[Nulled] » Information security » phishing of social networks via Setoolkit
March 13 2022

phishing of social networks via Setoolkit

phishing of social networks via Setoolkit
Kali linux has such a cool thing as the Social Engineering Toolkit , and we will do it
1. Open the terminal in Kali and write the setoolkit command, it will look like this.

 

2. after our "Program" is loaded, we get about this.

 

3. From here we need to go to Social-Engineering Attacks, so we prescribe "1"

This Menu will open.

 

4. Here we need to go to the Website Attack Vectors , therefore we write in the line "2"

There will be such a menu.

5. We need the Credential Harvester Attack method, we prescribe "3"

This menu opens

6. Here it's clear to the hedgehog, we need a Site Cloner, So we prescribe "2"

 

here we register our IP Address and press Enter

7. In the line that opens, we write the Full Address of the page that we want to copy

Warning! You are not allowed to view this text.

Now We Are Testing

****aem there any text in the login and password windows

 

Warning! You are not allowed to view this text.


 





Information

Visitors who are in the group Guests they can't download files.
Log in to the site under your login and password or if you are a new user go through the process registrations on the website.

Comments:

This publication has no comments yet. You can be the first!

Information the publication:

Related News

13 March 2022
Information security»,Protection and hacking
Hacking a computer with

Hacking a computer with one phrase The essence of the vulnerability lies in the partial use of social engineering

Read more
23 February 2022
Programming
How do I sign a document

How do I sign a document with an electronic signature in Adobe Acrobat Reader DC? Before you start working with a

Read more
13 March 2022
Information security»,Protection and hacking
Chntpw: Reset and bypass

Chntpw: Reset and bypass the Windows password chntpw is a utility for viewing some information and changing user

Read more
13 March 2022
Information security»,Protection and hacking
Hacking websites through

Hacking websites through Kali Linux Attention! Information for research, training, or auditing. Use for mercenary

Read more
13 March 2022
Information security»,Protection and hacking
Evilginx2: Phishing and

Evilginx2: Phishing and 2FA Bypass In this article, we will talk about phishing and bypassing two-factor

Read more

Information

Users of 🆅🅸🆂🅸🆃🅾🆁 are not allowed to comment this publication.

Site Search

Site Menu


☑ Websites Scripts

Calendar

«    December 2024    »
MonTueWedThuFriSatSun
 1
2345678
9101112131415
16171819202122
23242526272829
3031 

Advertisement

Survey on the website

Evaluate the work of the site
 

Statistics

  • +5 Total articles 6749
  • +16 Comments 4218
  • +24 Users : 6013