SHELLPHISH - Phishing Tool for 18 social media (over internet) using Termux
WHAT IS A PHISHING ATTACK??
Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message. The recipient is then tricked into clicking a malicious link, which can lead to the installation of malware, the freezing of the system as part of a ransomware attack or the revealing of sensitive information.
An attack can have devastating results. For individuals, this includes unauthorized purchases, the stealing of funds, or identify theft.
Moreover, phishing is often used to gain a foothold in corporate or governmental networks as a part of a larger attack, such as an advanced persistent threat (APT) event. In this latter scenario, employees are compromised in order to bypass security perimeters, distribute malware inside a closed environment, or gain privileged access to secured data.
An organization succumbing to such an attack typically sustains severe financial losses in addition to declining market share, reputation, and consumer trust. Depending on scope, a phishing attempt might escalate into a security incident from which a business will have a difficult time recovering.
An attack can have devastating results. For individuals, this includes unauthorized purchases, the stealing of funds, or identify theft.
Moreover, phishing is often used to gain a foothold in corporate or governmental networks as a part of a larger attack, such as an advanced persistent threat (APT) event. In this latter scenario, employees are compromised in order to bypass security perimeters, distribute malware inside a closed environment, or gain privileged access to secured data.
An organization succumbing to such an attack typically sustains severe financial losses in addition to declining market share, reputation, and consumer trust. Depending on scope, a phishing attempt might escalate into a security incident from which a business will have a difficult time recovering.
HOW TO PERFORM THIS ATTACK USING SHELLPHISH TOOL IN TERMUX.
STEP 1 : DOWNLOAD TERMUX From playstore and open termux.
pkg install git
pkg install python2
pkg install php
pkg install curl
NOTE: IF you already install this package then skip this step.
STEP 2: Type this
git clone https://github.com/thelinuxchoice/shellphish.git
STEP 3:
cd shellphishchmod +x shellphish.shls
STEP 4: run this script
bash shellphish.sh
STEP 4 : select this phishing page you want to create ( i am making instagram phishing page).
NOTE:- You can also create custom phishing page my typing 19
STEP 6 : NOW send this url link to victim ..
wait for victim to open this link..
NOTE: this tutorial is for educational purpose only.
Thats it for today..
i hope you will learn something new.keep sharing my website
I already post many tutorials like this.if you want then you can read that tutorials.
you know i am teaching tutorials with screenshot.if you got any error or any questions then you can comment below(within 24 hours problem will solve).
if you want any tutorial then you can send message (check request section) in (menu).
keep sharing our website to get latest tricks like this.
Don't forget to comment below.
stay tuned to our website.
Thats it for today..
i hope you will learn something new.keep sharing my website
I already post many tutorials like this.if you want then you can read that tutorials.
you know i am teaching tutorials with screenshot.if you got any error or any questions then you can comment below(within 24 hours problem will solve).
if you want any tutorial then you can send message (check request section) in (menu).
keep sharing our website to get latest tricks like this.
Don't forget to comment below.
stay tuned to our website.
sir how to hack a wifi
ReplyDelete