In this example,i have used ,the victim will see homepage of yahoo mail.This is only the login form,i have entered the login username as:' Kali used to hack email-id and password' and password as: ' Hacking successfull'.When the victim visit the url which you have sent them,the will see a same page of which url you had entered to clone the website.The victim will think that it is a original page and when the victim enters any of their information,you will see that information in the terminal. The next step is the most important step,till now we have make your IP address go online and anyone who visit your IP address will see the page which will look like the website of whose url you entered to clone.In this step,you need to shortened your IP address by using services like,etc.Once you enter your ip address on these sites to shorten,they will provide you a link,all you need to do is just send this shortened link to your victim.
0 Comments
Leave a Reply. |