SlideShare a Scribd company logo
Owned Exposed How I hack `Hacker` Facebook AccountPresented By El Rumi@IDSECCONF 2011
Social Network & FacebookSocial Network		SocialNetwork is a social structure made up of individuals (or organizations) called "nodes", which are tied (connected) by one or more specific types of interdependency, such as friendship, kinship, common interest, financial exchange, dislike, sexualrelationships, or relationships of beliefs, knowledge or prestige.(source: http://en.wikipedia.org/wiki/Social_network)
Social Network & FacebookFacebookA “social networking” siteFramework for informationComplex control of who can see whatUsers have a “profile” with a picture* and other personal details as they wish, including “limited profile”Based on “Networks”Facebook creates a newsfeed based on what your “friends” are doing(source:  http://users.ox.ac.uk/~tony/facebook.ppt)
Facebook Account Security?(source: https://www.facebook.com/help/?faq=212183815469410)
True Story....
Let’s Start The Game
Proof of Concept! (Identification)
Proof of Concept! (Penetration)
Proof of Concept! (Penetration)
Proof of Concept! (Penetration)
Proof of Concept! (Owned)Take over
Can We Prevent This?Change Security Question?(source: https://www.facebook.com/help/?faq=163063243756483)
So?Hide Your Sensitive Data From Public.Hide Your Email From Public.Make Security Question :With Different Thing Answer But Easy To Remember.With Right Answer But Encrypted (md5, sha1, rot13, etc)
Video Demo
Heil Indonesian Hacker’s“If any skiddy community gets too big, we shut them down. If any lamer causes too much trouble, we shut them down. If any group keeps fucking stuff up, we stop them.”-Elz (Kecoak Elektronik)-(source: http://kecoak.org/log/2010/12/25/owned-and-exposed-pwned-some-skiddy/)

More Related Content

PPTX
How I Hack, Hacker Facebook Account
PPT
Future or Fad: Social Networks for Business Applications
PPTX
Social network privacy & security
PPT
PPT
Security Dangers of Social Networking
PPTX
On Social Websites
PPTX
Privacy issues in social networking
ODP
How I Hack, Hacker Facebook Account
Future or Fad: Social Networks for Business Applications
Social network privacy & security
Security Dangers of Social Networking
On Social Websites
Privacy issues in social networking

What's hot (20)

PPT
Northern District Department Head Meeting
PDF
Class 3 ppt
PPTX
How to Like Social Media Network Security
PPT
Web2.0 An Introduction
PPTX
The issues of security and privacy in social network
PPT
Building the Social Library Online - Copenhagen
PPTX
Web 2thtrtgrst
PPTX
Web3 0 latest webtrends
PPTX
FILM 260 Flipbook- Virtually Impossible? Privacy Within Social Media
PPT
Whats The Buzz
PPT
web 2.0
PPT
Using Web2.0 to Communicate with Stakeholders
PPT
Web 2.0
PPT
Motivation for Participation in Sociable Media
PPT
Web 2.0
PPT
web 2.0A
PPS
Web 2.0
PPT
Social Networking 101 6.11.08
PPT
SIOC: Semantic Web for Social Media Sites
PPTX
Social media background
Northern District Department Head Meeting
Class 3 ppt
How to Like Social Media Network Security
Web2.0 An Introduction
The issues of security and privacy in social network
Building the Social Library Online - Copenhagen
Web 2thtrtgrst
Web3 0 latest webtrends
FILM 260 Flipbook- Virtually Impossible? Privacy Within Social Media
Whats The Buzz
web 2.0
Using Web2.0 to Communicate with Stakeholders
Web 2.0
Motivation for Participation in Sociable Media
Web 2.0
web 2.0A
Web 2.0
Social Networking 101 6.11.08
SIOC: Semantic Web for Social Media Sites
Social media background

Viewers also liked (20)

PDF
Turning tl mr 3020 into automate wireless attacker
PPTX
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
PDF
MrX - ADT: It's not about Faking the Approval
PDF
Spying The Wire
PDF
Turning tl mr 3020 into automate wireless attacker
PDF
Desain skema rn4 s1
PDF
Micro control idsecconf2010
PDF
The21stcenturybankjob 101014152255-phpapp02
PDF
The_Hydra - Bagaimana Menulis dan Memaintain Elektronik Hacking Magazine
PDF
How to train your ninja
PDF
Mobile security-an-introduction - za
PDF
Generating the responses
PDF
A million little tracking devices - Don Bailey
PPTX
Analisa kejahatan menggunakan jaringan gsm
PDF
y3dips, mastering the network hackingFU
PDF
Reksoprodjo cyber warfare stmik bali 2010
PDF
indounderground, Carding, carder and why you should avoid it!
PPTX
Reversing blue coat proxysg - wa-
PDF
Keynote - Jim Geovedi - professional-hackers
PDF
Linux kernel-rootkit-dev - Wonokaerun
Turning tl mr 3020 into automate wireless attacker
Studi dan Implementasi Keamanan User Privacy menggunakan CP-ABE
MrX - ADT: It's not about Faking the Approval
Spying The Wire
Turning tl mr 3020 into automate wireless attacker
Desain skema rn4 s1
Micro control idsecconf2010
The21stcenturybankjob 101014152255-phpapp02
The_Hydra - Bagaimana Menulis dan Memaintain Elektronik Hacking Magazine
How to train your ninja
Mobile security-an-introduction - za
Generating the responses
A million little tracking devices - Don Bailey
Analisa kejahatan menggunakan jaringan gsm
y3dips, mastering the network hackingFU
Reksoprodjo cyber warfare stmik bali 2010
indounderground, Carding, carder and why you should avoid it!
Reversing blue coat proxysg - wa-
Keynote - Jim Geovedi - professional-hackers
Linux kernel-rootkit-dev - Wonokaerun

Similar to How i hack_hacker_facebook - el_rumi (20)

PPTX
Facebook
PDF
Social networks v2
PPT
Social networks v2
PPTX
T.m.p.m.dissanayaka
PPTX
Social Media and Employment
PPT
Facebook
PPTX
Social media
PPTX
Facebook
PPT
Facebook for Individuals and Businesses
PPT
Social networks: Advantages and disadvantages
PPT
PPT Presentation on Facebook.com
PPTX
Brandon + Eddie users guide phi 235
PPTX
DOC
Facebook and Security Settings Report
PPTX
Facebook
PPT
IT for Local Foods
PDF
Facebook Security Essay - Umut Baris Akkaya
PPTX
Tips On Social Networking
PPTX
Introduction to facebook 2012
Facebook
Social networks v2
Social networks v2
T.m.p.m.dissanayaka
Social Media and Employment
Facebook
Social media
Facebook
Facebook for Individuals and Businesses
Social networks: Advantages and disadvantages
PPT Presentation on Facebook.com
Brandon + Eddie users guide phi 235
Facebook and Security Settings Report
Facebook
IT for Local Foods
Facebook Security Essay - Umut Baris Akkaya
Tips On Social Networking
Introduction to facebook 2012

More from idsecconf (20)

PDF
IDSECCONF2024 Capture The FLag Write up - 3 MAS MAS
PDF
IDSECCONF2024 - Rifqi Hilmy Zhafrant - Hunting and Exploiting GraphQL Vulnera...
PDF
IDSECCONF2024 - Arief Karfianto - AI-Enhanced Security Analysis in Requiremen...
PDF
IDSECCONF2024 - Ryan Fabella, Daniel Dhaniswara - Keamanan Siber Pada Kendara...
PDF
IDSECCONF2024 - Angela Oryza - ITS Nabu-Platform Pelatihan Keamanan Siber den...
PDF
IDSECCONF2024 - Rama Tri Nanda - MQTT hacking, RCE in Smart Router.pdf
PDF
IDSECCONF2024 - Muhammad Dwison - The Implementation Of One Pixel Attack To S...
PDF
IDSECCONF2024 - Kang Ali - Local LLM can Simulate Apt Malware With Jailbreak ...
PDF
IDSECCONF2024 - Brian Nasywa - Comparison of Quantum Key Distribution Protoco...
PDF
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
PDF
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
PDF
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
PDF
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
PDF
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
PDF
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
PDF
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
PDF
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
PDF
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
PDF
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
PDF
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...
IDSECCONF2024 Capture The FLag Write up - 3 MAS MAS
IDSECCONF2024 - Rifqi Hilmy Zhafrant - Hunting and Exploiting GraphQL Vulnera...
IDSECCONF2024 - Arief Karfianto - AI-Enhanced Security Analysis in Requiremen...
IDSECCONF2024 - Ryan Fabella, Daniel Dhaniswara - Keamanan Siber Pada Kendara...
IDSECCONF2024 - Angela Oryza - ITS Nabu-Platform Pelatihan Keamanan Siber den...
IDSECCONF2024 - Rama Tri Nanda - MQTT hacking, RCE in Smart Router.pdf
IDSECCONF2024 - Muhammad Dwison - The Implementation Of One Pixel Attack To S...
IDSECCONF2024 - Kang Ali - Local LLM can Simulate Apt Malware With Jailbreak ...
IDSECCONF2024 - Brian Nasywa - Comparison of Quantum Key Distribution Protoco...
idsecconf2023 - Mochammad Riyan Firmansyah - Takeover Cloud Managed Router vi...
idsecconf2023 - Neil Armstrong - Leveraging IaC for Stealthy Infrastructure A...
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Akshantula Neha, Mohammad Febri Ramadlan - Cyber Harmony Auto...
idsecconf2023 - Aan Wahyu - Hide n seek with android app protections and beat...
idsecconf2023 - Satria Ady Pradana - Launch into the Stratus-phere Adversary ...
Ali - The Journey-Hack Electron App Desktop (MacOS).pdf
Muh. Fani Akbar - Infiltrate Into Your AWS Cloud Environment Through Public E...
Rama Tri Nanda - NFC Hacking Hacking NFC Reverse Power Supply Padlock.pdf
Arief Karfianto - Proposed Security Model for Protecting Patients Data in Ele...

Recently uploaded (20)

PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Spectroscopy.pptx food analysis technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Big Data Technologies - Introduction.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Approach and Philosophy of On baking technology
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Electronic commerce courselecture one. Pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Spectroscopy.pptx food analysis technology
“AI and Expert System Decision Support & Business Intelligence Systems”
Big Data Technologies - Introduction.pptx
Encapsulation_ Review paper, used for researhc scholars
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
The AUB Centre for AI in Media Proposal.docx
Chapter 3 Spatial Domain Image Processing.pdf
Machine learning based COVID-19 study performance prediction
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
sap open course for s4hana steps from ECC to s4
Mobile App Security Testing_ A Comprehensive Guide.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Approach and Philosophy of On baking technology
MIND Revenue Release Quarter 2 2025 Press Release
Electronic commerce courselecture one. Pdf
Advanced methodologies resolving dimensionality complications for autism neur...

How i hack_hacker_facebook - el_rumi

  • 1. Owned Exposed How I hack `Hacker` Facebook AccountPresented By El Rumi@IDSECCONF 2011
  • 2. Social Network & FacebookSocial Network SocialNetwork is a social structure made up of individuals (or organizations) called "nodes", which are tied (connected) by one or more specific types of interdependency, such as friendship, kinship, common interest, financial exchange, dislike, sexualrelationships, or relationships of beliefs, knowledge or prestige.(source: http://en.wikipedia.org/wiki/Social_network)
  • 3. Social Network & FacebookFacebookA “social networking” siteFramework for informationComplex control of who can see whatUsers have a “profile” with a picture* and other personal details as they wish, including “limited profile”Based on “Networks”Facebook creates a newsfeed based on what your “friends” are doing(source: http://users.ox.ac.uk/~tony/facebook.ppt)
  • 4. Facebook Account Security?(source: https://www.facebook.com/help/?faq=212183815469410)
  • 7. Proof of Concept! (Identification)
  • 8. Proof of Concept! (Penetration)
  • 9. Proof of Concept! (Penetration)
  • 10. Proof of Concept! (Penetration)
  • 11. Proof of Concept! (Owned)Take over
  • 12. Can We Prevent This?Change Security Question?(source: https://www.facebook.com/help/?faq=163063243756483)
  • 13. So?Hide Your Sensitive Data From Public.Hide Your Email From Public.Make Security Question :With Different Thing Answer But Easy To Remember.With Right Answer But Encrypted (md5, sha1, rot13, etc)
  • 15. Heil Indonesian Hacker’s“If any skiddy community gets too big, we shut them down. If any lamer causes too much trouble, we shut them down. If any group keeps fucking stuff up, we stop them.”-Elz (Kecoak Elektronik)-(source: http://kecoak.org/log/2010/12/25/owned-and-exposed-pwned-some-skiddy/)