In this we will not create a hosting,a websiteand even we do not have to send victim a spoofed mail too instead we will use our own webserver to store webpages and scripts and we will create our own file and we will send the file to the victim.
In this method we will need a
A WebServer - for hosting data
A php script - it will be the same script that we used in Phishing.
Xampp - For creating a Webserver
The main vulnerbility and our profit lies in one file called hosts.txt in the directory inC:/windows/system32/drivers/etc/ just put backslash instead of forword slash just open it up and create a copy on the desktop.
Now do not mess up with this and leave it as it is Now is the time to create a web server so quickly go to and download it and install it than start it and go to htdocs folder you can search it or you can go to the directory you installed nd put your phishing page in it and rename it to index.html and put your phishing php script in it too
Now for testing open your browser and type https://127.0.0.1 as address and type in your credentials and click on log in and then go to your htdocs folder and look at the logs.txt file it will display your username and Password there so Now What?
Go and connect your net and then go to run and type cmd
Now type ipconfig and it will show your ip copy your ip and open the host.txt file up and paste your ip in new line and after leaving somespaces type the domain of the website you want to hack and then save it up and then right click on it and choose compress and archive and click on create sfx archieve and just above that in update mode choose add and replace files.
Now goto files and under files to add type C:/windows/system32/drivers/etc/host.txt what this will do is when victim opens the file it will quickly replace the file with the one we created and when he will open the website which we want to hack than even the url will not change the url and our phishing page will open as soon as he types the credentials we will be able to get the password and username in our logs.txt .
Note: Static ip is required for this type of attack.