Phishing is the process of stealing sensitive information, such as usernames, passwords, and bank information, by pretending to be someone you’re not. An example of this would be if you receive and e-mail from a hacker pretending to be your bank. In this e-mail, it might tell you that you need to update your account before it expires, and then the hacker provides a link. Once you click on the link, you arrive at a website that looks exactly like your actual bank page. In reality it’s just a perfect replica, and when you input your login details, it sends it to the hackers email or stores it on his web server. Hackers that create the best, most deceiving phishing web pages are knowledgeable in the area of HTML and the PHP programming. Below I will show a simple example of some of the steps a hacker might take to create a phishing website. By seeing the steps a hacker would take, will help you defend against such an attack.
NOTE: I’m not responsible for your actions I write this for education purpose only if you get in to trouble I’m not responsible!
Phishing is highly illegal so if you are new to hacking I will recommend first to do other stuff like RATing and keylogging then phishing.
When you are phishing you have to highly protect yourself.
First you need to sing up in very secure hosting. That won’t get you in trouble I can’t recommend you but after short search on internet I found some:
- 110mb – http://110mb.com
- Freehostia – http://freehostia.com
- t35 – http://t35.com
- PHPNet – http://phpnet.us
- ProHosts – http://prohosts.org
- 000webhost – http://000webhost.com/
I haven’t found paid but I think that they are more secure. So when you have found hosting its time to create phishing pages.
SO HERE IS HOW IT WORKS
- First the hacker chooses a target. The most popular targets for phishing attacks are e-mail services such as Hotmail and Gmail because they are the most common and once a hacker gets access to your e-mail, he also gets access to a load of other user information for all the other websites you use. In this example we will pretend the hacker chose Gmail as his target.
- After choosing his target, the hacker will go to the website and save the whole main page. I use Mozilla Firefox ,(highly recommend using this browser for its security and customization.) So I would go to www.gmail.com and click File -> Save page as… , or simply hit <CTR> + S which does this automatically. Choose where you would like to save the web page and hit Save.
- Once you have it saved, rename ServiceLogin.htm to index.htm. The reason you want to name it “index” is so when you upload it to a web host and someone goes to your link, the index page is the first page that shows up.
- Next the hacker would create a PHP script to do his dirty deed of steeling your information. Below is a simple PHP script that logs and stores your login details when you click “Sign in”. To see how it works, copy and paste the following code into notepad. Next save it into the same directory as you saved the Gmail page, and name it phish.php. In addition to the phish.php page, create a new empty text file and name it list.txt.
- Now the hacker would have to edit the main Gmail page to include his PHP script. To see what the hacker would do, open up the main Gmail page named index.htm with notepad.
- Hit <CTR> + F , or go to Edit -> Find , type in action and hit “Find Next”[size=78%].[/size]
- This will highlight the first occurrence of the word “action” in the script.There are two “action” occurrences in the script so make sure you have the right one by looking at the “form id” name above. Change the link between action = “ “ to phish.php . This will make the form submit to your PHP phish script instead of to Google.Change the word “POST” to “GET” so that it looks like method=”GET”. What the GET method does is submit the information you type in through the URL so that the PHP script can log it.
- Save and close the file.
- Next the hacker would upload the files up to a free webhost that supports PHP. With a simple Google search you can come up with a bunch that fall under this category.
- Once all the files are uploaded, you must give writing permissions to the “list.txt” file. Every hosting company should have a CHMOD option next to each file. Select this option and change the file permission for “list.txt” to 777. If you can’t figure out how to do this, ask people that use the same host or simply Google something similar to: “yourwebhostname chmod”.
- Once everything is up and ready to go, go to the link your host provided you for your website and you should see the Gmail page replica. Type in a username/password and click Sign in. This should have redirected you to the real Gmail page.
- Now go take a look at your list.txt file by going through your hosting file manager or going to http://www.yourwebhosturl.com/youraccount/list.txt. Although this is the most common, the web host you use may provide a different looking URL.
As you can see if you fell for this the hacker would have your email and password. Scary, eh?
The most easiest way, you can always use the tool called Phish Creator:
or do it manually, use the the following code (the following was also used as the example on “SO HERE IS HOW IT WORKS” section)
$handle = fopen(“accs.txt”, “a”);
foreach($_GET as $variable => $value)
Paste this and edit where is needed then save this will save all accs to accs.txt. Now you should link this page to the save you have save earlier.
What you just did is to call your own script when the user submit its form using the action command in html, so now you have the password and the user is redirected to original page.
You are ready now its time to start spreading your link .
I’m not the best in this section but I can help .
E-mail Spam – This is highly illegal too. But in our case we attack paypal so lets the system and they need to enter their information again.
– Beleive or not this is very effective way.