Simulated Phishing Attack using BlackEye
Simulate a phishing attack using BlackEye on a local VM to understand how credential harvesting works.
Tools Used
- BlackEye, Zphisher
- Kali Linux(VM)
- Localhost setup (VM)
Steps
- Cloned BlackEye, Zphisher repositories from GitHub
- Launched the phishing page for Instagram,Netflix
- Used a tunnel to expose localhost (Ngrok, localxpose, etc.)
- Opened the phishing page on victim browser
- Captured the login credentials in terminal
Observations
- Most kits just use HTML/CSS clones of login pages
- BlackEye stores creds in plain text
- Some pages are broken/outdated
Takeaways
- Never trust links — always verify domains
- Tools like these are good for defenders to understand attacker techniques
- Real-world phishing often uses shortened or hidden URLs
Resources
- BlackEye GitHub
- Zphisher
- My writeups at Projects