, Linked-in, Facebook and twitter account. He used the same password on all of them: John121980.
Worse yet: John creates and administrates websites for other companies also. Obviously he's using the same password. From here on, Bob can get access to a huge amount of login details.
If you're curios enough, the sky is the limit.

Contact Form

Name

Email *

Message *

Powered by Blogger.