Phishing Code For Facebook



How To Create Facebook Phishing Page. Hack Facebook account. Today I will tell you how you can create a Facebook Phishing page and how hackers hack anyone’s Facebook Account using the Facebook phishing page. Let’s open the original Facebook page by navigating the Facebook page URL. First of all, we open our browser and then go to Facebook. PHISHING code for facebook hacking #Phishing Attack: Step by Step How to hack Facebook with phishing page 2015 new methed How to hack Facebook with phishing page Phishing Webpage - An easy way to Hack Facebook.

Posted by Hacking-Tutorial.com in Hacking Tutorial | 165 comments

Type : Tutorial

Level : Medium – Hard

After wrote some tutorials about hacking facebook :

There's some readers ask about phishing technique. This tutorial continued from my last tutorial about 'Hacking Facebook Password Account' in phishing section.

What is phishing?

According to Wikipedia :

Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.

To make it simple, let's say that facebook phishing is a way to make and create fake facebook website according to the real website for negative purpose, such as : stealing credentials, data, etc.

Okay…to make it more simple, let's start the tutorial….hands on will make us understand better isn't it? 😀 LoL

Requirement :

1. facebook offline files (you can view our previous tutorial number 2 in link above)

Facebook

Do you know that we have the new update for fake facebook hacking tutorial? view the tutorial here

Step by Step Tutorial Hacking Facebook using Phishing Method :

Before you start, we wrote this is just for education purpose and we're not responsible if someday you use this for negative purpose and FBI or Interpol looking for you as a criminal and jail will be ready for you. !!Please remember this!!

1. In this tutorial about Hacking facebook using phishing method we will use not-allowed.com as free web hosting service, but you can choose the other most suitable with you.

Update!! : we got a comment from hosting representatives that you can't use this hosting for phishing purpose in case you use it for phishing, they will suspend and terminated your account..so we remove the link, and you can just find the suitable another free hosting. 🙂

Click 'Buat Akun' on the top right side page, You can register your account there.

2. The next step you can fill the required data there.

3. After step 3 they will send you an activation link to your e-mail and your account will be activated. If your account already activated you can click on 'Beralih' button to go to your hosting control panel.

4. Inside your hosting control panel, on 'File' section click 'File Manajer 1'(file management) to upload the file.

5. Inside your file management, click on 'public_html' to go into your web root folder.

6. Inside public_html folder, you can upload all the data here so it can be accessed worldwide. In this page you can choose which upload method you want to use, there's 'Upload', 'Java Upload', 'Flash Upload' you can choose which one most suitable for you. Don't forget to ZIP all of the content before uploading so it can be extracted later.

7. The next step is extracting the data we already upload on last step. Tick the ZIP file and click UNZIP to extract the data.

8. Here's the data after all the data extracted.

9. Yep everything has been set up correctly until this step. The next step we need to configure the database. Go to this link http://cpanel.not-allowed.com/index and click on 'Tool Penting' section and click 'Database MySQL'

10. The next step you need to fill in your database information in this page such as database name, database username, and so on…

When you finished, click 'Buat' button to create the user and database.

11. Now you will have a new database and new user, you need to go to your 'phpmyadmin' window by clicking the link to upload the database. Don't forget the 'Host MySQL' address, my address was mysql.not-allowed.com.

12. After everything finished, now in phpMyAdmin window, click on 'import' tab. Don't forget to download the database file below

and then click browse and upload the database you've just download before, and click 'Go' when finished.

13. When you finished everything, now time to modify login.php file and view.php file. Open that file using your favourite text editor(such as:notepad, dreamweaver, gedit, etc).

Don't forget to change the 'localhost' to address that described on step 11 (your configuration with our configuration maybe different 😀 )

When you finished edited that two file, you should upload that file and replace existed file (repeat step 6).

14. Well done! now you can check the address. Here's our screenshot when access the page.

15. When user input their e-mail and password, the fake facebook website will forward it to the wrong password page like this.

16. To view harvested e-mail and password, you can check on http://your-website.com/view.php.

Countermeasures :

1. Look carefully the address when you open a website that ask for your credentials. It's better you type it by yourself 😛

2. Change your password (and all the same password:e-mail, twitter, etc) ASAP when you know this attack happen

3. Maybe you can try one of this securing internet activity method 🙂 http://www.hacking-tutorial.com/tips-and-trick/5-steps-to-make-your-browsing-the-internet-activity-more-secure/

4. Install URL advisor(usually this you can get from antivirus for free) but not too effective.

Hope you found it useful 🙂

Share this article if you found it was useful:

Hacking Tutorial, Tips and Trick

See all posts by Hacking-Tutorial.com || Visit Website : https://www.hacking-tutorial.com

Phishing is the most commonly used method to hack Facebook. The most widely used technique in phishing is the use of Fake Log in Pages, also known as spoofed pages. In this post, you will learn about what is phishing, phishing attack, types, and techniques, how we can prevent such attacks and phishing facebook page.

You Can Also Read

What is Phishing?

It is the most common method used by hackers to hack accounts and an example of social engineering techniques that are used to deceive users. A phishing attack can be used to hack any type of accounts (almost most of the accounts can be hacked using this technique).

Phishing is a fraud and illegal activity used to obtain some bank account credentials, social account username, email address and passwords, credit card and many more fraud activities.

Hackers create a fake phishing page that looks like the original official website and due to this many people enter their information.

Hackers mainly use email messages, Instant messaging platforms like Facebook, WhatsApp, WeChat, Hike, etc. to send the links for hacking your passwords.

Facebook Phishing Site

In a survey, It is found that phishing is one of the most common techniques used by hackers to hack accounts and the success rate of this technique is high. But nowadays people are getting aware of this techniques but we need to update ourselves from time to time from the latest hacking methods.

Suggested: Increase real Instagram followers using this tool for free

Phishing Attack

The phishing attack is one of the dangerous fraud activities that can steal your important and sensitive information such as credit cards, social accounts, website admin passwords, etc.

A phishing attack can be used for different purposes like hacking facebook account, Instagram account, credit card numbers, bank account information, and for many other purposes.

Facebook phishing scams are widely used and it is the easiest method of hacking someone’s account. These fake login pages look like the original login pages of sites like Yahoo, Gmail, MySpace, etc. The victim is fooled to believe the fake Facebook page to be the real one and enter his/her password. But once the user attempts to log in through these pages, his/her Facebook login details are stolen away.

You can make any type of phishing login page to hack facebook using phishing. It is a criminal offense and illegal activity so don’t try to anyone. You can try this on your own account or system to learn this technique but do not try it on anyone else.

Suggested: WiFi hacking complete tutorial guide – Hack nearby WiFi password using this tool

Types & Techniques of Phishing

Facebook Phishing Website

Types and techniques that are commonly used in this type of attack.

Social engineering

In this technique, users can be encouraged to open attachment or links send to their email address or on instant messaging. When users open this link or attachment they got infected by a virus or hacked.

Clone phishing

Clone phishing is a kind of phishing attack whereby a genuine, and recently conveyed, an email containing a attachments/link has its substance and beneficiary address taken and used to make a practically indistinguishable or cloned email.

The link inside the email is supplanted with a malevolent form and after that sent from an email address parodied to seem to originate from the first sender.

It might profess to be a resend of the first or a refreshed variant to the first. This strategy could be utilized to turn from a recently tainted machine and addition and a dependable balance on another machine, by abusing the social trust related to the induced association because of the two gatherings accepting the first email.

Voice phishing

Facebook Phishing Text

Voice phishing is a good example that not all phishing attack requires to create a fake page of a website to get users password and email ID. In this phishing attack, hackers sent a message to your phone that claims to be from the bank, in which it says that you have some problems related to the bank account and you need to dial a customer number (customer number will be given in your message) to fix the problem.

But this message does not belong to the official bank. It is a trap to get your account bank number and password. When the user dials this number (hackers number which users may think official bank number), Hackers told users to enter their account numbers and PIN.

This type of phishing attack is called voice phishing. This phishing attack is done using VOIP.

Suggested: 3 techniques to hide Your IP Address

Spear phishing

In this phishing attack, hackers target specific individuals by collecting personal information and data of the individuals to increase their chances of success.

Other techniques

  • Link manipulation
  • Whaling

Suggested: 10 Best educational apps for students – Learning apps to Learn new things

How to prevent Phishing attack

1. Unknown mails

Do not open unknown email messages or links.

2. Attachments

Do not click or download any unknown attachment send by someone in your mail. If you know that the file is safe then you can open it.

3. Two-Step Verification (2-Step Verification)

Html Heart Code For Facebook

Always use 2 step verification for all of your accounts such as Gmail, Facebook, WhatsApp. Two-step verification protects you from hackers. Even if they successfully hacked your account they can’t log in to your account. They need to enter the digit code which will be sent on your phone.

4. Antivirus

Use good antivirus software, It can help you to protect all your sensitive information by detecting the virus, fraud links, phishing attack, ransomware attack, etc.

Antivirus also protects you when you are doing some online activities. If the antivirus found some potentially dangerous websites that can steal your information. It will automatically block such websites and files from the Internet.

5. Check the URL

Check the URL of the website before entering any information. A phishing page will look like a real one but you can easily identify them by checking the URL.

6. Do not share OTP

Do not share your bank OTP with anyone or do not enter any sensitive information such as bank account number and password over the voice call.

7. Game links

If your friend sends you a link and invited to play a game then before entering any information check that the link URL is real or fake one.

8. Do not login to your social media accounts using Email links

Do not log in to your account social media account using the mail message as it can be a hacking link to trick you and get your password.

You can find more tips to prevent yourself from hacking.

Phishing Html Code For Facebook

See Also:

phishing is a criminal offense and illegal activity so don’t try to anyone. This tutorial is for educational purpose.

Original Phishing Code For Facebook

For any help, you can leave a message on the Facebook page.