Ready to Start Your Career?

Phishing Using Shellphish

gagan1999 's profile image

By: gagan1999

July 28, 2021

What is a Phishing Attack?

A Phishing Attack is a fraud that attempts to obtain sensitive information like usernames, Bank Account Numbers, credit card information, and passwords. Phishing is an example of a Social Engineering technique used to deceive users. The way phishing works is that an attacker clones a trusted website or spoofs an email of a known target, leading the person to believe that he is visiting a trusted website, e.g., Facebook, Snapchat, Instagram, Google, or Netflix. The target will then put his/her username and password on the malicious website (cloned website), and then the username and password are sent to the attacker instead of the actual website. Once the information is collected, the target is redirected to the dedicated website, where they will log in and never realize that any information was stolen. In this tutorial, we will be doing a demo of phishing using Shellphish.

ShellPhish is a tool written in bash. It offers a total of 18 phishing websites and a custom site that people can visit. Once they attempt to log in, the phisher gets the credentials, just like any actual phishing website. Tools like this can be very useful during a penetration test, where the tester wants to test a company’s employees to see how good they are at identifying phishing emails.

Things Needed:

  1. Kali Linux or any other Linux Operating system.
  2. Internet Connection.
  3. Shellphish that we will be using for this practicum.
  4. Firefox and other browsers.

Steps:

  1. Open Firefox in Kali Linux.
Open Firefox in Kali Linux
  1. Type github.com in the URL.
Type github.com in the URL
  1. In the search box, type shell phish.
type shell phish in search box
  1. Select the first repository.
  2. Click on the Clone or Download button and copy the URL. Note ** GitHub repos can be removed or updated, so this specific repo may not be available in the future.
steps 4 and 5 image
  1. Open your Terminal
  2. Type(git clone URL and paste the URL you have copied, then press Enter.
  3. It will start downloading the shellphish file.
steps 6-8 image
  1. When the download is complete, change your directory to shellphish by typing cd shellphish.
step 9 image
  1. In the Shellphish directory, typing command ls -l will show all files and their permissions.
step 10 image
  1. Now, what we will need to change is the permissions of shellphish. sh
  2. As you can see, its permissions are (-rw-r–r– ). By (-r), it means (read) permission; by (w). it means (write) permission
  3. There is no execute permission, i.e., x. To add an execute permission, we need to give command chmod +x shellphish.sh, which provides it with new permission (x).
step 13 image
  1. Now, we can execute it by typing ./shellphish.sh
  2. Shellphish has started. Choose any option from above just by typing the number; e.g., if I want to make an Instagram phishing page, I will type (1) as insta is written on number one.
step 15 image
  1. Then, choose a port forwarding service that will give you the phishing URL. I will go with ngrok, so I typed 2.
step 16 image
  1. If I use it for the first time, it will start downloading ngrok. Please wait for it.
  2. When the download is complete, it will present a URL, which is the URL we will use to phish our target.
step 18 image
  1. Next, this link can be sent via email, WhatsApp, Messenger, or any other media.
  2. When the target clicks on this link, you will get the location and IP address
  3. After that, the page will open. When the target types his/her username and password, it will be sent to the attacker. Then the target will be redirected to their Instagram.
step 21 image

Because I was using TOR, the location is unknown, but the location shown will be the exact location of the target otherwise. Notice: This article is for ethical hacking and educational purposes only. If you’re interested, click here to start a career in ethical hacking.

Schedule Demo
Build your Cybersecurity or IT Career
Accelerate in your role, earn new certifications, and develop cutting-edge skills using the fastest growing catalog in the industry