Phantom anglers: to contain a fake DNS server, fake DHCP servers, fake HTTP servers, and also a comprehensive zone for automatic capture and HTTP form method credential logging to a database is a computer security application.
The scheme can be used as a honeypot for service DHCP requests, DNS requests, or phishing attacks.
New Version 1.4
Ghost Phisher 1.4 includes the following new features
1. Inbuilt high speed RFC 2131 compliant DHCP Server
Requirements:
Python
Python-qt4
Xterm
Subversion
To install simply run the following command in terminal over changing directory to the path were the downloaded I S
root@host:~# dpkg-i Ghost-phisher_1.3_all.deb
Icons and Running the application:
Software Icon can is found at the application Menu of the GNOME desktop interfaces
Icon can also be found at/usr/share/applications for KDE and also GNOME:
There find "Ghost phisher.desktop"
To get the "source code for" project from SVN, here's The checkout link:
Ghost Phisher ships in with default Windows and Linux vulnerability pages, these pages can is used for penetration. Ghost automatically recognizes the remote operating system and displays the vulnerability pages according to the Informati On fetched.
Payload Download
This screenshot displays Windows machine penetrated upon payload execution using Metasploit
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.