Termux has also become a tool of interest for individuals looking to explore the world of hacking. In this article, we will delve into one of the most prominent hacking tools available for Termux, namely Mrphish. We will provide an overview of Mrphish, its features, and its compatibility with Termux.
Well, in our previous article, we discussed how to install fluxion in Kali Linux. That post is for Linux users and also for those who are curious to know how to hack Wi-Fi.
Also, for Termux users who would like to test how Wi-Fi hacking works, I prepared this post for you. Exploit Wi-Fi vulnerabilities with Routersploit on Termux. And we also have more articles about Termux that will interest you.
We will guide you through the process of getting and installing Mrphish.
Without wasting time, let us discuss the Mrphish tool. What I recommend is to make sure you read the entire article slowly so that you understand why you should start using Mrphish and all the processes.
What is Mrphish?
Mrphish is a bash-based script that is made especially for phishing social media accountts with port forwarding and OTP bypassing control.
The tool itself helps the user to generate a fake link. And that link will be sent to the victim in order to get some crucial information.
If you’re looking for a tool that specializes in social media account hacking, then Mrphish is here to satisfy your needs.
Mrphish is a powerful and versatile tool designed specifically for this purpose. It utilizes various phishing techniques to help you gain unauthorized access to social media accounts.
More online tools will do the same work as this tool. But each termux tool has its own strengths and weaknesses.
You are free to use any tool you want, like, zphisher, anonphisher, shellphish, and so on.
Some Termux hacking tools you may like:
- CamPhish – Grab Cam Shots From a Target’s Phone Front Camera
- haxordBd facebook cloning command on Termux
- Pyphisher Termux tool to hack social media account
- hack android with infect Termux hacking tool
Features and Capabilities of Mrphish
Mrphish offers a range of features that make it a valuable tool for hacking social media accounts. From creating phishing pages to capturing login credentials, Mrphish puts the power in your hands. Its user-friendly interface and extensive options allow even beginners to dive into the world of social media hacking.
The good news is that Mrphish seamlessly integrates with Termux, leveraging its command-line interface and powerful environment. With Termux and Mrphish working together, you have a potent combination that opens up new possibilities for social media account hacking.
Ethical Hacking vs. Unethical Hacking
Before we go any further, it’s essential to understand the difference between ethical hacking and unethical hacking.
- Ethical hacking involves testing the security of systems with proper authorization and for the purpose of identifying vulnerabilities and improving security.
- Unethical hacking, on the other hand, involves unauthorized access and malicious intent.
Requirements
I’m sure that anyone who would like to get and install Mrphish is curious to know what some of the requirements might be. But don’t panic, Mrphish requirements are not much, and you will find some have already been installed on your Termux. What you need is only:
- Good internet
- PHP
- git
- Python
- lolcat
- At least 600 MB free storage space
- Ngrok Token
What is Ngrok Token?
Ngrok is a helpful utility to create secure tunnels to locally hosted applications using a reverse proxy. It is a utility to expose any locally hosted application over the web.
For more information about Ngrok visit the Ngrok documentation.
Then, before we can see how to get Mrphish and install it, make sure you have already installed Termux. And you also meet the requirements for PHP and Git. We will discuss how to get them.
⚡ Instructions: Don’t use Termux from the Play Store, if you got your Termux from the Play Store I recommend you to uninstall it and download termux from f-droid. Otherwise, you won’t be able to update and upgrade termux, and some of the command won’t pass when you want to use them.
How to get and install Mrphish?
To install Mrphish in Termux, you’ll need to follow a few steps. First, make sure you have the necessary dependencies installed. Then, update and upgrade the Termux repositories using the command:
pkg update & upgrade.
We can start installing PHP one of the Mrphish dependencies, otherwise, we will get an error during installation. To install PHP, we open the Termux terminal, and then we use the command:
pkg install PHP
Then, after installing PHP, we can then install git so that we can be able to clone Mrphish from GitHub by using the command.
pkg install git
Next, we are going to install python3 and Python in order to be able to execute the script using the command:
pkg install python -y
pkg install python2 -y
Then, after we have finished installing Python, we will install Lolcat using the pip command.
pip install lolcat
Now, after we have completed the installation of all dependencies, we are able to get the Mrphish from GitHub using the command:
git clone https://github.com/noob-hackers/mrphish.git
After the cloning process has finished, it’s time to navigate into the mrphish repository using the command cd mrphish. Then we are going to execute and run Mrphish using the command:
bash setup
bash mrphish
During installation, it will ask if you want to continue, just use ‘y’ which means yes in order to continue. And if everything goes well, you have Mrphish installed and ready to be used.
Then after installation, it will ask you to enter your Ngrok token like this:
After that, you will now see the menu of the tool ready for you.
Then, when you select 1 or 2, it will show you the feature’s menu.
Step-by-Step Guide to Hacking Social Media Accounts using Mrphish
Remember, hacking should only be done ethically and with proper authorization. Don’t let the power of these tools cloud your judgment. Stay responsible, stay ethical, and use your skills for good. Exploring Mrphish Features and Functionality
Overview of Phishing Techniques Used by Mrphish
Phishing is at the heart of Mrphish’s functionality, and it’s essential to understand the techniques involved. Phishing typically involves creating a convincing fake webpage that mimics the login page of a social media platform.
When the targeted user enters their credentials, these details are captured by Mrphish, allowing you to access the account.
Now that you have a grasp of Mrphish’s features, let’s take a step-by-step look at how you can use it to hack social media accounts.
Before launching an attack, it’s important to prepare the groundwork. This involves setting up Mrphish on your device and ensuring it has all the necessary dependencies installed.
Mrphish provides clear instructions to guide you through the process, making it accessible even for those with limited technical knowledge.
- Selecting the target and gathering information
Once you’re ready, it’s time to select your target. Remember, this should only be done with the explicit permission of the account owner.
Gather as much information as possible about the target, such as their email address and social media handle, to increase the success rate of your phishing attack.
- Generating and deploying the phishing webpage
The core of your attack lies in creating a persuasive phishing webpage that lures the target into entering their login credentials.
Mrphish simplifies this process by generating the webpage for you, saving you precious time and effort.
Deploy the webpage on a hosting platform or server and ensure it looks convincing to increase the chances of success.
- Executing the Attack and Capturing Credentials
The moment of truth has arrived. Once the target visits the phishing webpage and enters their login details, Mrphish does its magic.
It captures the credentials, allowing you to access the social media account. Remember, ethical hacking is crucial, so be responsible with the information you obtain.
Conclusion
Well done. We have reached the end of this article. If you have any questions, don’t hesitate to ask so that we can try to help you with an answer. Thanks for your time. You can share this with your friends if you like this tool.
Pingback: Easy hack termux tool to exploit android device - Tgeniusclub