• Home
  • About Us
  • Contact Us
  • Disclaimer
  • Sitemap
  • Privacy Policy

Pirated Hacker

  • Tutorial Blogger
  • Tutorial SEO
  • Template Blogger
  • Catatan
  • Teknologi
    • Smartphone
    • Laptop
Home » Unlabelled » Phishing with Linux

Phishing with Linux

Information:

Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication.

Tutorial how-to:

***NOTE: 1. Press 'Enter' after typing each Terminal command. 2. When typing commands, do not type the starting and ending apostrophes ('')*** This tutorial uses BackTrack.

1. Boot BackTrack (or any Linux distro)

2. Find your Internet IP address: type 'ifconfig' in Terminal. The numbers after 'inet' addr is your IP

3. Navigate to BackTrack > Exploitation Tools > Social Engineering Tools > Social Engineering Toolkit > set, and select: Social-Engineering Attacks or just type 'cd /pentest/exploits/set', and then '/.set' in the Terminal

4. Select choice 2: Website Attack Vectors

5. Now select choice 4: Tabnabbing Attack Method

6. Now select choice 2: Site Cloner. Do this TWICE.

7. Enter the login page you want to clone (Ex: http://www.facebook.com)

8. Press Return (on the keyboard)

9. Now your IP wil be a phishing page. When a user logs in, their username and password will be displayed in the Terminal. Can also be used with URL shortener services.

Download: (For other Linux distros)

git clone https://github.com/trustedsec/social-engineer-toolkit/ set/

Requirements:

1. An Internet connection

2. A BackTrack Installation recommended

Tweet

Terimakasih anda telah membaca artikel tentang Phishing with Linux . Jika ingin menduplikasi artikel ini diharapkan anda untuk mencantumkan link https://pirateddevil.blogspot.com/2015/03/phishing-with-linux.html. Terimakasih atas perhatiannya.

Related Posts

at 10:54 AM

{ 0 comments... read them below or add one }


Post a Comment

Newer Post Older Post Home

Popular Posts

  • Introduction to PasswordCracking
    Introduction to PasswordCracking
    Password Cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system. A common...
  • Types of Cryptography
    Types of Cryptography
    1.Symmetric Key Cryptography (Secret Key Cryptography) 2.Asymmetric Key Cryptography (Public Key Cryptography) 3. HASH FUNC...
  • Password Hacking Using JavaScript
    Password Hacking Using JavaScript
    Just Copy and Paste this code in your Browser URL to reveal the hidden password.    javascriptfunction(){var%20s,F,j,f,i;%20s%20=%20%22%22...
Copyright Pirated Hacker: Phishing with Linux