Saturday, 21 September 2024
Information Gathering Password Attacks Web Application

Weeman – HTTP Server for Phishing

Weeman – HTTP server for phishing in python. Weeman has support for most of the (bigest) websites. Usually you will want run Weeman with DNS spoof attack. (see dsniff, ettercap).
Weeman will do the following steps:

  • Create fake html page.
  • Wait for clients
  • Grab the data (POST).
  • Try to login the client to the original page

 

Requirements:

  • Python <= 2.7.
  • Python BeautifulSoup 4

Install BeautifulSoup:

  • Archlinux
     sudo pacman -S python2-beautifulsoup4
  • Ubuntu/Linuxmint
    sudo apt-get install python-bs4
  • For another OS:
    sudo pip install beautifulsoup4

Platforms:

  • Linux (any)
  • Mac (Not tested)
  • Windows (Not tested)

Note: If weeman runs on your platform (Mac/Windows), please let the author know, or visit the official github.
Usage:
Just type help
Run server:
For port 80 you need to run Weeman as root!
Host to clone (Ex: www.social-networks.local):

set url http://localhost

“<“form action = “TAKE THIS URL”>”(View the site source and take the URL):

set action_url http://localhost/sendlogin

The port Weeman server will listen:

set port 2020

Start the server:

run

The settings will be saved for the next time you run weeman.py.
Get Weeman:

   git clone git://github.com/Hypsurus/weeman

Credits to: Hypsurus

Download Weeman at Github

Post Comment