Credential Harvester Attack Method Social engineering attack

Credential Harvester Attack – Welcome, to another article In this article we are going to discuss about Credential Harvester Attack method in this method you can make any website a phishing page.
Credential Harvester Attack Method Social engineering attack-Se-toolkit tutorial

What is Credential Harvester method?

The Credential Harvester method will utilize web cloning of a web- site that has a username and password field and harvest all the information posted to the website.

Step 1: Choose the Credential Harvester method

First you type this below command this command will help you to open setookit in your terminal.

sudo setoolkit

Once you open setoolkit tool in your terminal choose first option 1. Social -Engineering Attack Now you can see 10 module but you choose 2nd option website attack vector In this place you can see Credential harvester Attack Method option just choose it.
Credential Harvester Attack Method Social engineering attack-Se-toolkit tutorial

Step 2: Create a Phishing page

Once you choose Credential harvesting method in your terminal you can see this below 3 option.
1. web Templates
  • This is first method will allow SET to import a list of pre-defined web applications that it can utilize within the attack.

2. Site Cloner

  • This second method will completely clone a website of your choosing and utilize the attack vectors within the completely same web application you were attempting to clone.

3. Custom Import

  • The third method allows you to import your own website, note that you should only have an index.html when using the import website functionality.
Now you can choose 2nd option site cloner

Step 3: Create Phishing Page

— * IMPORTANT * READ THIS BEFORE ENTERING IN THE IP ADDRESS * IMPORTANT * —

The way that this works is by cloning a site and looking for form fields to rewrite. If the POST fields are not usual methods for posting forms this could fail. If it does, you can always save the HTML, rewrite the forms to be standard forms and use the “IMPORT” feature. Additionally, really

Important:
If you are using an EXTERNAL IP ADDRESS, you need to place the EXTERNAL IP address below, not your NAT address. Additionally, if you don’t know basic networking concepts, and you have a private IP address, you will need to do port forwarding to your NAT IP address from your external IP
address. A browser doesn’t know how to communicate with a private IP address, so if you don’t specify an external IP address if you are using this from an external perspective, it will not work. This isn’t a SET issue this is how networking works.
Once you choose IP address then you choose your target website see this below image.
Credential Harvester Attack Method Social engineering attack-Se-toolkit tutorial

You did not set port number because this tool automatically take default port number 80

Step 4: victim view

Now you send your ip address to victim if your victim click that ip address that will be show this below image.
Credential Harvester Attack Method Social engineering attack-Se-toolkit tutorial

NOTE : Don’t Sent IP Address to victim because that will only work for local network so you use ngrok this will work globally

NoIfour victim type any data on this page means you get immediately in your terminal s, see the images below
Credential Harvester Attack Method Social engineering attack-Se-toolkit tutorial

Post a Comment

Previous Post Next Post