Skip to main content

HOw to hack face book real working By hackingloop.com{shared by me}


Requirement to hack someone's Facebook account:
1. Victim (whose Facebook account password you wanna hack) should be on Facebook.
2. Create four to five fake Facebook accounts(three are sufficient but one more for bonus). I will advice you that create accounts with girl names and put an awesome girls photograph. Fill the basic profile.. Why i am saying create account with Girl names is just because Hungry boys accepts girls friend request without any delay. And if you know the person personally then create account with names of his near ones and say that you have created new profile so add you as a friend. Note all the three to four fake accounts should not be friends or any relationship with each other.
3. Most important requirement you need to add all above three account to the friends list of victim whose Facebook account you want to hack. Above method will be helpful for that :P.
3. At least two web browsers. So that one can be used as recovery purpose and one for viewing codes.

So guys i hope you all are clear with requirements to hack Facebook account password. Now lets hack someone's  Facebook account password practically to show that hacking Facebook account really works.

Steps to hack any Facebook account password in less than 10 minutes 100% working hack with practical example:  
In these steps i am hacking the Facebook account password of user whose email ID is ajay2008singh@gmail.com (its mine own account but fake one that i use for testing hacks).
1. Open the Facebook in your web browser
2. Now Click on Forgot your password? Now a new tab will open something like this. In the email box give the email ID 'ajay2008singh@gmail.com' and press enter or click on search button as shown in below snapshot..
Hacking Facebook account password
Learn How to hack Facebook account password Snapshot 1

3. Now after Clicking on search you will get an Captcha verification. Type the words displayed and press enter.
4. Now You have reached to the screen Where Facebook gives the search results of the identity of previous step. There you will see button saying "This is my account" just click on that as shown below in snapshot:
Hacking Facebook account password 2
Hacking Facebook account password snapshot 2
5. Now you have reached to the below Facebook password recovery screen as show below:
Hacking Facebook account password 3
Hack Facebook Password recovery snapshot 3

Now Click on "No Longer have access to these?" hyperlink to go to next step.

6. Ahhah... It sounds great everything going smoothly... So friends after following step 5 you will reach below page that ask you Enter your new email ID for contact. Its most important as password reset request after submitting codes will be received on this.. Below is snapshot of screen 4:
Hacking Facebook account password 4
How to hack facebook account or passwords snapshot 4

7. After submitting you will have either of two situations:
a. First One will be recover your account with friends.
b. Answer the security question if victim has set the security question.

Now what...

Oops.. he has set the security question and i dont know the answer... What should i do??.....Scared ... nopes...worried... nopes... Let's enter wrong answer to his security question three times... Omg... WTF has happened I am redirected to the First option " Recover your account with your friends" .. :P .. I love explain things in dramatic manner so that reader also get interest. :P

8. Now you are at screen saying " Recover your password using your friends" as shown below in snapshot.
Hacking Facebook account password 5
100% working practical facebook account password hack snap 5
9. Just click on continue and select the three trusted friends :P The three fake accounts that we have created for him to hack his account....:P.. 
You can also perform this hack by making your friends participate to hack someones account...Now select three accounts one by one as one... Below is the screen shot showing that i have selected three friends whom i am sending codes.
Hacking Facebook account password 6
Facebook account hacking final snapshot
 10. Foow....Oops.. I got all the three codes....Below is the screen where you will enter those three codes that you have received...
Hacking Facebook account password 7
Filling confirmation codes for hacking facebook account

So guys we are done.... Fill the codes into boxes that you have received into you messages in Facebook and on email if feed is subscribed.

Click on submit now it will ask you to validate your email account that you have filled in Step number 6. That email should be genuine as you will receive recovery email on that email account only...

That finishes my Practical example with complete clear snapshots to hack Facebook account password..


Read more: http://www.hackingloops.com/2011/07/how-to-hack-facebook-account-password.html#ixzz2VDRV61sv

Comments

Popular posts from this blog

Dragon Age: Inquisition Digital Deluxe Edition + All DLCs (torrent) Repack Size: 20.1~23.9 GB

Brief : Dragon Age: Inquisition  is an  action role-playing video game  developed by  Bioware Edmonton  and published by  Electronic Arts . The third major game in the  Dragon Age  franchise,  Dragon Age: Inquisition  is the sequel to  Dragon Age: Origins  and  Dragon Age II . The game was released worldwide in November 2014 for  Microsoft Windows ,  PlayStation 3 ,  PlayStation 4 ,  Xbox 360 , and  Xbox One . Repack Size: 20.1~23.9 GB 

QWERTY-keyboard when this idean came

QWERTY QWERTY   / ˈ k w Éœr t i /  is the most common modern-day  keyboard layout . The name comes from the first six  keys  appearing on the top left letter row of the keyboard and read from left to right: Q-W-E-R-T-Y. The QWERTY design is based on a layout created for the  Sholes and Glidden typewriter  and sold to  Remington  in 1873. It became popular with the success of the Remington No. 2 of 1878, and remains in use on electronic keyboards due to the  network effect  of a standard layout and a belief that  alternatives  fail to provide very significant advantages. [ 1 ]  The use and adoption of the QWERTY keyboard is often viewed as one of the most important case studies in  open standards  because of the widespread, collective adoption and use of the product. [ 2 ] History and purposes [ edit ] Keys are arranged on diagonal columns, to give space for the levers. Main article:  Sholes and Glidden typewriter Still used to this day, the QWERTY layout was devised

3g what it is

Definition of 3G: 3G is the third generation of wireless technologies. It comes with enhancements over previous wireless technologies, like high-speed transmission, advanced multimedia access and global roaming. 3G is mostly used with mobile phones and handsets as a means to connect the phone to the Internet or other IP networks in order to make voice and video calls, to download and upload data and to surf the net. How is 3G Better?: 3G has the following enhancements over 2.5G and previous networks: Several times higher data speed; Enhanced audio and video streaming; Video-conferencing support; Web and WAP browsing at higher speeds; IPTV (TV through the Internet) support. 3G Technical Specifications: The transfer rate for 3G networks is between 128 and 144 kbps (kilobits per second) for devices that are moving fast and 384 kbps for slow ones(like for pedestrians). For fixed wireless LANs, the speed goes beyond 2 Mbps. 3G is a set of technologies and stand

6 Ways to Hack or deface Websites Online

Hello friends , today i will explain all the methods that are being used to hack a website or websites database. This is the first part of the hacking websites tutorial where i will explain in brief all methods for hacking or defacing websites. Today I will give you the overview and in later tutorials we will discuss them one by one with practical examples. So guys get ready for first part of Hacking websites class.... Don't worry i will also tell you how to protect your websites from these attacks and other methods like hardening of SQL and hardening of web servers and key knowledge about CHMOD rights that what thing should be give what rights... Note : This post is only for Educational Purpose only. What are basic things you should know before website hacking? First of all everything is optional as i will start from very scratch. But you need atleast basic knowledge of following things.. 1. Basics of HTML, SQL, PHP. 2. Basic knowledge of Javascript. 3. Basic knowled

How to open facebook through Uninor when it is blocked

Tweet Just Follow this steps . 1. Goto www.uninor.in 2. choose your circle 3.Goto  http://www.uninor.in/customer-care/Pages/customer-complaint-log.aspx 4. Now in new complaint just type your moblie number 5.now you will receive passwrod just type in and hit submit 7. NOW select as following as type as it in every box Complaint Type   -- Select --   DND Related   GPRS   Network Related   Tariff & VAS Related   Activation/ Deactivation   Barring/ Unbarring   Balance Related    Complaint Area   -- Select --   Activation / Deactivation   PC/Modem Connectivity   Usage / Charges related   GPRS issues   Non-Uninor sites   Complaint sub Area   -- Select --   Unable to browse   Unable to download   Please ensure all questions below are answered in the text box below. 1. Handset make and model no. 2. Web Site Name/ URL 3. Error message

Control Loops in c

Objectives: Having read this section you should have an idea about C's: 1.Conditional, or Logical, Expressions as used in program control 2.the do while loop 3.the while loop 4.the for loop Go With The Flow: Our programs are getting a bit more sophisticated, but they still lack that essential something that makes a computer so necessary. Exactly what they lack is the most difficult part to describe to a beginner. There ar e only two great ideas in computing. The first is the variable and you've already met that. The second is flow of control. When you write a list of instructions for someone to perform you usually expect them to follow the list from the top to the bottom, one at a time. This is the simple default flow of control through a program. The C programs we have written so far use this one-after-another default flow of control. This is fine and simple, but it limits the running time of any program we can write. Why? Simply because there is a limit to the nu

Overview of C

Why use C?: C has been used successfully for every type of programming problem imaginable from operating systems to spreadsheets to expert systems - and efficient compilers are available for machines ranging in power from the Apple Macintosh to the Cray supercomputers. The largest measure of C's success seems to be based on purely practical considerations: the portability of the compiler; the standard library concept; a powerful and varied repertoire of operators; an elegant syntax; ready access to the hardware when needed; and the ease with which applications can be optimized by hand-coding isolated procedures C is often called a "Middle Level" programming language. This is not a reflection on its lack of programming power but more a reflection on its capability to access the system's low level functions. Most high-level languages (e.g. Fortran) provides everything the programmer might want to do already built into the language. A low l

Google hoaxes and easter egges

Easter eggs [ edit ] Google has added many  Easter eggs  to its products and services. Calculator [ edit ] The Calculator accepts many  humorous units of measurement , including the  Beard-second  (5 nm),  Potrzebie  (2.2633 mm),  Smoot  (5 ft, 7 inches), ngogn (11.5938151 ml), blintz (36.4253863 g),  donkeypower  (250.033167 W); and the prefixes  hella - (10^27), furshlugginer- (10^6), etc. The Calculator recognizes a number of strings as numbers. They can be entered by themselves or used in expressions. They must be entered without quotation marks. When used in an expression, the phrases must be entered in lowercase. In addition to mathematical and scientific constants like  pi ,  e  and  Avogadro's number  the Calculator also accepts: "the answer to the ultimate question of life, the universe, and everything"  equals  42  as does  "the answer to life, the universe, and everything" , a reference to Douglas Adams's novel  The Hitchhiker's Gui

robot.txt what is this and how to use this

What do they do exactly? Robot.txt files tell your instructions to a search engine robot.. The first thing a search engine spider looks at when it is visiting a page is the robots.txt file. It looks for it because it wants to know what it should do. If you have instructions for a search engine robot, you must tell it those instructions. The most common problem people have with robot.txt files is that they don't know how to make them. If you can make web pages, you can also make a robot.txt file. The file is a text file, which means that you can use notepad, wordpad, or any other plain text editor. You can also make them in Frontpage or Dreamweaver by using the "code" view. You can even "copy and paste" them. So instead of thinking "I am making a robot.txt file", just think, "I am writing a note" they are the exact same process. However you would write a note or a letter on your computer will work for the robot.txt file. What should

Structure of C Programs

Objectives: Having completed this section you should know about: 1.C's character set 2.C's keywords 3.the general structure of a C program 4.that all C statement must end in a ; 5.that C is a free format language 6.all C programs us header files that contain standard library functions. C's Character Set: C does not use, nor requires the use of, every character found on a modern computer keyboard. The only characters required by the C Programming Language are as follows: A - Z a -z 0 - 9 space . , : ; ' $ " # % & ! _ {} [] () < > | + - / * = The use of most of this set of characters will be dicussed throughout the course. The form of a C Program: All C programs will consist of at least one function, but it is usual (when your experience grows) to write a C program that comprises several functions. The only function that has to be present is the function called main. For more advanced programs the main functi