Top Ad unit 728 × 90

How to used Zphisher step by step guide in kali linux

Zphisher - Automated phishing attack tool in kali linux:

A potent open-source phishing tool is Zphisher. It is now widely used to conduct phishing attacks against Target. Compared to Social Engineering Toolkit, Zphisher is simpler. It offers phishing template webpages for 33 well-known websites, including Facebook, Instagram, Google, Snapchat, GitHub, Yahoo, Proton mail, Spotify, Netflix, LinkedIn, WordPress, Origin, Steam, Microsoft, etc. It contains some templates produced by a tool called Zphisher. It also gives the user the option, if desired, to use a unique template. Using this tool, phishing attacks are simple to carry out. You can conduct phishing in a (wide area network) using this tool. To obtain credentials like an ID or password, use this tool.

zphisher in kali linux

Use and features of zphisher:

1).  Zphisher is a free software programmed.

2). Zphisher is a Kali Linux utility.

3). Phishing attempts employ Zphisher.

4). Zphisher is a really straightforward and uncomplicated tool.

5). Zphisher is a really straightforward and uncomplicated tool. 

6). The Zphisher tool is a portable device. It doesn't require additional room.

7). Zphisher is programmed in bash language.

8). More than 33 websites have phishing pages made by Zphisher.

9). Zphisher produces fake versions of well-known websites including Facebook, Instagram, Google, Snapchat, Github, Yahoo, Protonmail, Spotify, Netflix, LinkedIn, WordPress, Origin, Steam, Microsoft, etc.

Installation:

      cd Decktop                                                                                          

      git clone https://github.com/htr-tech/zphisher.git

      ls

      cd zphisher






Step 2: Use the following command to launch the utility after you are in the zphisher directory.

      bash zphisher.sh




Step 3: The tool has successfully launched and is running. You must now decide which settings to use in the tool to create the phishing page.




Step 4: Select the number for which you need to develop a phishing page from these alternatives. Choose option 2 if you want to establish a phishing page for Instagram.




Step 5: Now you can see that it is providing 4 alternative web layouts in order to entice the victim. Any of these options are yours to select. Suppose you wish to select option 1, then press 2.



Example 1: Create an Instagram phishing page using the Zphisher tool to obtain the victim's credentials (user ID and password).

This interface will be visible once the tool has been launched.



Any of the URLs might be sent to the victim. His or her identity and password will be reflected in the terminal once they have been entered.


You can see that we opened the ezlikers link. The phishing page that we just opened is this one. The user now has to provide their ID password.



The ID and password information is available here. This is how to use zphisher to carry out phishing. You can send the victim these links. The victim's actions will be mirrored on the terminal once they click the link and enter their ID password. Zphisher operates in this manner. One of the better tools for phishing assaults is this one. You can select an alternative based on your needs. A potent open-source phishing tool is zphisher. These days, it's often utilised to conduct phishing assaults. Compared to Social Engineering Toolkit, zphisher is simpler. 

Video :








How to used Zphisher step by step guide in kali linux Reviewed by For Learnig on August 07, 2023 Rating: 5

No comments:

If you have any doubts, please tell me know

Contact Form

Name

Email *

Message *

Powered by Blogger.