![]() What will end up happening is that the above script will log the user credentials, saving it under a filename called “pass.txt”. What you’re required to do is open Notepad and paste the script below. The next course of action is to create the actual phish.php page. The purpose of that is so that when a user is login in, it directs them to “phish.php” instead of to real Facebook address. Swap the link URL after the “action=” with “phish.php” (So there should be no link left, but “phish.php” inside the brackets should be there. Once it opens type in “action” and then click on “Find Next” There are two “actions” in a document, you need first one. Press Ctrl + F to open the Find function. Change the page title to “index.html” and save it on your computer. Once it is open, right click again and select the option “Save As”. On the webpage, right click and select the option “view page source” (Ctrl + U). (You should be logged out of your profile). Open your browser and go to the Facebook website login page. The intention is to help you understand the mind of a hacker and not to maliciously use this information on others. This guide is for educational purposes only. How to make a phishing page for Facebookīefore we get into the tutorial, one thing ought to be clear. ![]() It is therefore up to you to remain vigilant and warn others. What problematic however is that Facebook don’t promise to take care of every issue reported. Instead, forward the email to Alternatively, you can report links that you notice on the platform itself. If any of the above happens to you, do not ignore. – A startling warning that your account might be locked or deleted if you don’t do something immediately, usually login in on the link provided. – Indicate that your password is in attachment, or ask you for your password, or personal information such as your credit card number or the PIN, social security number or tax ID, something Facebook never does. – The links are mismatched, meaning that what it says on the body of text is not the same one that appears on a new tab once you’ve clicked on it. ![]() It’ll be reminiscent of a toddler first getting acquainted with MS Word. There will be typos, randomly placed accents and multiple fonts and colors. – You’ll find that generally, the text is all over the place. Hackers often send you an email with instructions. Before clicking on a promotion or offer, ensure that “is at the beginning of the URL link. Therefore, be mindful of the links that you engage in. That’s usually the fastest way to tell if you’re dealing with a hacker when they are offering you something you didn’t solicit.Īnother indication that you’re dealing with a scammer is that they ask you to click on a link and redirect you to what looks like the Facebook login page, asking for your email address and password. Do you suddenly have an unknown brand offering you free tangible or digital gifts and prices for absolutely no reason? That is an indication that there is a hacker trying to phish you. What does it look like? It usually disguised in anything that is too good to be true. ![]() This approach often happens on email, but people on social media fall prey as well. Therefore, phishing is when a hacker gets you to put sensitive information such as your password and pins into a fake website, and instantly gaining access to your personal data and accounts. In this case, what catches you is a fake website. Just as the name sounds, it is a fishing expedition where the hacker puts out bait and you end up biting it. The first means of hacking a Facebook account is phishing. – How to make a Phishing page for Facebook The purpose here is not to equip you with the tools to go hack your friends and strangers, but rather to expose hacking tactics that will ensure you don’t fall prey to hackers. How many times have you seen an update on your timeline from one of your Facebook friends stating their account had been hacked? If the same has happened to you or are wondering how that happened, in this article we’ll explore three potential methods that hackers could have used to access their passwords.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |