Facebook Hacking using SET and Armitage

Hacking Facebook Account With SET And Ettercap

Hello Everyone, here’s another simple tutorial for hacking facebook account using SET and Ettercap

In this method whenever victim opens facebook.com the victim will automatically redirected to our fake facebook page.So it sounds little Good so why late lets start the attack

Requirements:

Attacker’s machine: KALI LINUX
victim’s machine: Any os(win 7, 8, 8.1,10)
STEPS:


1.Boot kali linux , open terminal and type setoolkit and press enter.


2. Now select 1 and hit enter


3. Now select 2 and press enter.


4. Now select credential harvester attack , i.e option-3 and press enter.


5. select option 2 again and hit enter.


6.Now we have to enter our ip address for post back method.


7. open new terminal and type ifconfig and copy your ip address.


8. Now paste that ip address in previous terminal and press enter.


9. Enter the url of facebook as https://www.faceboo k.com


10.Now login page of facebook will be cloned with our ip address and all files 

will be copied to/var/www/html.

11. Now as page is cloned with our ip address so whenever victim will click on link it will show our ip address instead of facebook url, so to overcome this problem we use dns spoofing. so lets begin.
open new terminal and type locate etter.dns and press enter.


12. Now type leafpad/etc/ettercap/etter.dns and a new window will be prompted.


13. Edit the file as shown below and change the ip address to your ip address , save the file and close it.


14. Now open ettercap graphical mode


15. click on unified sniffing and click ok.


16. Now click on hosts and then scan for hosts.
after scanning click on hosts lists .A list of hosts will be shown choose any one host from your list and click on add target 1.


17. Now click MITM-> ARP SPOOFING and check sniff remote connections.


18.Now click on Plugins->Manage plugins and select dns_spoof.


19. Now we are ready, whenever target will open facebook.com in his browser he will be redirected to our fake login page. Lets check.


20. As he click login, his credentials will be saved to /var/www/html/harvester.txt. so lets check the login credentials of our victim.
THANKS..





  I am not responsible for any crime, do it on your own risk.....:)

Comments

Popular posts from this blog

HACKING ASP / ASPX SITES (MANUALLY)

How to Install Wpscan In Termux | Wpscan In Android