Ghost Phisher is a wireless network audit and attack software that creates a fake access point for a network, which fools a victim into connecting to it; it then assigns an IP address to the victim. The tool can be used to perform various attacks such as credentials phishing and session hijacking. It can also be used to deliver meterpreter payloads to the victims. In this recipe, we will learn how to use the tool to perform various phishing attacks or to steal cookies.
Owning employee accounts with Ghost Phisher
How to do it...
Let's perform the following steps:
- We start by using the ghost-phisher command:
- Here, we choose out interface and click on Set Monitor:
- Now we enter the details of the access point we...