![]() At this point, you should now have two files saved: index.htm and post.php. ![]() Copy and paste the following code into this document, and remember to save it: Next, create a new notepad document with the name of post.php.This is going to become your phishing page. Save this file somewhere on your computer with the file name of index.htm.Delete everything contained in the quotations, and instead fill the quotes with post.php.You should see a line that looks like this: action=”″.If using Notepad, hit ctrl f (which is the find hotkey) and search for action.Go ahead and dump all of the page’s source code into Notepad (or your operating system’s best simple text editor).You should see an option along the lines of “view source page.” Click on this option and you should be able to view the code behind this page. Then, right click on the website’s login page. Let’s take a closer look at the steps required. Today, however, we are going to setup an imitation Facebook login page to show you just how easy it is to start phishing. If it happens to be a business’s Facebook profile, they can damage their business. However, the hacker can now wreak ungodly amounts of havoc on a person’s social life. And now the hacker has their login credentials! In Facebook, this may not be as consequential as another website, like online banking. The user, who is really the attacker’s victim, actually entered their private information into a hacker’s website. Believing they are viewing the intended web page, they enter their login credentials to access the web service. ![]() Most frequently, the process works as follows:Ī user clicks on a bad link to a phishing site. Attackers frequently employ this method to steal usernames and passwords. Phishing is the process of setting up a fake website or webpage that basically imitates another website. Not only will it help you avoid mistakes that threaten your security and privacy, but it will also help you spot fishy phishing sites. Keeping that in mind, there is a lot of value, especially for aspiring hackers, in understanding how phishing works. If you’re reading this with the hopes of learning how to gain access to countless users’ Facebook credentials, I should instead refer you to philosophical ideas on morality. If you’ve ever had your username or password stolen, you know how bad it feels when others have violated your privacy. It simply isn’t legal, and it isn’t moral, either. ![]() However, and I can’t stress this enough, this knowledge should never be used to attack others in the real world. In this tutorial, we’re going to take a close look at how to setup a phishing page to harvest usernames and passwords that can be used to hack other users’ Facebook accounts. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |