{"id":5954,"date":"2022-03-02T14:22:50","date_gmt":"2022-03-02T14:22:50","guid":{"rendered":"https:\/\/news4hacker.com\/?p=1337"},"modified":"2023-04-18T17:10:47","modified_gmt":"2023-04-18T17:10:47","slug":"how-to-use-hiddeneye-in-linux-os-hacking-2022-n4h","status":"publish","type":"post","link":"https:\/\/reconcybersecurity.com\/blogs\/how-to-use-hiddeneye-in-linux-os-hacking-2022-n4h\/","title":{"rendered":"How to use HiddenEye in Linux Os | Hacking | Recon Cyber Security"},"content":{"rendered":"\n<p>In this article, you will read about how to use <a href=\"https:\/\/github.com\/Morsmalleo\/HiddenEye\" target=\"_blank\" rel=\"noreferrer noopener\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">HiddenEye<\/mark><\/a> in Linux which is one of the most <mark style=\"background-color:#fcb900\" class=\"has-inline-color has-vivid-red-color\"><strong>advanced phishing tools<\/strong><\/mark> in Hacking. It has almost every phishing page of every platform like social media phishing pages, games stores, and even the login pages of the games themselves. We will only show you how to use hiddeneye in Linux&#8230;<\/p>\n\n\n\n<p><strong>Disclaimer \u2013 <\/strong>This blog is for educational purposes only, If you do anything illegal then we are not responsible for it\u2026<\/p>\n\n\n\n<h3 id=\"what-is-phishing\" class=\"wp-block-heading\">What Is Phishing?<\/h3>\n\n\n\n<p>Phishing is a type of social engineering attack that &#8220;BLACK HAT HACKERS&#8221; use to steal user data like usernames, passwords, login credentials even ATM card details. <\/p>\n\n\n\n<h2 id=\"what-is-hiddeneye\" class=\"wp-block-heading\">What is HiddenEye?<\/h2>\n\n\n\n<p>HiddenEye is a modern phishing tool with advanced functionality and multiple tunneling services. HiddenEye contains 38+ phishing websites login pages like Facebook, Instagram, Xbox, and has a Keylogger feature also&#8230;<\/p>\n\n\n\n<p>Below is the Table Chart of How many Tunneling options you have in HiddenEye and what are requirements you need to install&#8230;<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<figure class=\"wp-block-table is-style-regular\"><table><tbody><tr><td class=\"has-text-align-left\" data-align=\"left\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">Tunneling Options<\/mark><\/strong><\/td><td class=\"has-text-align-center\" data-align=\"center\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">PREREQUISITES<\/mark><\/strong><\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">1. LOCALHOST<\/td><td class=\"has-text-align-center\" data-align=\"center\">Python 3<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">2. LOCALXPOSE<\/td><td class=\"has-text-align-center\" data-align=\"center\">PHP<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">3. SERVEO<\/td><td class=\"has-text-align-center\" data-align=\"center\">Ngrok<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">4. NGROK<\/td><td class=\"has-text-align-center\" data-align=\"center\">&#8212;<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">5. LOCALTUNNEL (Package Version)<\/td><td class=\"has-text-align-center\" data-align=\"center\">&#8212;<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">6. OPENPORT<\/td><td class=\"has-text-align-center\" data-align=\"center\">&#8212;<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">7. PAGEKITE<\/td><td class=\"has-text-align-center\" data-align=\"center\">&#8212;<\/td><\/tr><tr><td class=\"has-text-align-left\" data-align=\"left\">8. LOCALHOST.RUN<\/td><td class=\"has-text-align-center\" data-align=\"center\">&#8212;<\/td><\/tr><\/tbody><\/table><\/figure>\n<\/div><\/div>\n\n\n\n<p>Firstly, go to your browser and search &#8221; HiddenEye Github &#8221; then click on the first website coming from Github. You can either go on the website by this link \u2013 ( <a href=\"https:\/\/github.com\/Morsmalleo\/HiddenEye\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/Morsmalleo\/HiddenEye<\/a> ).<\/p>\n\n\n\n<p>Open your terminal and go to the destination where you have to download the tool by typing ( <strong>cd &lt;path&gt;<\/strong> ). Now type this command to clone the tool ( <strong>git clone https:\/\/github.com\/Morsmalleo\/HiddenEye.git<\/strong> )<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/03\/Screenshot_20220301_185052-1-1024x212.png\" alt=\"\" class=\"wp-image-1366\"\/><\/figure>\n\n\n\n<p>After then, you have to come inside the tool&#8217;s directory by typing this command ( <strong>cd HiddenEye<\/strong> ). Now run HiddenEye by command ( <strong>python3 HiddenEye.py<\/strong> ). <\/p>\n\n\n\n<h2 id=\"how-to-grab-password-with-hiddeneye\" class=\"wp-block-heading\">How to Grab Password with HiddenEye?<\/h2>\n\n\n\n<p>In the starting, it will ask you to write &#8220;I accept EULA&#8221; so type it and let the process be continued&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/03\/Screenshot_20220301_191754-1024x59.png\" alt=\"\" class=\"wp-image-1369\"\/><\/figure>\n\n\n\n<p>Now you can see there are so many websites templates from which we are going to use the &#8220;Instagram login page&#8221;. <\/p>\n\n\n\n<p><strong>Follow the steps below to use the phishing page: &#8211;<\/strong><\/p>\n\n\n\n<p>So select the number of phishing page and press enter. We are pressing no.8 for Instagram but you have to press your phishing page number&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/03\/Screenshot_20220301_185755-1-1024x347.png\" alt=\"\" class=\"wp-image-1370\"\/><\/figure>\n\n\n\n<p>After that select which type of phishing page you want by writing their numbers&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/03\/Screenshot_20220301_185859-1-1024x205.png\" alt=\"\" class=\"wp-image-1371\"\/><\/figure>\n\n\n\n<p>Now it shows you this interface on your system screen and here you have to type ( <strong>A<\/strong> )\u2026<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/03\/Screenshot_20220301_190100-1-1024x178.png\" alt=\"\" class=\"wp-image-1372\"\/><\/figure>\n\n\n\n<p>Type a redirection URL that will redirect your target to a given website or link. Then type a port number but between [ 1024 &#8211; 65535 ]\u2026<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/03\/Screenshot_20220301_190308-1-1024x90.png\" alt=\"\" class=\"wp-image-1374\"\/><\/figure>\n\n\n\n<p>Now you have to select the port-forwarding option but there are only two options working. First is <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Localhost<\/mark> and second is <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-cyan-blue-color\">Ngrok<\/mark>, so type (<strong> 01<\/strong> ) for using it over the internet&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/03\/Screenshot_20220301_190345-1-1024x117.png\" alt=\"\" class=\"wp-image-1375\"\/><\/figure>\n\n\n\n<p>After that, there is your Localhost link and the Ngrok link so copy the ngrok one and send it to your victim&#8230;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/03\/Screenshot_20220301_190435-1-1024x108.png\" alt=\"\" class=\"wp-image-1376\"\/><\/figure>\n\n\n\n<p>Now if the victim types his credentials on your Instagram phishing page then it will be saved and shown on your terminal&#8230;<\/p>\n\n\n\n<p>This is what the Phishing page of Instagram looks like &#8211; <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/03\/Screenshot_20220301_190803-1-1024x722.png\" alt=\"\" class=\"wp-image-1377\"\/><\/figure>\n\n\n\n<p>You can check our other blogs on Phishing tools by visiting this link &#8211; <a rel=\"noreferrer noopener\" href=\"https:\/\/news4hacker.com\/?s=phishing+tool\" target=\"_blank\">https:\/\/reconcybersecurity.com\/blog\/?s=phishing+tool<\/a><\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>If you have any problem with our blog so you can comment to us and we will try to fix it&#8230;<\/strong><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Made by Dhruv Bansal<\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"In this article, you will read about how to use HiddenEye in Linux which is one of the&hellip;\n","protected":false},"author":1,"featured_media":10837,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[55],"tags":[229,230,231,56,57],"class_list":{"0":"post-5954","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-hacking-tools","8":"tag-advanced-phishing-tool","9":"tag-hiddeneye","10":"tag-most-advanced-phishing-tool","11":"tag-phishing-tool","12":"tag-social-media-hacking"},"_links":{"self":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/5954","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/comments?post=5954"}],"version-history":[{"count":1,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/5954\/revisions"}],"predecessor-version":[{"id":10838,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/5954\/revisions\/10838"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media\/10837"}],"wp:attachment":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media?parent=5954"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/categories?post=5954"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/tags?post=5954"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}