Disclaimer: This article has been written for educational purpose only.We don’t encourage hacking or cracking. In fact we are here discussing the ways that hackers are using to hack our digital assets. If we know, what methods they are using to hack, we are in very well position to secure us.

Phishing means to send a fake page to the victim and as soon as he/she enters username and password, you will fetch it from the fake page uploaded on your server.

Phishing can be done using the Kali Linux OS or without Kali Linux. In this article, we will be discussing both methods as how to create a phishing page using the Kali Linux and how to make a phishing page online. For the first method, you should know how to install Kali Linux on your PC.

A phishing page to hack facebook account can be done using the social engineering toolkit that is already installed in Kali Linux OS. The phishing link should be sent to the victim from the same local area network as you and the data that the victim enters on the fake page will be stored in a file on your machine.

Steps by Step Guide to Hack Facebook Account Using Phishing with Kali Linux

Step 1st: Open the Kali Linux with root access as ‘setoolkit’ needs you to have root access.

Step 2nd: Now Type setoolkit’ in the command line.

Here you will get a warning that this tool is to be used with proper license and authorization or for only educational purposes and if you use it for malicious purposes than you violate the terms and conditions of the tool.

Step 3rd: You should agree with the terms and conditions by typing Y in the command line.

Step 4th: Here you will see a menu “next”. Enter 1 as your choice.

Step 5th: Enter 3 to select the ‘Credential Harvester Attack Method’ in order to get the victim’s confidential information by creating a fake page that will few form fields including the username and password options.

Step 6TH:  Now, you do have the option here that is either to build a fraudulent page by your own or you can also clone the page of facebook site or other trustworthy site.

Step 7th: If you wish to get a Clone page than Enter 2 in the command line. It may take few minutes to create a page.

Step 8th: Now, in order to get the IP address you should open a new terminal window and write ifconfig. You should copy the IP address as mention in the “inet” field.

Step 9th: SET will ask you to put the IP address where the confidential information of the victim to be stored. Paste the IP address as you copied in the earlier step.

Step 10th: As we have chosen to make a clone of a website, we need to enter the URL or domain of the website of which we would like to make a clone.

Step 11th: As the SET requires the Apache server so you should Enter Y when it prompted about starting the Apache process.

Step 12th: Till here, you have completed the setting up of Phishing page and hosted it on server. SET will make us aware about the directory at which the captured data will be stored.

Step 13th: In order to hide the IP address you should use the URL shortening services to change the URL of actual site.

Step 14th: Now Go to the browser and type http://yourIP (for example:http://192.168.0.203)

Step 15th: If the victim fills the information here in this page and clicks on “Log in”, he will be redirected to actual Facebook login page. Most often, users doesn’t take it seriously and consider it as error in Facebook.

Step 16th: In the final step you can go /var/www/html where you will be able to see the harvester file created there.

Note: Above phishing method is described here just for the educational purposes as you will be able to aware what steps that hackers are taking to hack your facebook account and therefore you should protect yourself. Here you should know the difference between the fake page and real page and it can easily be identifiable if you the URL in the browser. You should never enter your username or passwords in any of the URL of which you are not aware of.

Hope this step by step guide gave you a complete idea of how phishing attacks work.

Search Keywords :

how to hack facebook,hack facebook,phishing,facebook,phishing attack,how to hack facebook account,facebook hack,facebook phishing,hack,facebook hacking,hack facebook id,how to,how to hack facebook by phishing method,how to hack facebook using username only,how to hack,how to make php facebook phishing sites,how to make facebook phishing sites 2018,how to hack facebook messenger

2 COMMENTS

  1. It is perfect time to make some plans for the future and
    it’s time to be happy. I have read this post and if I could I desire to suggest you some interesting things or tips.
    Perhaps you can write next articles referring to this article.
    I desire to read even more things about it!