LockPhish -- Phishing Attack on Lock Screen

LockPhish is the first phishing tool that can grab Windows credentials, Android PIN and iPhone Passcode using a https link. This tool is developed by TheLinuxChoice.

LockPhish - Phishing Attack on lock screen
Phishing attack on Lock Screen
This creates a fake lock-screen on target devices whenever target puts credential it captures it and sends to attacker using a ngrok tunnel. This tool automatically detect the device. Also track victim's IP address.

Key Features of LockPhish

  • Lock screen phishing page for Windows, Android and iPhone.
  • Auto detect device.
  • Port Forwarding by Ngrok.
  • IP Tracker.

Lets starts the installation process.

First we open our terminal window and type following command to clone this tool from it's GitHub repository:

git clone https://github.com/thelinuxchoice/lockphish
Then it will start the cloning process as shown in following screenshot.

git clonning lockphish

After finishing the process we need to go to LockPhish directory by using cd command:

cd lockphish

We need to give lockphish root access before run. To do that we apply following command:

sudo chmod +x lockphish.sh
 
Then we need to run the tool by using following command:

./lockphish.sh

The main menu of LockPhish will open as showing in the following screenshot:

lockphish main menu

Here we need to put the redirecting website's link after phishing. The default value is set to YouTube. YouTube is good for social engineering or we can put other links. Here for an example we keep it default and hit the Enter button.

Then it will download ngrok in our Kali Linux system, and configure the phishing servers on our localhost and finally give us the Phishing URL.


Now we can send this link to our target with some social engineering techniques. When our target opens this link it will ask to redirect on YouTube.
When our target clicks here to be redirected on YouTube, the device shows following kind of screen:

Phish the lockscreen
Phishing attack on device's lock-screen
After our victim inputs his Unlock PIN we got it on our terminal.

PIN received
PIN received
The same thing will work on Windows PC and iPhone, we just need to send the link it will automatically detect the type of device (Android, Windows, iPhone)

This is how we can use the phishing attack on devices lock-screen and get the login credentials.

Warning:-  This tutorial is for educational purpose only. It shows how the modern day phishing attack works. Phishing is a serious crime. If anyone do any illegal activity then we are not responsible for that.

If you liked our this tutorial then follow our blog regularly for more good quality Kali Linux tutorials. Follow us on Twitter and Medium for quick updates. Faced any problem or have any thoughts with this article then leave a comment below, we always replay.
LockPhish -- Phishing Attack on Lock Screen LockPhish -- Phishing Attack on Lock Screen Reviewed by Kali Linux on May 27, 2020 Rating: 5

4 comments:

  1. please tell bro, how to identify A device location with IMEI number.

    ReplyDelete
    Replies
    1. This is gonna be tough. Articles on Google will lead you to fake articles. We wil try to write an article about it.

      Delete
    2. plz bro, try to do the article as soon as possible, eagerly waiting for your article. thak you bro.

      Delete
    3. Hi, we have researched about this. This requires permissions from Network Service Providers. They have access the devices IMEI numbers with SIM cards and they can track location of devices by using signaling towers. Even law enforcement needs help of these service providers to do this kind of location tracking. This is possible but not for everyone, who have high authority permissions in network providers services can do this.

      Delete

Please do not spam here. It is comment box not a spambox. Promotional links are not allowed.

Powered by Blogger.