How to perform Lock Screen Phishing Attacks using Lockphish Tool

Hello Guys! You’re warm welcome in this advance hacking blog. Now today I came here to share about “How to perform Lock Screen Phishing Attacks using Lockphish Tool ” Here in this tutorial, I’ am using Lockphish Tool for performing Lock Screen  Phishing attack. So, read the post till the last.

How to perform Lock Screen Phishing Attacks using Lockphish Tool

Lockphish: A Tool For Phishing Attacks On The Lock Screen

Lockphish is the first tool for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN, and iPhone Passcode using an https link. This tool is developed by TheLinuxChoice.
READ MORE:
This creates a fake lock-screen on target devices whenever the target puts credential it captures it and sends it to the attacker using a ngrok tunnel. This tool automatically detects the device. Also, track the victim’s IP address.

Disclaimer: The usage of Lockphish for attacking targets without prior mutual consent is illegal. It’s the end user’s responsibility to obey all applicable local, state, and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.

Features:

  • Lock screen phishing page for Windows, Android, and iPhone.
  • Auto-detect device.
  • Port Forwarding by Ngrok.
  • IP Tracker.
So, Let’s get started-

How to perform Lock Screen Phishing Attacks using Lockphish Tool

Now, here are some steps that you can easily perform lock screen attacks. So, Step by step follow me-
STEP1: First of all, open the terminal window of your Kali Linux machine, and type the following command to clone this tool from it’s GitHub repository 👇

git clone https://github.com/kali-linux-tutorial/lockphish

 After writing the command on the terminal window. it will start the cloning process as shown in the following screenshot.

How to perform Lock Screen Phishing Attacks using Lockphish Tool

STEP2: After finishing the process, You need to go to LockPhish directory by using the below command, and hit the enter key.

cd lockphish

STEP3:  Now, the next important thing, you need to give lockphish executable permission before the run. To do that you apply the following command:

sudo chmod +x lockphish.sh

 STEP4: After giving executable permission, Then you need to run the tool by using the following command, and hit enter key.

./lockphish.sh

STEP5: Now, the main menu of LockPhish will open as showing in the following screenshot:

How to perform Lock Screen Phishing Attacks using Lockphish Tool

STEP6: After that, you put the redirecting website’s link after phishing. The default value is set to YouTube. YouTube is good for social engineering or, you can put other links also. Here, for example, you keep it default and hit the Enter button.

STEP7: Now, it will download ngrok in your Kali Linux machine, and configure the phishing servers on our localhost, and finally give us the Phishing URL.

How to perform Lock Screen Phishing Attacks using Lockphish Tool

STEP8:  After that, you can send this link to your target victim with some social engineering techniques. When your target victims open this link then, it will ask to redirect on YouTube Website.

How to perform Lock Screen Phishing Attacks using Lockphish Tool

STEP9: When your victim clicks here to be redirected on YouTube, the device shows the following kind of screen:

How to perform Lock Screen Phishing Attacks using Lockphish Tool

STEP10: After your victim inputs, his Unlock PIN you got it on your terminal window of Kali Linux.

The same thing will work on Windows PC, and iPhone, You just need to send the link. it will automatically detect the type of device (Android, Windows, iPhone).
LAST WORD:
So in this way, you can easily How to perform Lock Screen Phishing Attacks using Lockphish Tool, and I covered “Lockphish: A Tool For Phishing Attacks On The Lock Screen”. Now stay in touch with your loved ones without any interruption. So, friends, this is the end of the article, If you liked this post, please do not forget to share it.

Leave a Comment