1 00:00:00,620 --> 00:00:06,710 In this lesson, we will talk about the website fishing, OK, that is making a clone of a website like 2 00:00:06,710 --> 00:00:15,530 Facebook, Demián, etc. So as always, but as you it and this time we will select the second option, 3 00:00:15,650 --> 00:00:18,140 which is website attack vectors. 4 00:00:19,430 --> 00:00:25,820 Now we will select the third one, which is credentialed harvester attack method, because we want to 5 00:00:25,820 --> 00:00:27,910 steal the credentials of our target. 6 00:00:28,340 --> 00:00:28,970 So three. 7 00:00:30,400 --> 00:00:34,920 Now, select the second option, which is Scicluna, why? 8 00:00:35,350 --> 00:00:40,780 Because the second Matraville completely clone a website of your choosing and allow you to utilize the 9 00:00:40,780 --> 00:00:41,720 attack vectors. 10 00:00:42,850 --> 00:00:50,810 OK, so second, and enter your IP address for the purpose of post back. 11 00:00:51,780 --> 00:00:54,850 OK, so this is the IP offer. 12 00:00:54,850 --> 00:00:56,170 Carlysle, enter. 13 00:00:58,220 --> 00:01:00,740 Now says, enter the Google to clone. 14 00:01:00,860 --> 00:01:09,590 OK, so enter your view of the website, which you want to make a clone of the Godard Facebook dot com 15 00:01:10,640 --> 00:01:17,150 and hit enter and it will create a clone of Facebook dot com for you that you have to share that link 16 00:01:17,150 --> 00:01:18,080 with your target. 17 00:01:18,500 --> 00:01:20,150 Then your target opens the link. 18 00:01:20,420 --> 00:01:27,350 And when he enters the information like username, password, then you will get them here on your screen. 19 00:01:27,890 --> 00:01:30,920 But there is one problem for this purpose. 20 00:01:31,130 --> 00:01:38,850 You have to keep your PC on 24 by seven until your target clicks on it and the rest of the world. 21 00:01:39,470 --> 00:01:39,830 Right. 22 00:01:40,460 --> 00:01:42,730 So there is a better alternative to this. 23 00:01:43,670 --> 00:01:50,180 So open your browser and open a website which says Z or DOT info. 24 00:01:50,330 --> 00:01:52,820 OK, create account with this. 25 00:01:53,420 --> 00:01:56,180 And this website will help you with phishing attacks. 26 00:01:56,900 --> 00:02:04,130 So it will going to create a clone for Facebook, Jimin, Instagram, etc. simply create an account 27 00:02:04,130 --> 00:02:09,240 with them and then they will provide you the link, then share the link with your target. 28 00:02:09,770 --> 00:02:14,470 Now you don't need to login until your target clicks on the link, OK? 29 00:02:14,720 --> 00:02:17,480 You can log out and do your work right. 30 00:02:17,930 --> 00:02:21,610 This website keeps your linked life 24 by seven. 31 00:02:22,040 --> 00:02:29,510 So when your target clicks on the link and enter his information unit user credentials, this website 32 00:02:29,510 --> 00:02:30,860 will record them for you. 33 00:02:31,670 --> 00:02:32,030 Right. 34 00:02:32,330 --> 00:02:34,160 So you can use this website. 35 00:02:35,450 --> 00:02:39,320 So this is how you can perform website phishing.