Ads 468x60px

Thursday, August 22, 2013

Facebook exploit tutorial done By khalil

Apparently this got patched before I could release this... I'll let it stay here so you can read something I made.
Sorry.

Hey guys! I recently saw a thread on another forum on how to do exploit.

What this exploit is about


When you make a new status on Facebook, the default value of making a status is set to your profile. By changing a single value, you will be able to make a post on any wall you want.

Step 1
Open Facebook, write a status message but don't submit it.

Step 2
Open the profile you wish to make a post on, and copy the username, or ID, right after the facebook.com part. Example:

http://www.facebook.com/zuck
Copy zuck and put it after this URL: http://graph.facebook.com/

http://www.facebook.com/zuck -> http://graph.facebook.com/zuck

Step 3
Go back to your Facebook status, and open Google Developer (F12) or Inspect Element (Firefox) and click on the status, like this:
[Image: 46uhJ.png]

Step 4
Scroll up, till you find an input-tag with name set to "xhpc_targetid". It looks like this:
<input type="hidden" autocomplete="off" name="xhpc_targetid" value="12345">

Step 5
Go back to the graph.facebook.com tab you opened before, and copy the ID. It looks like this:
[Image: 46unu.png]
In that case, the ID would be 4.

Step 6
Go back to your Facebook status, and replace the value="xxx" (from step 4) to your new ID. Example:

<input type="hidden" autocomplete="off" name="xhpc_targetid" value="12345">
changed to:
<input type="hidden" autocomplete="off" name="xhpc_targetid" value="4">

Once that is done, all you need to do now is press "Post". Your post will now be posted on the target's Facebook wall!

Enjoy

0 comments:

Post a Comment

 

Is TOR Secure??

TOR is not safe to hack!! With putting too much security in middle, you increase the risk of malicious traffic from end station going undetected through this tight-secure loop. It’s a general rule when traffic moves from higher trust to lower trust , the nature of protection provided on either ends should be evaluated and should it match with the data classification level it carries with in. try using some other vpns!!In particular if somebody can observe your traffic and your target's traffic, he can correlate that.

One interesting variant is connecting to a VPN over TOR. That helps with 3), provided you trust the VPN, but you need to figure out a way to buy VPN access anonymously.

Factors Affecting Anonymity Online

IP address- can be resolved by VPN's. User agent- https://addons.mozilla.org/en-US/firefox/addon/user-agent-switcher/. MAC address - Technetium mac changer. For more information be have anonymous service online. Please visit http://prism-break.org/

Total Pageviews

Total Pageviews

Total Pageviews

Sample Text