NOTE : THIS TUTORIAL IS FOR EDUCATIONAL PURPOSE ONLY. IF YOU USE ANY TOOL MENTIONED IN THIS BLOG TO HACK SOMEONE IT IS ALL YOUR RESPONSIBILITY. ADMIN OF THIS BLOG IS AGAINST TO HACK SOMEONE. AUTHOR OF THIS BLOG IS NOT RESPONSIBLE FOR MISUSE OF ANY TOOL MENTIONED IN THIS BLOG.
NOTE : PLEASE DON’T USE ANY TOOL MENTIONED IN THIS BLOG TO HACK SOMEONE.
This blog is all about phishing. We are going to cover following topics in this blog -
1. What is phishing
2. Tools used in phishing
3. How to be safe
1. What is phishing? -
Phishing,
2. Tools used in phishing -
A hacker can create his own website for phishing but most of the hackers use tools for phishing. We are going to see some tools which are used for phishing.
NOTE : DON’T USE ANY OF THESE TOOLS TO HACK SOMEONE.
Zphisher -
This is a open source program that is created by htr-tech. Zphisher is an automated tool with around 30 templates. It has latest and updated login pages. It has multiple tunneling options – localhost, Ngrok, Cloudflare, LocalXpose. This tool is available for linux terminal and docker.
ShellPhish -
This tool has 6 templates of fake sites that are – Instagram, Facebook, Snapchat, Twitter, Github, and Google.
SocialFish -
It is an another tool which is used for phishing.
There are more phishing tools like above phishing tools.
NOTE : ALL THE TOOLS MENTIONED ABOVE ARE FOR EDUCATIONAL PURPOSE ONLY.
How to be safe -
The first and foremost way to be safe is to not click on any link which you get from an unknown person. If there is a need to click on that link, look at the URL of that site. If the URL is not the actual one don’t click on it.
What if the url is hidden or shorted with a shortner tool, look at the connection of that site. Most of the phishing sites’ connection is not secure.
Now, you have knowledge about phishing attacks. You can be easily be secure on internet.
Share this blog with your family and friends and help them to learn about phishing.