{"id":7489,"date":"2022-12-13T10:31:48","date_gmt":"2022-12-13T10:31:48","guid":{"rendered":"https:\/\/reconcybersecurity.com\/?p=7489"},"modified":"2023-04-18T12:02:21","modified_gmt":"2023-04-18T12:02:21","slug":"how-to-use-blackeye-in-linux-os-hacking-recon-cyber-security","status":"publish","type":"post","link":"https:\/\/reconcybersecurity.com\/blogs\/how-to-use-blackeye-in-linux-os-hacking-recon-cyber-security\/","title":{"rendered":"How to use BlackEye in Linux Os | Hacking | Recon Cyber Security"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p class=\"has-black-color has-text-color\">In this article, you will learn about how to use <strong>BlackEye<\/strong> in Linux which is one of the most advanced phishing tools out there! It has almost every phishing page of every platform &#8211; like social media sites, games stores, and even login pages of different games. We&#8217;ll teach you only how to install it on Linux\u2026<br><em>Disclaimer: This blog is strictly for educational purposes only. If you do anything illegal then we&#8217;re not responsible.<\/em><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-black-color has-text-color has-large-font-size\">What Exactly is Phishing?<\/p>\n<\/blockquote>\n\n\n\n<p class=\"has-black-color has-text-color\">Phishing is a type of social engineering attack that <strong>BLACK HAT HACKERS<\/strong> use to steal sensitive data such as <em>usernames, passwords, login credentials, and even banking information.<\/em><\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-black-color has-text-color has-large-font-size\">What Exactly is BlackEye?<\/p>\n<\/blockquote>\n\n\n\n<p><strong>HiddenEye<\/strong> is a powerful phishing tool that includes advanced features and multiple tunneling services; <em>BlackEye<\/em> has 38+ different types of phishing websites logins including Facebook, Instagram, and Xbox. It also comes with a Keylogger feature\u2014perfect for spying on your spouses or employees!<br>Below is the Table Chart of all the Tunneling Services available in BlackEye and what they require before installation can take place.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/12\/1-1024x457.png\" alt=\"\" class=\"wp-image-7490\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color has-small-font-size\">The first step is to use your web browser\u2019s search function and input the term <strong>BlackEye Github<\/strong>. Next, check out the top result you get back after doing this. By clicking on that website, you&#8217;ll open up a blog post describing how to do all of these steps!<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/12\/2-1024x537.png\" alt=\"\" class=\"wp-image-7491\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color\">After that, type the command<em> (cd BlackEye)<\/em> to enter the directory of the tool. Then run Back Eye using the command<em> (python3 BlackEye.py).<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/12\/3-1024x509.png\" alt=\"\" class=\"wp-image-7492\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/12\/4-1024x107.png\" alt=\"\" class=\"wp-image-7493\"\/><\/figure>\n\n\n\n<blockquote class=\"wp-block-quote has-black-color has-text-color is-layout-flow wp-block-quote-is-layout-flow\">\n<p class=\"has-black-color has-text-color has-large-font-size\">How to Grab Password with BlackEye?<\/p>\n<\/blockquote>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/12\/6-1.png\" alt=\"\" class=\"wp-image-7496\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color\">Now you can see there are so many website templates that we&#8217;ll be using for the <em>Instagram<\/em> login page. Follow these steps to use the phishing page:<br>1) Select the number of phishing templates, then click enter. We&#8217;ll be selecting 8 for Instagram, but this will vary depending on your chosen template\u2026<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/12\/7-1.png\" alt=\"\" class=\"wp-image-7497\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color\">Type a redirection URL that will redirect your target to a given website or link. Then type a port number but between<strong> [ 1024 &#8211; 65535]\u2026<\/strong><br>Now you have to select the forwarding option, which has only two available options: <em>Localhost<\/em> and <em><strong>Ngrok<\/strong><\/em>, so pick one of them (01) if using the domain over the Internet\u2026<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/12\/8.png\" alt=\"\" class=\"wp-image-7498\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color\">After that, there are two links to choose from Localhost and ngrok. Copy the ngrok link for now and send it to your victim\u2026<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/12\/9-1024x546.png\" alt=\"\" class=\"wp-image-7499\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color\">Now if the victim types their credentials on your <em>fake<\/em> <em>Instagram<\/em> <em>phishing page<\/em>, you&#8217;ll see them typed in real time on your terminal monitor.<br><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/reconcybersecurity.com\/wp-content\/uploads\/2022\/12\/10.png\" alt=\"\" class=\"wp-image-7500\"\/><\/figure>\n\n\n\n<p class=\"has-black-color has-text-color\"><em>This is what a fake (phishing) Instagram login screen looks like \u2013<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"In this article, you will learn about how to use BlackEye in Linux which is one of the&hellip;\n","protected":false},"author":1,"featured_media":10808,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[10,55],"tags":[264,265,266,230,267,268,269,270,271],"class_list":{"0":"post-7489","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-hacking","8":"category-hacking-tools","9":"tag-blackeye","10":"tag-hack-fackebook","11":"tag-hack-instagram","12":"tag-hiddeneye","13":"tag-how-to-hack-password","14":"tag-how-to-work-phishing-page","15":"tag-localhast","16":"tag-ngrok","17":"tag-phishing-page"},"_links":{"self":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/7489","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/comments?post=7489"}],"version-history":[{"count":1,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/7489\/revisions"}],"predecessor-version":[{"id":10809,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/posts\/7489\/revisions\/10809"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media\/10808"}],"wp:attachment":[{"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/media?parent=7489"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/categories?post=7489"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reconcybersecurity.com\/blogs\/wp-json\/wp\/v2\/tags?post=7489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}