Phishing is the art of tricking a Facebook account holder—or any social network prospect in handing out their log-in information unknowingly. How can that happen? Simple. A hacker makes a Phisher account, which is a spitting image of the log-in page of the site being copied, and send its url as link to a or group of prospects. Phishing is so far the most difficult way of hacking accounts, and definitely the most risky. With a little mistake or hint that the link is just a phisher, a hacker can be in trouble. That is why a Phish must be truly knowledgeable and have a great deal of convincing power.
How does Phishing work? First, the Phish or the hacker must create a dummy site. This site or the Phisher account will have to look just like the site it is being copied. Typically, it is the log-in page that hackers are concerned about because that is where the most important information of the victim are, so it is what the hacker convert into his very own log-in account. The hacker subscribe into a webhosting service and signs up for a sub domain. Then, he copies the index.htm of this account and replaces the one in the htdocs of the control panel’s online file manager of the site being copied. Another file in the folder in the folder, the one with the filename write.php, has to be downloaded to the Phisher account, too. This will result to the Phisher account being a spitting image of the log-in page of the site being copied.
The difficult part of Phishing is getting prospects to log-in to the Phisher account. This is where the convincing power of the hacker is needed. Usually, hackers succeed because of their wit in persuading their victim into logging in and giving away their username and password without sweat. The hacker will simply send a target a link that will take the victim to the log-in page and there it is the victim’s Facebook or any social network account is hacked. Usually, the hacker sends alarming message which will allow the victim to respond fast. Maybe a message like, “Protect your password, Update your account now!” may do the trick.
One of the good things in using a Phisher account in hacking Facebook accounts is that it can be used in blast e-mailing, which makes all the difficulties and time-consuming technical chores become a small chunk of work. Though making a Phisher account may be too long and so techy, once it is up, the hacker has nothing else to do but send messages to limitless number of account holders—of any social networking sites or even forum and message board accounts.