{"id":5949,"date":"2022-01-05T07:25:49","date_gmt":"2022-01-05T07:25:49","guid":{"rendered":"https:\/\/news4hacker.com\/?p=751"},"modified":"2023-04-19T06:46:39","modified_gmt":"2023-04-19T06:46:39","slug":"hack-anyones-smartphone-lock-screen-password-hacking-2022-n4h","status":"publish","type":"post","link":"https:\/\/reconcybersecurity.com\/blogs\/hack-anyones-smartphone-lock-screen-password-hacking-2022-n4h\/","title":{"rendered":"Hack Anyone&#8217;s Smartphone lock screen password | Recon Cyber Security"},"content":{"rendered":"\n<p>In this article, you will know how you can hack anyone&#8217;s smartphone password with the help of a tool called <strong>LockPhish<\/strong>. This tool generates a link which you have to send to your victim and when the target opens that link then he\/she gets a page called <strong>&#8220;Redirect www.youtube.com&#8221;. <\/strong>When the victim will open that link it will show a lock screen phishing page. Now you probably know what gonna happen, the password will be shown to us if you target write it on that phishing page. <\/p>\n\n\n\n<p><strong>Disclaimer:<\/strong> This blog is for educational purposes, if you do anything wrong then we are not responsible for it&#8230;<\/p>\n\n\n\n<h2 id=\"setting-up-lockphish\" class=\"wp-block-heading\">Setting Up Lockphish<\/h2>\n\n\n\n<p>So as always, go to your browser and search for <strong>lockphish GitHub<\/strong>, after that you will see a Github link so open it and copy the code from there. If you didn&#8217;t find the website of the tool so click on this link and copy your code &#8211;<br>( <a href=\"https:\/\/github.com\/JasonJerry\/lockphish\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/JasonJerry\/lockphish<\/a> )<\/p>\n\n\n\n<p>Now open your terminal and go to the destination where you have to install your tool by typing this command <br>( <strong>cd &lt;your destination&gt; <\/strong>) then clone your tool by this ( <strong>git clone &lt;your code&gt;<\/strong> )\u2026<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/01\/Screenshot_20220103_235541-1024x243.png\" alt=\"\" class=\"wp-image-752\"\/><\/figure>\n\n\n\n<p>Now come inside your tool&#8217;s directory by typing ( <strong>cd lockphish<\/strong> ) and ( <strong>ls<\/strong> ) for seeing directories and folders in lockphish. You can see a file here <strong>lockphish.sh<\/strong>, give permission to execute it so type this command <br>( <strong>chmod +x lockphish.sh<\/strong> )&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/01\/Screenshot_20220103_235824-1024x222.png\" alt=\"\" class=\"wp-image-753\"\/><\/figure>\n\n\n\n<h2 id=\"performing-tool\" class=\"wp-block-heading\">Performing Tool<\/h2>\n\n\n\n<p>Now for starting the tool type (<strong> .\/lockphish.sh<\/strong> ), after typing this command your tool will start working&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/01\/Screenshot_20220105_035118-1024x291.png\" alt=\"\" class=\"wp-image-754\"\/><\/figure>\n\n\n\n<p>So the tool doesn&#8217;t give you a direct link that you can send to your target. Don&#8217;t worry about this because we tell you every time about ngork and we are going to use it here also. And if you don&#8217;t know about ngrok and what it does then you can read our blog about it. <\/p>\n\n\n\n<p>Link &#8211; ( <a href=\"https:\/\/reconcybersecurity.com\/blog\/how-to-install-and-use-ngrok-2021-n4h\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/reconcybersecurity.com\/blog\/how-to-install-and-use-ngrok-2021-n4h\/<\/a> )&#8230;<\/p>\n\n\n\n<p>Open your other terminal and come inside your tool&#8217;s folder then type this (<strong> .\/ngrok http 3333 <\/strong>). After that, you can see three links in your terminal copy the 3rd URL, and send it to your victim&#8230;<\/p>\n\n\n\n<p><strong>Note:<\/strong> The command of ngrok which is shown in the passage above only works when you paste the <span class=\"has-inline-color has-vivid-cyan-blue-color\"><strong>Authtoken<\/strong><\/span> of ngrok in the tool&#8217;s directory and if you didn&#8217;t know how to do that so you have to first know about ngrok and then come here&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/01\/Screenshot_20220105_040329-1024x195.png\" alt=\"\" class=\"wp-image-755\"\/><\/figure>\n\n\n\n<p>All done guys, now if the victim types his password on that given lock screen then it will be shown to you so now you can enjoy it&#8230;<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>If you have any problem with our blog so you can comment to us we will try to fix it.<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-right\"><em>&#8211;<\/em>Recon<\/p>\n","protected":false},"excerpt":{"rendered":"In this article, you will know how you can hack anyone&#8217;s smartphone password with the help of a&hellip;\n","protected":false},"author":1,"featured_media":10867,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[55],"tags":[170,171,172,173],"class_list":{"0":"post-5949","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-hacking-tools","8":"tag-hack-android-password","9":"tag-how-to-hack-android-password","10":"tag-how-to-hack-mobile-password","11":"tag-phishing-tool-for-hacking-mobile-password"},"_links":{"self":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/5949","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/comments?post=5949"}],"version-history":[{"count":2,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/5949\/revisions"}],"predecessor-version":[{"id":10868,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/5949\/revisions\/10868"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media\/10867"}],"wp:attachment":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media?parent=5949"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/categories?post=5949"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/tags?post=5949"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}