PhishX Tutorial: Spear Phishing Tool for Capturing a User’s Credentials

PhishX is a Python tool that can capture user credentials using a spear phishing attack. Spear phishing is a targeted form of phishing attack that is launched against specific individuals. Therefore, some information about an individual is required to launch such an attack.

Since PhishX is used to capture a user’s credentials, the tool generates fake pages and adds target information to said pages. The pages are shared with the target users. If the users share any data on the fake pages, the data is captured by the interface on the attacker’s machine.

The pages that can be used (cloned) for spear phishing attack include Facebook, Google, Twitter, Instagram, LinkedIn, Pinterest, Quora, and Steam. All the available pages support the mobile version except LinkedIn.

PhishX Installation

PhishX Installation

PhishX works with Kali Linux and Parrot-Sec OS.  To install PhishX, clone the tool from the Github repository using the following command.

git clone https://github.com/WeebSec/PhishX.git

After cloning, run the following commands to install the tool and its requirements.

cd PhishX
chmod +x installer.sh
bash installer.sh

Running PhishX

python3 PhishX.py

The above command loads the PhishX interface with the page options that can be used for spear phishing, as shown below.

We can select any page format by typing its sequence number. For instance, we can select the Google page option by typing the sequence number 4 in the terminal. This opens the Google page setup for said spear phishing attack.

As mentioned earlier, the spear phishing attack requires target information. For Google page phishing account, the tool asks for target information like email address, username, phone number (optional), and location (if known). The tool also asks for the spoofed email.

Once the information is provided, the tool generates a link that can be shared with the user via any preferred technique. An interface on the attacking machine listens for user activity on the shared link. The link contains a Google account login page, as shown in the following screenshot.

If the user tries to log into the Google account, the credentials are captured by the tool along with other information like user location and IP address.

Originally posted on Latest Hacking News by Adil Adeel.