Tutorial - Lockphish V2.0 PIN phishing attack


Ethical hacking

Reviewer: Deepak Prasad

Many devices use PIN to protect privacy of their users. In this guide, we will be using lockphish tool to phish for pin locks for different target operating systems. Lockphish is actually the first tool which use a HTTPS link to phish unlock credentials on different user operating systems. i.e. Android OS, Windows OS and on iphones. Ngrok tunneling is used to deliver the attack to the victim and also deliver the captured credentials. Lockphish will automatically capture the IP address of the victim.

Some of the key features of lockphish include:

  • Automatic device recognition – lockphish will automatically detect the target device and provide for the pin request page respectively. While launching the attack the user is not required to choose the operating system of target’s device.
  • IP tracker - lockphish captures our target’s IP address which is vital for further information gathering against our target.
  • Uses Ngrok to port forward and allow attack over the internet – Ngrok allows us to launch attacks to the target over the internet and also deliver back the captured credentials.
  • Lockphish has ready made phishing website for android’s, iphone’s and windows lock screen.
NOTE:
This guide has been made for educational purposes only. The authors will not be held responsible for any damages.In this guide, we will be launching attacks on all the mentioned devices. i.e. android and windows devices.

 

Pre-requisites

  • Have a running instance of Linux.
  • Knowledge of using the terminal.
  • An active internet connection.

 

Step 1: Installing lockphish

To ensure no errors while installing lockphish, we will first update the pre installed packages on the running instance using the below command.

sudo apt-get update

After the update is complete, we will now download lockphish tool from its official GitHub repository. We can either download the tool as a zip file or clone from GitHub using the below command.

git clone https://github.com/jaykali/lockphish.git

lockphish

 

Step 2: Running lockphish

If you downloaded the zip file, you need to first extract the files using the command

unzip lockphish.zip

After unzipping we move into the directory so that we can launch our pin code phishing attack.

cd lockphish

To run lockphish we first need to give the lockphish.sh file permission to execute as root on the system. We will use the below command.

sudo chmod +x lockphish.sh

We can now generate our attacking link by running the file using the command.

./lockphish.sh

lockphish
Before launching an attack , you are required to specify the link to which the victim will be redirected after providing the attacker with the PIN to their devices. For our case, we will be using the default redirect page on our attack hence we just click enter to start to generate the phishing link. Lockphish will first download Ngrok if it is not installed and automatically launch the attack. A phishing link to send to the target will be provided.

In our case, the phishing link was not displayed on the terminal. We have to open the Ngrok webpage on “localhost:4040” to get our phishing link as shown on the below image.

lockphish

 

Step 3: Sending phishing link to the victim

Now we have to send the phishing link to the target, we need to employ some of the social engineering tactics to lure our victims into clicking the phishing link. Once the user clicks on the link, he/she will be taken to a page where he/she will be needed to click in order to view the YouTube video. When the link is opened a lock screen appears depending on the device requiring the user to provide his/her PIN. An extra step is included at the end of this guide on how to send the phishing link using an email to our targets.

lockphish

 

Lockphish page on android device.

lockphish

Lockphish page on windows device.

 

Step 4: Getting the captured PIN

After the PIN has been provided by the victim, we can be able to view it from our lockphish terminal. Lockphish will capture the user credentials such as the PIN, the operating system of the target and the target’s IP address. A hacker is now able to use the PIN code he/she acquired using lockphish. An example of the captured credentials is as shown on the image below.

lockphish

 

Extra step: Sending phishing email using social engineering

On our extra step we will learn on how to use a free online email service to send a phishing email to our target. We will embed the phishing link we generated to an email we will send to the victim. As we learned earlier, emails can be spoofed easily to look like they come from a legitimate source. In this step we will use a free tool (emkei.cz) available online to send the email. We open the webpage and everything required is on the home page as shown below.

NOTE:
Even though emkei.cz is a free tool available online, phishing is illegal in many countries around the world and it is an offense which is punishable by law.

lockphish

 

The user received an email in his spams folder as shown on the screenshot below. Once the user clicks on the link he/she will be redirected to the PIN phishing email. As you can see, the email has already been flagged as a spam since it contains the malicious link and also has been sent from a spoofed email.

lockphish

 

Conclusion

Lockphish being the first tool to be able to phish for user PIN codes and passwords over https is a must have tool for any one in or planning to pursue a profession within the field of computer security. It also opens a new field for study by security researchers.

Device owners should also be aware of such kind of attacks to be able to detect phishing attempts on their devices since these kind of attacks are very hard to detect especially by those who have no prior training on phishing and social engineering. These kind of attacks would be very disastrous especially where the attacker does target a large group of people. It is always advisable to report phishing attempts to law enforcement agencies so as to promote attacks awareness among the citizens.

 

Kennedy Muthii

Kennedy Muthii

He is an accomplished professional proficient in Python, ethical hacking, Linux, cybersecurity, and OSINT. With a track record including winning a national cybersecurity contest, launching a startup in Kenya, and holding a degree in information science, he is currently engaged in cutting-edge research in ethical hacking. You can connect with him on his LinkedIn profile.

Can't find what you're searching for? Let us assist you.

Enter your query below, and we'll provide instant results tailored to your needs.

If my articles on GoLinuxCloud has helped you, kindly consider buying me a coffee as a token of appreciation.

Buy GoLinuxCloud a Coffee

For any other feedbacks or questions you can send mail to admin@golinuxcloud.com

Thank You for your support!!

Leave a Comment