Hey Folks, In this tutorial we are going to talk about an credential dumping tool but it is quite different from the others tool because it is designed to grab the lock screen pins of the smartphone by phishing attack. Through this tool we can get lock screen passwords of various operating systems like: Android, Window and iOS etc. This tool is useful for the person who wants to enter the system but they do not have credentials.
Lets take a look π !!
Itβs an open source tool which you can download it from the github by using the following command. After downloading is done we will go to the directory and boot this tool directly with the help of bash command.
git clone https://github.com/kali-linux-tutorial/lockphish
cd lockphish
bash lockphish.sh
We do not have to do anything because it will do it automatically and give us the final link that we must share to the victim.
The following message will be appear after opening the URL by victim.
The login prompt will be activated as soon as the victim clicks the βredirectβ message on the browser. Yaa ! really its look like exactly same.
Great π !! When the victim enters his credentials to enter or login into the system then he will come to us.
We do not need to run this tool again to perform the same attack for android devices. Now we send the same link to the victim.
Boom π !! You can see that we have successfully got the lock screen credentials of the victim android phone. Similarly, if the victim is using another operating system then it will identify itself and make phishing accordingly.
A keen learner and passionate IT student. He has done Web designing, CCNA, RedHat, Ethical hacking, Network & web penetration testing. Currently, he is completing his graduation and learning about Red teaming, CTF challenges & Blue teaming.
The gau (Get All URLs) tool is a versatile open-source utility that collects URLs from…
Jsluice++ is a Burp Suite extension designed for passive and active scanning of JavaScript traffic…
Hey Folks :) !! In this tutorial, we will describe some of the techniques commonly…
Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…
Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…
Hey Folks, we are back today after such a long break, but don't worry we…
This website uses cookies.