Phishing Training with SocialFish V3.0

Man

Professional
Messages
3,085
Reaction score
623
Points
113
In this tutorial we will show you how to use SocialFish to get our victim's accounts.

In this tutorial, we will show you how to use social engineering techniques with the SocialFish tool to obtain our victim's accounts.

The latest version of SocialFish introduces an intuitive user interface for managing and creating phishing. The latest version is also easy to use for those who have little to no knowledge of phishing.

1. Installing SocialFish​

To install SocialFish, we can either download it as a zip file or clone the github repository using terminal by running the following command:
Code:
git clone https://github.com/UndeadSec/SocialFish.git

After loading, we go to the directory:
Code:
cd SocialFish

Once in the directory, we need to download all the requirements to run and use SocialFish:
Code:
pip install -r requirements.txt

Once the installation is complete, we are ready to start the phishing attack.

2. Launch SocialFish​

Once the installation is complete, we need to make the SocialFish.py file executable.

To do this we use the command below:
Code:
сhmod +x SocialFish.py

To run the tool, we use the following syntax:
Code:
./SocialFish.py <username> <pass>

In the “<username>” field we will set the username we will use to log in, and in the “<pass>” field we will set the password we will use.

We will run it as shown below:

socfish.png


3. Login to the main page​

We open our favorite web browser and go to the above link to log in as shown in the image below.

From the main page we can start a phishing attack on our target.

4. Launching a phishing attack​

Once we enter the main page, we can see various useful components that we can use in our phishing.

socfish2.png


As shown in the image above, we have a field to enter the link of the site we want to clone and a field to enter the web page we want to be redirected to.

You can also choose to use a custom HTML page.
We have the ability to embed beef-xss into our phishing page for use with the BeEF tool.

SocialFish also has an access token in case you want to connect it to your android app to more easily manage phishing attacks.
The “Send mail” option will allow us to send a phishing email directly to the target mailbox from the main page, as shown in the image below.

socfish3.png


Once complete, we can generate a full phishing report using the button on the main page. At the bottom of the phishing page is where we can review our phishing reports, as well as perform deeper information gathering on our targets. We can scan for open ports and even use shodan to gather additional information.

In this tutorial we will be doing a custom attack so we will be using a custom page as shown in the image below.

Now, after the user enters their credentials, they will be redirected to google.com:

socfish4.png


5. Using Ngrok with socialfish​

This step is usually optional and is only used if your target is not on the same local network as you. Using this option will make the instance of SocialFish you are running accessible to any user as long as they have an active internet connection.

Ngrok will help us tunnel the traffic sent through the port we are using on SocialFish, which is port 5000, using the following command:
Code:
ngrok http 5000

You can share the link generated by ngrok with the victim. When he/she clicks on the link, he/she will be directed to the login page.

Once the victim enters the email address and password to log in, they will be redirected to the link we provided earlier.

The victim's account data arrived to our admin panel and we can use it for our own purposes.
 
Top