top of page
  • hamidullahbayram

Phishing Simulation: is it so easy, yes it is…


Phishing and social engineering are trending because they exploit human psychology rather than relying solely on technical hacking skills. Cybercriminals use these tactics to trick individuals into revealing sensitive information, such as passwords and financial details. The widespread use of digital communication platforms like email, social media, and messaging apps makes it easier for attackers to reach and deceive large numbers of people. Additionally, the increasing sophistication of these attacks, which often appear legitimate and personalized, makes them difficult to detect and prevent.


There are several reasons why Phishing: is prevalent because it is an effective and low-cost method for adversaries to steal sensitive information, such as passwords, credit card numbers, and personal details. That’s why it is so common, because:

  • High Success Rate: Many people are unaware of phishing tactics, making them easy targets.

  • Easy to Execute: Phishing requires minimal technical skills compared to other hacking methods. Cybercriminals can use templates and automated tools to send out massive numbers of phishing emails or messages.

  • Broad Reach: The widespread use of email and social media allows phishers to target millions of potential victims with a single campaign.

  • Psychological Manipulation: Phishers exploit human emotions, such as fear, curiosity, and urgency, to prompt immediate action from victims without careful consideration.


These factors combined make phishing a persistent and growing threat in the digital world. That’s why it is getting more dangerous besides becoming trends. In this post, I try to explain how it is a piece of cake! There is no illegal activity, is just for educational purpose...


We need only following resources, and a few template for mostly used social media account, can be found easily by an internet search.

 

As a first step, we have create an account on localxpose.io which is a tool designed to expose our local applications/IP to the internet. It allows us to create public URLs for locally running services by its tunneling function. Then, we download the suitable binary for our system on the access menu.


Then slide the pages little bit down, here is we have token, that can be regenerate after an expiration, because we have limitation with this free version like having only 15 minutes for each tunneling and pop-up a warning page before going to the link, and there is random link instead of link masking.


Next step is to make downloaded binary executable by chmod +x loclx command and run it by ./loclx. Then copy-paste your token to login.


Now, clone the zPhisher from github: https://github.com/htr-tech/zphisher

Go to the file, and run zphisher.sh. Type the number for targeted account…


Continue with the desired tunneling method…


Then zPhisher is lunching our server… It can be chosen also custom port.


On the other hand, we can easily find a phishing email template on internet. Sender is also a fake email address, which has to be paid attention.


zPhisher gives us a random link, is you have a premium account, you can mask the link. Now we add the link to the phishing template that we want to send via email.


I’ve received the email. Link is here so called to secure my account.


There is also a warning page before going to the link because of free version, the link also obvious.


When the link visited, we receive the notification as “Victim’s IP is xxx.xxx.xxx”. Then Victim enters the credentials.


When the victim enter the Login, we receive the credentials via zPhisher. The victim is automatically directed to the real Login page to re-enter the username and password.


Another practice on Netflix…



Combining awareness education, robust security measures (spam filter, email authentication, MFA), and proactive monitoring can significantly reduce the risk of falling victim to phishing attacks. By staying vigilant and employing a multi-layered defense strategy, individuals and organizations can better protect their sensitive information from such cyber fraud.



10 görüntüleme

Comments


bottom of page