For example, you may receive an email that has been sent by your school company, or bank asking for your account details but in reality, it would be sent by a hacker.
Create a Fake Login Page to Hack Facebook Accounts
3. Now search for the keyword “action= ”.
4. In the source code change this to “hackme.php”.
5. Change the method from POST to GET.
6. Click on File, Ã save, and then save the text file as index.php. And make sure you select all file options in the save as type field.
7. Write the below .php code in a blank text file. And click on the file, save it, and then type the name “hackme.php”. [save file name by which we change in index.php file action= “Given Name.php”]. Make sure you have selected all file options in the save-as-type feature.
8. Upload both index.php and hackme.php to a paid or free web hosting like 2freehosting.com or 000webhost.com.
9. After upload send a phishing URL link to the victim [may be your friend or anyone]. When the victim opens the webpage it will look like the real Facebook login screen but actually, it is a fake login screen attack/phishing attack that will steal his password.
10. When the user clicks on the login button he will be automatically redirected to the Facebook website and he will think that some communication error may have occurred or whatever [LoL].
11. Now check your Webhosting File manager there will be a new file called password.txt that would have been created inside when the victim clicks on login which is the username and password that have been saved in it. Finally, we get the victim's Username and Password.
Phishing Automatic Attack by Kali Linux
Social Engineering Toolkit
1. Open Kali Linux Go to Menu à Exploitation Tools à Social Engineering Toolkit à Set.
2. This is what the social engineering toolkit looks like it gives you various options it says select Menu. So here we have to press 1 for social engineering testing.
3. Next it gives me again various types of attacks that can I Execute. So I want to execute website attack vectors by selecting Option 2.
4. Now I want to execute a credential harvester attack method so I Select 3.
5. Now it shows three attacks we want to execute site cloner an attack so we Select 2.
6. Now it is asking me to enter the IP address of my own computer where the Username and Password will be sent. Open a new terminal window in Kali Linux and type the command “ifconfig” then press Enter. Now see my IP Address has been displayed so now copy it.
8. Now it asks me to enter the URL of the website which I want to clone. I want to clone http://www.facebook.com and press Enter.
9. Now the Facebook website is cloned press the enter key to continue.
10. So now I want my friend's or anyone else Username and Password. I need to fool my friend or anyone else to log in on my own Facebook-cloned site.
11. For that send this IP Address to your friend or Anyone whose account you want to hack. When they log in to your clone website.
Then after clicking on the login button on the terminal, it shows the Username and Password of my friend or anyone else.
Now successfully I get the Username and Password of my friend.
ShellPhish
Usage:
git clone https://github.com/thelinuxchoice/shellphish
cd shellphish
bash shellphish.sh
How do you prevent Phishing Attacks?
- Spelling mistakes and poor grammar.
- The mismatched domain name and email address.
- Suspicious attachment.
- Request for personal information.
- Offers that look too good to be true.
- To prevent phishing attacks always use two-factor authentication.