Skip to main content
GADGETS   COMPILER>



LockPhish

  LockPhish is the first phishing tool that can grab Windows credentials, Android PIN and iPhone Passcode using a https link. This tool is originally developed by TheLinuxChoice.



LockPhish - Phishing Attack on lock screen
Phishing attack on Lock Screen
This creates a fake lock-screen on target devices whenever target puts credential it captures it and sends to attacker using a ngrok tunnel. This tool automatically detect the device. Also track victim's IP address.

Key Features of LockPhish

  • Lock screen phishing page for Windows, Android and iPhone.
  • Auto detect device.
  • Port Forwarding by Ngrok.
  • IP Tracker.

Lets starts the installation process.

First we open our terminal window and type following command to clone this tool from it's GitHub repository:

git clone https://github.com/kali-linux-tutorial/lockphish
Then it will start the cloning process as shown in following screenshot.

git clonning lockphish

After finishing the process we need to go to LockPhish directory by using cd command:

cd lockphish

We need to give lockphish root access before run. To do that we apply following command:

sudo chmod +x lockphish.sh
 
Then we need to run the tool by using following command:

./lockphish.sh

The main menu of LockPhish will open as showing in the following screenshot:

lockphish main menu

Here we need to put the redirecting website's link after phishing. The default value is set to YouTube. YouTube is good for social engineering or we can put other links. Here for an example we keep it default and hit the Enter button.

Then it will download ngrok in our Kali Linux system, and configure the phishing servers on our localhost and finally give us the Phishing URL.


Now we can send this link to our target with some social engineering techniques. When our target opens this link it will ask to redirect on YouTube.
When our target clicks here to be redirected on YouTube, the device shows following kind of screen:

Phish the lockscreen
Phishing attack on device's lock-screen
After our victim inputs his Unlock PIN we got it on our terminal.

PIN received
PIN received
The same thing will work on Windows PC and iPhone, we just need to send the link it will automatically detect the type of device (Android, Windows, iPhone)

Comments

Contact Form

Name*

Email *

Message *