Breaking & Entering . (Phishing)

Breaking and Entering.
>Phishing<

Have you ever had the nightmare of breaking and entering to your house????



The same process may apply to your sensitive information such as username, password and credit card information which are using in web by an intruder.
Phishing is kind of a tool used by cyber criminals to steal personal information from another person.
This is popular since it is far easier to trick someone into clicking a malicious link in a seemingly legitimate email than trying to break through a computer's defenses. 

Let's get some idea of how to make a phishing site.

I'm using Twitter social network login page as an example.

Step 1

Go to the website that you want to make a phishing page.
As i mentioned above , I'm using Twitter here.

Step 2

Click right on the page and save page as complete web page.

 Step 3

Then open the saved page and open it in a notepad.

Step 4

Press "CTRL+F" and click Find Next to search for "action" word.
make sure that you choose the action with the login form.


Step 5

Now replace the url after the action with your exploit.
Here i use my exploit with the name vol.php

Step 6

Now save the file with any name you want with the extension .html

Step 7

You have to make a php script to catch the sensitive data.

Just go through the link provided below. You will find all the codes related to my phishing work.

https://github.com/RajithaAkwaththa/Phishing



Concepts Related to phishing


Phishing emails

>It looks like as an important notice, urgent update or alert with a deceptive subject line to entice the recipient to believe that the email has come from a trust source and then open it. The subject line may consist of numeric characters or other letters in order to bypass spamming filters.

>It sometimes contains messages that sound attractive rather than threatening e.g.  a reward will be given


>It normally uses forged sender's address or spoofed identity of the organisation, making the email appear as if it comes from the organisation it claimed to be.


>It usually copies all the content from the website in order to make the website look genuine.


>It usually contains hyperlinks that will take the recipient to a fraudulent website.


>It may contain a form for the recipient to fill in personal/financial information and let recipient submit it. This normally involves the execution of scripts to send the information to databases or temporary storage areas where the intruder can collect it later.



Phishing Websites

>It uses genuine looking content such as images, texts, logos or even mirrors the legitimate website to entice visitors to enter their accounts or financial information or sensitive information such as username and passwords.

>It may use forms to collect visitors' information where these forms are similar to that in the legitimate website.


>It may in form of pop-up window that is opened in the foreground with the genuine web page in the background to mislead and confuse the visitor thinking that he/she is still visiting the legitimate website.


>It may display the IP address or the fake address on the visitors' address bar assuming that visitors may not aware of that. Some intruders may perform URL spoofing by using scripts or HTML commands to construct fake address bar in place of the original address.



What techniques are there to attract the victim??

>Intruder can send a link saying that there is a way to secure your mail account by following some easy steps. So there they asking the credentials for your mail and your sensitive information can be steal.

>Victim can be attract by saying that there is a giveaway at somewhere and for that you need to provide your credit card information and it can be stolen like that by an intruder.

Make sure that you wont be a victim in phishing.

>Don’t reveal personal or financial information in an email, and do not respond to email solicitations for this information. This includes following links sent in email.

>Before sending sensitive information over the Internet, check the security of the website.

>Pay attention to the website's URL. Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain (e.g., .com versus .net).

>If you are unsure whether an email request is legitimate, try to verify it by contacting the company directly. Contact the company using information provided on an account statement, not information provided in an email. Information about known phishing attacks is available online from groups.

>Keep a clean machine. Having the latest operating system, software, web browsers,) anti-virus protection and apps are the best defenses against viruses, malware, and other online threats.

Comments

Popular posts from this blog

The Secure Socket Tunneling Protocol

Fake WAP

Lets Make a Simple Keylogger