In maximum tools made for Linux environment for phishing purpose doesn’t offer many options. They offer only the most 5-10 popular platforms to clone.
The best thing is it not only captures the credentials, but it also captures the IP details. Just give a look at how to install the script in Kali Linux.
Install BlackEye in Kali Linux
Now you can share your Local IP address with the victim. Now the most important step is how you deliver it to the victim. You can Mask the IP address with URL shortener services. Also, you can use Emkei’s Fake Mailer to send a spoofed E-mail.
Note: The tool only works on LAN. AnonuD4y is working on modifying the script to integrate Ngrok with it so that it works over WAN but it has some issues with starting Ngrok. You can check out that version on Github. Also, You might know about Modlishka. A tool that can bypass two-factor authentication of websites including Google services. You don’t need to clone templates. Modlishka works like a proxy between you and the server, which means the server runs live. This tool taking Phishing to the next level. To give it a try, check out the tutorial on Modlishka on our site.
If we talk about the tool, it is an amazing tool. We are not talking about the web templates that come with it, we are talking about the extra two features we got to see. The first one is Ngrok and the second one is IP details. These two features make the tool amazing.
What’s your opinion about this tool? tell us in the comment box below.