Ana içeriğe atla

Hacking Facebook,Twitter,Instagram Account Passwords with BruteForce

After a long time, I Present you, Faitagram.
I was disappointed, no one replied to this
Anyway enough talking, Lets get right into the tutorial.

Step 1Getting Ready

By the way, Faitagram stands for Fa(cebook)(tw)it(ter)(inst)agram.
To clone the script, what you need to type in the terminal is :
To clone the Faitagram script.
After you cloned, type "ls" to see what is inside the folder.
After you typed that, you would see 5 things :
License, Readme, faitagram, setup.py and wlist.
License is just a MIT license, Readme has informations about the script on it, faitagram is the main source, setup.py is for the installing dependencies, and wlist is a wordlist.
You have that? Now lets chmod the files so we can access it.
chmod +x faitagram && chmod +x setup.py
We did that, to install all the requirements to run the script by typing :
python setup.py
It will install whole bunch of things.
You need to just wait.
After the installing is finished, there are commands for Facebook, Twitter, Instagram each.
The faitagram file contains a strong password list, so don't worry about the wordlists.
But if you still want to test it out, than use your own wordlist.
The format is :
python faitagram -s service -u username -w wordlist -d delay
In service, it is rather facebook,twitter or instagram.
username is for the username of the target.
wordlist is for the path to the worlist.
delay is optional, and it means the delay of seconds it will sleep during trying passwords.
the default of delay is 1 seconds.
There are 3 paths, pick one and follow me.

-FaceBook-

To start the bruteforcing on FaceBook, what you need to type is :
python faitagram -s facebook -u (email) -w (wordlist) -d (delay)
The (email) section, is for the email of the target.
The (wordlist) section is for the path to the wordlist.
And the (delay) is for the delays(seconds).
Delay is optional, just don't type the "-d" if you don't want to use it.
But, the others are a must.
If you don't have a wordlist, type "wlist" instead of the (wordlist).
Only in FaceBook, it will ask you to enter the name of the target.
It is just to prevent errors, and for Username Checking.
Here are some examples for the command :
python -s facebook -u BURGERKING -w wlist -d 3
python -s facebook -u MEMEBIGBOY -w /root/password.txt
python -s facebook -u NullByte -w /root/SadminDontBanMe.txt -d 2

-Twitter-

To start the bruteforcing on Twitter, what you need to type is :
python faitagram -s twitter -u (username) -w (wordlist) -d (delay)
The -s stands for service, -u for username, -w for path to the wordlist -d for delay(secs).
So what you need to do is put the username of the target in the (username) section,
path to the wordlist in (worslist) section. Those are a must, but -d is optional.
Just don't put the -d parameter if you don't want to use it.
Just like:
python faitagram -s twitter -u juniorn1003 -w wlist
Then the system will automatically set the delay to 1 second.

-Instagram-

To start the bruteforcing on Instagram, what you need to type is :
python faitagram -s instagram -u username -w wordlist -d delay
In the username, change it with the target's username, in the wordlist, change it with the path of the wordlist.
In delay, it is optional, you don't really need it, but change it with the interval you to be between bruting passwords.
If you don't want the delay, just don't type in the -d parameter.

How It Works

This script is completely made out of python.
It can never fail, because it uses selenium to do it.
selenium is a program to run an actual web and making the script doing the rest, but I decided to make it run it on a virtual display, using Xvfb and pyvirtualdisplay.
There might be errors, and that is the only thing that you should be awared while bruteforcing.
This script uses STEM for proxy.
I think that is all from me, Thank you for reading.

Bu blogdaki popüler yayınlar

Denial-of-Service (DoS) Tools & Techniques

Denial-of-Service (DoS) Tools & Techniques Welcome back, my fledgling hackers! Over the years, we have examined multiple ways to own, exploit, or compromise a system. On the other hand, we have not spent a lot of time on denial-of-service (DoS) attacks. For those of you who are new here, a denial of service is basically a simple attack that keeps the target system from operating as it should. In its simplest form, it uses up all of the system resources so that others can't connect. More sophisticated attacks will cause the system to crash or create a infinite loop that uses all of the system's CPU cycles. In general, a DoS attack is the easiest and least sophisticated type of attack. Some have gone so far as to say that an eight-year-old could participate in a DoS attack, and there is some truth to that statement since some tools make it as easy as putting in an IP address and hitting "Start." In recent years, DoS and DDoS attacks (the latter of whic...

Embed a Metasploit Payload in an Original .Apk File

Embed a Metasploit Payload in an Original .Apk File   Hi Fellas! I'm a new member to this community. Although I've been lurking around here for a while, I created an account and joined in recently. I've learned much from the creator here at NullByte, so I'm hoping to become a contributing member also, so that I can give something back. And that's why I decided to write this article sharing an script I discovered recently. I'm sure most of you, or at least those who have set a foot in the kingdom of hacking, have heard of Metasploit. From Wikipedia, The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. Its best-known sub-project is the open source Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Other important sub-projects include the Opcode Database, shellcode archive and r...