credentialharvest

command
v1.1.0 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Mar 8, 2024 License: GPL-3.0 Imports: 5 Imported by: 0

README

Harvester example

Chapter 4 goes over an example of phishing web credentials. In this case, Roundcube.

Prerequisites

  • Roundcube docker image
docker pull robbertkl/roundcube
  • Source code
docker run --rm -it -p 80:80 robbertkl/roundcube

Visit http://127.0.0.1 using Chrome browser. Cntrl + s to save the website and all of it's js files. Name the file "index.html" and "Webpage,Complete. Your tree structure will look like below but make sure you put them in the public directory you will need to make:

$ tree 
.
└── public
   ├── index_files
   │   ├── app.js
   │   ├── common.js
   │   ├── jquery.min.js
   │   ├── jquery-ui.css
   │   ├── jquery-ui.min.js
   │   ├── jstz.min.js
   │   ├── roundcube_logo.png
   │   ├── styles.css
   │   └── ui.js
   └── index.html

  • Modify the form parameters to match your local server, not the 127 address, like so:
FROM   <form name="form" method="post" action="http://127.0.0.1/?_task=login">
TO     <form name="form" method="post" action="/login">

Send it

go run main.go

OR

go build -o keyloggertest && ./keyloggertest

A "credentials.txt" file will be created and store our creds and client information.

Documentation

The Go Gopher

There is no documentation for this package.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL