What is Phishing ?

 > WHAT IS PHISHING : 

  The attack is performed for stealing the credential of people by using fake web pages of the login form or ATM card detail filling page (payment pages) or other types of pages like any social media login page like GOOGLE, FACEBOOK, INSTAGRAM etc. Attackers use their social engineering skills to convince victim to login into his/her fake phishing page.

    Some of phishing pages are used to gather more information about victim like his name, contact number, age, favourite color, birth date, g-mail, IP address and some times bank account details etc. we think what  they can do with our name or birthdate, but those details are enough to crack your password. Using that information they guess so many passwords that user can use to protect their particular account. Then they will make a list of those guessed password and using that password list they can hack your account using bruteforce method. We will discuss that method in another blog. In most of case victim choose his/her mobile number, name, birthdate, favourite things etc as password.

> WHAT IS PHISHING PAGE :

  A phishishing page is a fake login page. It is = used to gain access to someones account. When someone logs in into the fake login page, there password is sent to attacker. Attacker can gain access to their account and do any thing using their account.

    IF YOU WANT MORE INFORMATION ABOUT WHAT IS PHISHING THEN YOU CAN VISIT OUR YOUTUBE CHANNEL WE HAVE MADE A PERTICULAR VIDEO ON THIS PERTICULAR TOPIC, AND YA DON'T FORGOT TO SUBSCRIBE OUR CHANNEL.

CHANNEL LINK : CLICK ME

> HACK ACCOUNTS USING PHISHING ( practical ) :

  Now i am going to teach you some tricks, with you can perform phishing attack using your ANDROID device and PC.

DISCLAIMER : Hacking others without their permission is crime. I will not be responsible for any illegal actions or activities done by you. I am writing this for education purpose only. If you will get in trouble I will not responsible!. 

TRICK 1

> REQUIRMENTS : 

 (1) ANDROID PHONE WITH HOTSPOT

 (2) TERMUX APK

 (3) MOBILE DATA

 (4) COFFEE(JUST KIDDING XD)

  So first of all you have to install termux application from playstore. Then you have to copy following commands and paste those commands in your termux.

> TOOL INSTALLATION COMMANDS : 

 apt update

 apt upgrade

 apt install git

 apt install php

 apt install curl

 apt install wget

 git clone https://github.com/htr-tech/zphisher.git

 cd zphisher

 chmod +x *

 bash zphisher

> TUTORIAL VIDEO :

    Because of some privacy guidelines i can not uplode video here or in youtube. But you can download tutorial video and instruction manual with a gift.

DOWNLOAD VIDEO ZIP FILE HERE : CLICK ME

VIDEO FILE TYPE : MP4

VIDEO FILE SIZE : 36 MB

FILE PASSWORD : iamsolo

> NOTE

Once you install this tool you don't have to type the commands that i have mentioned above. After installation you just have to type the following commands to use that tool again.

 apt update

 apt upgrade

 ls

 cd zphisher

 bash zphisher 


> HOW TO PROTECT YOUR SELF FROM PHISHERS/HACKERS :

If you want to protect your self from Phishers you can do 2 things

(1) DO NOT CLICK ON SPAM SMS OR LOGIN IN ANY LINK.

        If you get any message like : click on this link and Rs.50,000/- will be credited in your bank account, or click on this link you to increase your followers and likes on instagram , facebook or you can verify your instagram account or increase subscribers and likes on yotube. Then don't click on that link or login using that link ,login with original websites only.

(2) USE TWO STEP AUTHENTICATION / TWO STEP VERIFICATION ON YOUR ANY                 SOCIAL MEDIA OR ANOTHER ACCOUNT.

          In case hacker got your password and trying to login, if your two step authentication is on then it will ask hacker for 6 digit verification code and hacker won't be able to login in to your account and you will get notification that some one is trying to login with your account. If you will Use two step authentication / verification then youre account will be more secured. its nearly impossible to bypass your two step verification code.


Post a Comment

0 Comments