hacktricks/generic-methodologies-and-resources/phishing-methodology/clone-a-website.md

60 lines
3 KiB
Markdown
Raw Normal View History

{% hint style="success" %}
Impara e pratica l'hacking su AWS: <img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
Impara e pratica l'hacking su GCP: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
2022-04-28 16:01:33 +00:00
<details>
2022-04-28 16:01:33 +00:00
<summary>Sostieni HackTricks</summary>
2022-04-28 16:01:33 +00:00
* Controlla i [**piani di abbonamento**](https://github.com/sponsors/carlospolop)!
* **Unisciti al** 💬 [**gruppo Discord**](https://discord.gg/hRep4RUj7f) o al [**gruppo telegram**](https://t.me/peass) o **seguici** su **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
* **Condividi trucchi di hacking inviando PR a** [**HackTricks**](https://github.com/carlospolop/hacktricks) e [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repos di github.
2022-04-28 16:01:33 +00:00
</details>
{% endhint %}
2022-04-28 16:01:33 +00:00
<figure><img src="https://pentest.eu/RENDER_WebSec_10fps_21sec_9MB_29042024.gif" alt=""><figcaption></figcaption></figure>
{% embed url="https://websec.nl/" %}
2022-04-28 16:01:33 +00:00
2021-05-27 13:02:25 +00:00
Per una valutazione del phishing a volte può essere utile **clonare completamente un sito web**.
Nota che puoi aggiungere anche alcuni payload al sito clonato come un hook BeEF per "controllare" la scheda dell'utente.
2021-05-27 13:02:25 +00:00
2024-02-10 13:03:23 +00:00
Ci sono diversi strumenti che puoi utilizzare per questo scopo:
2021-05-27 13:02:25 +00:00
2022-05-01 12:49:36 +00:00
## wget
2021-05-27 13:02:25 +00:00
```text
wget -mk -nH
```
2022-05-01 12:49:36 +00:00
## goclone
2021-05-27 13:02:25 +00:00
```bash
#https://github.com/imthaghost/goclone
2022-02-07 10:51:30 +00:00
goclone <url>
2021-05-27 13:02:25 +00:00
```
## Kit di Social Engineering
2021-05-27 13:02:25 +00:00
```bash
#https://github.com/trustedsec/social-engineer-toolkit
2021-05-27 13:02:25 +00:00
```
<figure><img src="https://pentest.eu/RENDER_WebSec_10fps_21sec_9MB_29042024.gif" alt=""><figcaption></figcaption></figure>
2021-05-27 13:02:25 +00:00
{% embed url="https://websec.nl/" %}
2022-04-28 16:01:33 +00:00
{% hint style="success" %}
Impara & pratica AWS Hacking:<img src="/.gitbook/assets/arte.png" alt="" data-size="line">[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)<img src="/.gitbook/assets/arte.png" alt="" data-size="line">\
Impara & pratica GCP Hacking: <img src="/.gitbook/assets/grte.png" alt="" data-size="line">[**HackTricks Training GCP Red Team Expert (GRTE)**<img src="/.gitbook/assets/grte.png" alt="" data-size="line">](https://training.hacktricks.xyz/courses/grte)
2024-02-10 13:03:23 +00:00
<details>
2024-02-10 13:03:23 +00:00
<summary>Sostieni HackTricks</summary>
2024-02-10 13:03:23 +00:00
* Controlla i [**piani di abbonamento**](https://github.com/sponsors/carlospolop)!
* **Unisciti al** 💬 [**gruppo Discord**](https://discord.gg/hRep4RUj7f) o al [**gruppo telegram**](https://t.me/peass) o **seguici** su **Twitter** 🐦 [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
* **Condividi trucchi di hacking inviando PR ai** [**HackTricks**](https://github.com/carlospolop/hacktricks) e [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) repository di github.
2024-02-10 13:03:23 +00:00
</details>
{% endhint %}