{"id":116,"date":"2024-11-06T11:23:29","date_gmt":"2024-11-06T14:23:29","guid":{"rendered":"http:\/\/192.168.0.52\/?p=116"},"modified":"2024-11-06T11:36:33","modified_gmt":"2024-11-06T14:36:33","slug":"zphisher","status":"publish","type":"post","link":"https:\/\/jorgecarneirob.ddns.net\/index.php\/2024\/11\/06\/zphisher\/","title":{"rendered":"ZPHISHER"},"content":{"rendered":"\n<p>Este artigo \u00e9 para fins educacionais e tem a inten\u00e7\u00e3o de demonstrar ataques de phishing.<\/p>\n\n\n\n<p>O Zphisher \u00e9 uma ferramenta que automatiza a &#8220;clonagem&#8221; de 30+ telas de login das plataformas mais utilizadas hoje.<br>Pr\u00e9-requisitos: distribui\u00e7\u00e3o linux (debian, ubuntu, kali, fedora entre outras) ou <a href=\"http:\/\/192.168.0.52\/index.php\/2024\/09\/27\/kali-nethunter-termux\/\">termux<\/a>, <br>Pacotes necess\u00e1rios: git, curl e php <\/p>\n\n\n\n<p><strong>Processo de instala\u00e7\u00e3o (script github):<br>1. Fa\u00e7a download do zphisher em sua m\u00e1quina: <\/strong><br><code>git clone <\/code><a href=\"https:\/\/github.com\/htr-tech\/zphisher\">https:\/\/github.com\/htr-tech\/zphisher<\/a><br>.<br><strong>2. Acesse a pasta do zphisher:<\/strong><br><code>cd zphisher<\/code><br>.<br><strong>3. Atualize seu reposit\u00f3rio, pois a script ir\u00e1 instalar as depend\u00eancias:<\/strong><br><code>sudo apt update (debian e baseados neles)<br>sudo dnf update (RHEL e baseados nele)<br>sudo zypper --refresh (OpenSuse)<\/code><br>.<br>4. Execute a script e aguarde a tela de sele\u00e7\u00e3o da plataforma:<br>.\/zphisher.sh<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full wp-duotone-unset-1\"><img decoding=\"async\" src=\"http:\/\/192.168.0.52\/wp-content\/uploads\/2024\/11\/image.png\" alt=\"\" class=\"wp-image-119\"\/><\/figure>\n\n\n\n<p><strong>5. Selecione o local que ir\u00e1 hospedar o ataque:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full wp-duotone-unset-2\"><img loading=\"lazy\" decoding=\"async\" width=\"508\" height=\"243\" src=\"http:\/\/192.168.0.52\/wp-content\/uploads\/2024\/11\/image-1.png\" alt=\"\" class=\"wp-image-120\" srcset=\"https:\/\/jorgecarneirob.ddns.net\/wp-content\/uploads\/2024\/11\/image-1.png 508w, https:\/\/jorgecarneirob.ddns.net\/wp-content\/uploads\/2024\/11\/image-1-300x144.png 300w\" sizes=\"auto, (max-width: 508px) 100vw, 508px\" \/><\/figure>\n\n\n\n<p>Onde, <strong>Localhost:<\/strong> hospedado na pr\u00f3pria m\u00e1quina acessando pelo navegador usando o pr\u00f3prio IP ou 127.0.0.1.<br><strong>Cloudflared: <\/strong>hospeda em servidores da cloudflare, por\u00e9m \u00e9 facilmente detectado como phishing.<br><strong>LocalXpose: <\/strong>Ferramenta para expor o localhost para acessos externos (dura apenas 15 min)<br>Para demonstra\u00e7\u00e3o irei utilizar localhost, por\u00e9m a melhora maneira \u00e9 LocalXpose.<br>.<br><strong>6. Deseja alterar a porta padr\u00e3o? (127.0.0.1:8080)<\/strong><br><code>[?] Do You Want A Custom Port [y\/N]: N<\/code><br>.<br><strong>7. Acesse pelo navegador o localhost e a p\u00e1gina de login j\u00e1 estar\u00e1 funcionando, insira um email aleat\u00f3rio e uma senha aleat\u00f3ria que deseja capturar:<\/strong><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full wp-duotone-unset-3\"><img loading=\"lazy\" decoding=\"async\" width=\"625\" height=\"743\" src=\"http:\/\/192.168.0.52\/wp-content\/uploads\/2024\/11\/image-3.png\" alt=\"\" class=\"wp-image-122\" srcset=\"https:\/\/jorgecarneirob.ddns.net\/wp-content\/uploads\/2024\/11\/image-3.png 625w, https:\/\/jorgecarneirob.ddns.net\/wp-content\/uploads\/2024\/11\/image-3-252x300.png 252w\" sizes=\"auto, (max-width: 625px) 100vw, 625px\" \/><\/figure>\n\n\n\n<p><strong>8. \u00c9 poss\u00edvel visualizar as informa\u00e7\u00f5es em tempo real enquanto a script \u00e9 executada:<\/strong><br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full wp-duotone-unset-4\"><img loading=\"lazy\" decoding=\"async\" width=\"887\" height=\"780\" src=\"http:\/\/192.168.0.52\/wp-content\/uploads\/2024\/11\/image-4.png\" alt=\"\" class=\"wp-image-123\" srcset=\"https:\/\/jorgecarneirob.ddns.net\/wp-content\/uploads\/2024\/11\/image-4.png 887w, https:\/\/jorgecarneirob.ddns.net\/wp-content\/uploads\/2024\/11\/image-4-300x264.png 300w, https:\/\/jorgecarneirob.ddns.net\/wp-content\/uploads\/2024\/11\/image-4-768x675.png 768w\" sizes=\"auto, (max-width: 887px) 100vw, 887px\" \/><\/figure>\n\n\n\n<p><br><strong>8. Verificando as informa\u00e7\u00f5es coletadas: Acesse a pasta zphisher\/auth:<\/strong><br><code>cd auth<\/code><br>.<br><strong>9. Dentro da pasta existe 2 arquivos:<\/strong> <br><strong>ip.txt:<\/strong> (registra o IP, navegador, sistema operacional entre outros da v\u00edtima)<br><strong>usernames.dat:<\/strong> Plataforma utilizada, login e senha da v\u00edtima.<br><code>cat ip.txt <\/code><br>IP: 200.245.9.194<br>User-Agent: Mozilla\/5.0 (Windows NT 10.0; Win64; x64; rv:132.0) Gecko\/20100101 Firefox\/132.0<\/p>\n\n\n\n<p>IP: 200.245.9.194<br>User-Agent: Mozilla\/5.0 (Windows NT 10.0; Win64; x64; rv:132.0) Gecko\/20100101 Firefox\/132.0<br>.<br><code>cat username.dat<\/code><br>Gmail Username: jorgecarneiroblog@gmail.com Pass: testedesenha<\/p>\n\n\n\n<p><strong>Obrigado por ler at\u00e9 aqui.<br>Espero te ajudado.<br>Duvidas? Deixe nos coment\u00e1rios.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>O Zphisher \u00e9 uma ferramenta que automatiza a &#8220;clonagem&#8221; de 30+ telas de login das plataformas mais utilizadas hoje.<\/p>\n","protected":false},"author":1,"featured_media":119,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[33],"tags":[37,18,35,34,16,36],"class_list":["post-116","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguranca","tag-hacking","tag-linux","tag-phishing","tag-seguranca","tag-termux","tag-zphisher"],"jetpack_featured_media_url":"https:\/\/jorgecarneirob.ddns.net\/wp-content\/uploads\/2024\/11\/image-e1730902911419.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/jorgecarneirob.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/116","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jorgecarneirob.ddns.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jorgecarneirob.ddns.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jorgecarneirob.ddns.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jorgecarneirob.ddns.net\/index.php\/wp-json\/wp\/v2\/comments?post=116"}],"version-history":[{"count":3,"href":"https:\/\/jorgecarneirob.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/116\/revisions"}],"predecessor-version":[{"id":127,"href":"https:\/\/jorgecarneirob.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/116\/revisions\/127"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jorgecarneirob.ddns.net\/index.php\/wp-json\/wp\/v2\/media\/119"}],"wp:attachment":[{"href":"https:\/\/jorgecarneirob.ddns.net\/index.php\/wp-json\/wp\/v2\/media?parent=116"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jorgecarneirob.ddns.net\/index.php\/wp-json\/wp\/v2\/categories?post=116"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jorgecarneirob.ddns.net\/index.php\/wp-json\/wp\/v2\/tags?post=116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}