🐟Phishing
In this project we are going to do something big, we've used a github repository that's gonna help us to learn and understand how phishing works. This github repository has been deleted many times and reuploaded by many users, all of them have the "blackeye" name on it. Different versions and different code from which I've had to take pices, adapt it and finally make it work (I won't upload it because it's going to get banned anyway).
⚠️ Disclaimer
This content is provided for educational and learning purposes only. All activities, tools, and techniques mentioned or demonstrated are intended to help individuals understand cybersecurity concepts in a safe and responsible manner.
It's a tool very powerful that has two interesting things, a folder with many php files that "immitate" a known enterprise login webpage, that means that we can imitate various login pages that we are going to use to fool the target to give us their user account and password. The second file is the bash file where we:
Choose the login page we want to imitate.
We create a local PHP server.
We create the site with the variables username and password where we are going to store the information.
We create using ngrok the webpage and the URL we are going to send to the target.
I read all the code and how it worked, learning how to create the php server, how the php files were programed (very accurate gotta say) and how is used in the main program.
Redirecting to PHP Server:
if [ ${file_exists "server IP.txt"} ]; then redirect_to_php-server --ip=$user $\{\}\]\$\*\$IP else create-p-hphp script with a default URL. end if
If
server IP.txt
exists, redirects to the php server using$user
as the IP. Otherwise, it creates the PHP and NGroK scripts.
Creating PHP Script:
$url=$php-sys-server --ip=$server $\{\}\]\$\*\$IP:5555
Creates a php script on the specified IP with a default port number.
Starting Server:
start_server --tunnel=$tunneling-method
Starts the PHP server using either
start_ngrok()
orstart_localtunnel()
based on the tunneling method.
Linking to ngrok.com:
link.ngrok://$\{\}\]\$ngrok-server $\{\}\]\$NGROK-USER $\{\}\]\$NGROK-PORT
Links to the NGroK server at
ngrok.com
with the specified user and port.
This tool is a littlebit old and many users have used it, I could learn and try for my self once, because literally, once try it I was able to get the credentials (mine) and everything worked properly, then I was banned from ngrok because they detected that the credentials were sent to a particular host and not a known server, meaning that I was phishing myself.
I got litearlly banned from using ngrok again (at least for a little time) but I think it was worth it.
It's interesting how every repository in internet use tunneling (for wich only you can acces your own web, also because google autmatically blocks this type of service) and there's no ngrok version. I had to search and modify the code to actually make it work.
Last updated