Breaking & Entering . (Phishing)
Breaking and Entering.
>Phishing<
Have you ever had the nightmare of breaking and entering to your house????
The same process may apply to your sensitive information such as username, password and credit card information which are using in web by an intruder.
Phishing is kind of a tool used by cyber criminals to steal personal information from another person.
This is popular since it is far easier to trick someone into clicking a malicious link in a seemingly legitimate email than trying to break through a computer's defenses.
Let's get some idea of how to make a phishing site.
I'm using Twitter social network login page as an example.
Step 1
Go to the website that you want to make a phishing page.
As i mentioned above , I'm using Twitter here.
Step 2
Click right on the page and save page as complete web page.
Step 3
Then open the saved page and open it in a notepad.
Step 4
Press "CTRL+F" and click Find Next to search for "action" word.
make sure that you choose the action with the login form.
Step 5
Now replace the url after the action with your exploit.
Here i use my exploit with the name vol.php
Step 6
Now save the file with any name you want with the extension .html
Step 7
You have to make a php script to catch the sensitive data.
Just go through the link provided below. You will find all the codes related to my phishing work.
https://github.com/RajithaAkwaththa/Phishing
>It sometimes contains messages that sound attractive rather than threatening e.g. a reward will be given
>It may use forms to collect visitors' information where these forms are similar to that in the legitimate website.
>Phishing<
Have you ever had the nightmare of breaking and entering to your house????
The same process may apply to your sensitive information such as username, password and credit card information which are using in web by an intruder.
Phishing is kind of a tool used by cyber criminals to steal personal information from another person.
This is popular since it is far easier to trick someone into clicking a malicious link in a seemingly legitimate email than trying to break through a computer's defenses.
Let's get some idea of how to make a phishing site.
I'm using Twitter social network login page as an example.
Step 1
Go to the website that you want to make a phishing page.
As i mentioned above , I'm using Twitter here.
Step 2
Click right on the page and save page as complete web page.
Step 3
Then open the saved page and open it in a notepad.
Step 4
Press "CTRL+F" and click Find Next to search for "action" word.
make sure that you choose the action with the login form.
Step 5
Now replace the url after the action with your exploit.
Here i use my exploit with the name vol.php
Step 6
Now save the file with any name you want with the extension .html
Step 7
You have to make a php script to catch the sensitive data.
Just go through the link provided below. You will find all the codes related to my phishing work.
https://github.com/RajithaAkwaththa/Phishing
Concepts Related to phishing
Phishing emails
>It looks like
as an important notice, urgent update or alert with a deceptive subject
line to entice the recipient to believe that the email has come from a
trust source and then open it. The subject line may consist of numeric
characters or other letters in order to bypass spamming filters.
>It normally uses forged sender's address or spoofed identity of the organisation, making the email appear as if it comes from the organisation it claimed to be.
>It usually copies all the content from the website in order to make the website look genuine.
>It usually contains hyperlinks that will take the recipient to a fraudulent website.
>It may contain a form for the recipient to fill in personal/financial information and let recipient submit it. This normally involves the execution of scripts to send the information to databases or temporary storage areas where the intruder can collect it later.
Phishing Websites
>It uses genuine
looking content such as images, texts, logos or even mirrors the
legitimate website to entice visitors to enter their accounts or financial
information or sensitive information such as username and passwords.
>It may in form of pop-up window that is opened in the foreground with the genuine web page in the background to mislead and confuse the visitor thinking that he/she is still visiting the legitimate website.
>It may display the IP address or the fake address on the visitors' address bar assuming that visitors may not aware of that. Some intruders may perform URL spoofing by using scripts or HTML commands to construct fake address bar in place of the original address.
What techniques are there to attract the victim??
>Intruder can send a link saying that there is a way to
secure your mail account by following some easy steps. So there they
asking the credentials for your mail and your sensitive information can be
steal.
>Victim can be attract by saying that there is a giveaway
at somewhere and for that you need to provide your credit card information
and it can be stolen like that by an intruder.
Comments
Post a Comment