Sponsored
Andorid Hacking

Lockphish – Phishing Tool For Android PIN and iPhone Passcode

Hey Folks, In this tutorial we are going to talk about an credential dumping tool but it is quite different from the others tool because it is designed to grab the lock screen pins of the smartphone by phishing attack. Through this tool we can get lock screen passwords of various operating systems like: Android, Window and iOS etc. This tool is useful for the person who wants to enter the system but they do not have credentials.

Lets take a look πŸ™‚ !!

Installation

It’s an open source tool which you can download it from the github by using the following command. After downloading is done we will go to the directory and boot this tool directly with the help of bash command.

git clone https://github.com/kali-linux-tutorial/lockphish
cd lockphish
bash lockphish.sh

Windows

We do not have to do anything because it will do it automatically and give us the final link that we must share to the victim.

The following message will be appear after opening the URL by victim.

The login prompt will be activated as soon as the victim clicks the β€œredirect” message on the browser. Yaa ! really its look like exactly same.

Great πŸ™‚ !! When the victim enters his credentials to enter or login into the system then he will come to us.

Android

We do not need to run this tool again to perform the same attack for android devices. Now we send the same link to the victim.

Boom πŸ™‚ !! You can see that we have successfully got the lock screen credentials of the victim android phone. Similarly, if the victim is using another operating system then it will identify itself and make phishing accordingly.

About the Author
Shubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
Sponsored

Recent Posts

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

1 month ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

8 months ago

Cariddi – Hidden Endpoint Finder for Bug Hunting

Hey Folks, we are back today after such a long break, but don't worry we…

2 years ago

API Security Testing 101: Know Everything About API Security Testing!

The security of your API should be one of the top priorities of companies. Without…

2 years ago

7 Best Tools for Web Penetration Testing: Comprehensive Details

Hey Folks, In today's business world, it is essential to have an online presence. However,…

2 years ago

Cyber Security Audits: Everything You Need to Know About It

Hey Folks, Is your business prepared in case of a cyber attack? Many companies don't…

2 years ago
Sponsored

This website uses cookies.