Skip to content
wolfgangherfurtner

wolfgangherfurtner

People Gotta See More

Primary Menu wolfgangherfurtner

wolfgangherfurtner

  • News Business
  • traffic finance
  • business markets
  • finance & accounting
  • Finance & Oportunity
  • business ideas
  • About Us
    • Advertise Here
    • Contact Us
    • Privacy Policy
    • Sitemap
  • Home
  • Facebook password phishing with DNS manipulation [Tutorial]
  • traffic finance

Facebook password phishing with DNS manipulation [Tutorial]

Thelma D. Griggs 27/04/2022 6:04 AM

Table of Contents

Toggle
  • Fb password phishing
    • Read Upcoming:

Password Phishing can result in massive loss of identity and user’s private details. This could outcome in money losses for people and can also stop them from accessing their personal accounts.

In this article,  we will see how an attacker can take edge of manipulating the DNS record for Fb, redirect website traffic to the phishing web page, and get the account password.

Fb password phishing

Here, we will see how an attacker can consider benefit of manipulating the DNS document for Facebook, redirect targeted visitors to the phishing web site, and seize the account password.

Initial, we have to have to established up a phishing web page.

You want not be an qualified in website programming. You can conveniently Google the actions for making ready a phishing account.

  1. To create a phishing web site, to start with open up your browser and navigate to the Fb login web page. Then, on the browser menu, click on File and then on Save site as…. Then, make certain that you decide on a total site from the fall-down menu.
  2. The output must be an .html file.
  3. Now let’s extract some details in this article. Open the Phishing folder from the code files provided with this reserve. Rename the Fb HTML webpage index.html.
  4. Within this HTML, we have to adjust the login type. If you search for action=, you will see it. Below, we improve the login sort to redirect the request into a customized PHP page named login.php. Also, we have to transform the request approach to GET as an alternative of Put up.
  5. You will see that I have added a login.php webpage in the exact Phishing listing. If you open up the file, you will obtain the following script:
 $price) 
fwrite($take care of, $variable)
fwrite($handle, "=")
fwrite($tackle, $worth)
fwrite($manage, "rn")

fwrite($take care of, "rn")
fclose($manage)
exit
?>

As before long as our target clicks on the Log In button, we will send out the information as a GET ask for to this login.php and we will keep the submitted info in our passwords.txt file then, we will near it.

  1. Following, we will develop the passwords.txt file, where by the goal credentials will be stored.
  2. Now, we will copy all of these information into varwww and start the Apache solutions.
  3. If we open up the index.html site regionally, we will see that this is the phishing website page that the goal will see.

Let’s recap really swiftly what will happen when the concentrate on clicks on the Log In button? As shortly as our concentrate on clicks on the Log In button, the target’s credentials will be sent as GET requests to login.php. Recall that this will take place because we have modified the action parameter to mail the credentials to login.php. After that, the login.php will ultimately retail outlet the information into the passwords.txt file.

Now, prior to we start the Apache providers, allow me make guaranteed that we get an IP address.

  1. Enter the next command:
ifconfig eth0

You can see that we are managing on 10.10.10.100 and we will also begin the Apache provider applying:

service apache2 get started
  1. Let us validate that we are listening on port 80, and the services that is listening is Apache:
netstat -antp | grep "80"

Now, let us bounce to the goal aspect for a second.

In our preceding segment, we have utilised google.jo in our script. Below, we have presently modified our preceding script to redirect the Fb website traffic to our attacker device. So, all our concentrate on has to do is double-click on on the EXE file. Now, to validate:

  1. Enable us start off Wireshark and then start out the capture.
  2. We will filter on the attacker IP, which is 10.10.10.100:
Wireshark
  1. Open the browser and navigate to https://www.fb.com/:
Wireshark

As soon as we do this, we’re taken to the phishing site instead. Here, you will see the destination IP, which is the Kali IP address. So, on the goal aspect, once we are viewing or hitting https://www.facebook.com/, we are basically viewing index.html, which is set up on the Kali equipment. Once the target clicks on the login webpage, we will send the facts as a GET request to login.php, and we will retail store it into passwords.txt, which is at this time empty.

  1. Now, log into your Fb account working with your username and password. and jump on the Kali facet and see if we get anything on the passwords.txt file. You can see it is still vacant. This is simply because, by default, we have no authorization to publish data. Now, to fix this, we will give all information comprehensive privilege, that is, to go through, produce, and execute:
chmod -R 777 /var/www/

Take note that we manufactured this, considering the fact that we are running in a VirtualBox setting. If you have a net server uncovered to the general public, it’s lousy practice to give total permission to all of your information because of to privilege escalation attacks, as an attacker might upload a destructive file or manipulate the documents and then search to the file locale to execute a command on his own.

  1. Now, soon after supplying the permission, we will stop and start off the Apache server just in scenario:
provider apache2 quit
assistance apache2 start out
  1. Immediately after undertaking this modification, go to the focus on equipment and try out to log into Facebook just one extra time. Then, go to Kali and click on passwords.txt. You will see the submitted facts from the concentrate on facet, and we can see the username and the password.

In the conclusion, a good sign for a phishing exercise is lacking the https indication.

We executed the password phishing course of action making use of Python. If you have savored examining this excerpt, do verify out ‘Python For Offensive PenTest‘ to master how to safeguard oneself and safe your account from these assaults and code your own scripts and learn moral hacking from scratch.

Read Upcoming:

Post navigation

Previous: Meta Runs Into Problems With Brazil Payments Offering
Next: Break the rules to grow your startup

More Stories

52 Billion Visitors Per Month for Affiliate Marketing Sales
  • traffic finance

52 Billion Visitors Per Month for Affiliate Marketing Sales

Thelma D. Griggs 24/10/2022 8:30 AM 0
How to Calculate Future Value of a Investment
  • traffic finance

How to Calculate Future Value of a Investment

Thelma D. Griggs 23/10/2022 8:25 AM 0
7 Digital Marketing Channels To Boost Brand Awareness
  • traffic finance

7 Digital Marketing Channels To Boost Brand Awareness

Thelma D. Griggs 22/10/2022 8:13 AM 0
September 2025
M T W T F S S
1234567
891011121314
15161718192021
22232425262728
2930  
« Aug    

Archives

  • September 2025
  • August 2025
  • July 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • November 2021
  • October 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • November 2020
  • November 2018
  • December 2016

Categories

  • Business
  • business ideas
  • business markets
  • Entertainment
  • finance & accounting
  • Finance & Oportunity
  • News Business
  • Property
  • Real Estate
  • traffic finance

Recent Posts

  • Why Professional Translation Services Are Essential for Businesses in Canada
  • What Are Professional Employer Services and How Do They Work?
  • Understanding the pros and cons of quick small business loans
  • The Benefits of Partnering with a B2B Marketing Agency for Sustainable Growth
  • The Perfect Pair: Airweight Pants for Durability and Flexibility on the Hunt

Fiverr

Fiverr Logo

Tags

5e Business Profit Ahron Levy Columbia Business School Att Business Login Business Consultant Certification Austin Business Insurance Cover Coronavirus Business Letter With Logo Example Business Located Easy Location Business Platform Stocks Business Positions Seattle Business Regulation Legal Services Daystarr For Business Dimagi Business Development Toolkit Do Business Schools Accept Entreprenuers Enironmentall Friendly Business Ideas Eric Early Republican Business Owner Essec Business School Dean Essential Business To Remain Open Example Small Business Fall Winter Business Hours Template Fdot Woman Owned Business Certification First Business Women United States First Com Business Fixing A Damaged Reputation Business Florida Business Enforcement Free Small Business Communication Tool Law School Business Entity Outlines Mapping A Business Location Medical Business Trends Economics Mix Business And Personal Money Mlm Nit Small Business Legally New Business Agency Sales Questions Patricia Saiki Women'S Business 1990 Safety Business Proposal Sample Business Plan Entrepreneur School Business Administration Positions S Corp Business Deductions Search Tx Business Llc Sentextsolutions Business Cards Signs For Business On Roads Skype For Business Recording Capacity Small Business Forums .Net Small Business Insurancr Tech Monkey Business Ttu Business Cards Template Turbotax Business Nys Forms
ironvia
cowlingair

PONDOK

hotruns
staybeyondinn

PL

focusvia
glossiee

You may have missed

Why Professional Translation Services Are Essential for Businesses in Canada
  • business ideas

Why Professional Translation Services Are Essential for Businesses in Canada

Thelma D. Griggs 17/09/2025 5:37 AM
What Are Professional Employer Services and How Do They Work?
  • business ideas

What Are Professional Employer Services and How Do They Work?

Thelma D. Griggs 28/08/2025 7:38 AM
Understanding the pros and cons of quick small business loans
  • business ideas

Understanding the pros and cons of quick small business loans

Thelma D. Griggs 27/08/2025 3:30 AM
The Benefits of Partnering with a B2B Marketing Agency for Sustainable Growth
  • business ideas

The Benefits of Partnering with a B2B Marketing Agency for Sustainable Growth

Thelma D. Griggs 15/08/2025 6:42 AM
The Perfect Pair: Airweight Pants for Durability and Flexibility on the Hunt
  • business ideas

The Perfect Pair: Airweight Pants for Durability and Flexibility on the Hunt

Thelma D. Griggs 01/08/2025 2:14 AM
wolfgangherfurtner.com | CoverNews by AF themes.

WhatsApp us