Jahan Zaible Ghari

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, 27 July 2013

Desktop Phishing Tutorial - The Art of Phishing

Posted on 01:00 by Unknown

-->
phishing is another type of Phishing. In desktop phishing hackers change your Windows/System32/drivers/etc/hosts file, this file controls the internet browsing in your PC

 Difference between phishing and desktop phishing is as follows.

In phishing 

1. Attacker convinces the victim to click on the link of fake login page which resembles a genuine login page.
2.Victim enters his credentials in fake login page that goes to attacker.
3. Victim is then redirected to an error page or genuine website depending on attacker.

But main drawback in phishing is that victim can easily differentiate between fake and real login page by
looking at the domain name. We can overcome this in desktop phishing by spoofing domain name.

In desktop phishing

1. Attacker sends an executable file to victim and victim is supposed to double click on it. Attacker's job is done.
2. Victim types the domain name of orignal/genuine website and is taken to our fake login page. 
But the domain name remains the same as typed by victim
and victim doesn't come to know.
3. Rest of the things are same as in normal phishing. 


What is Hosts File ?

The hosts file is a text file containing domain names and IP address associated with them.
Location of hosts file in windows: C:\Windows\System32\drivers\etc\, Whenever we visit any website, say www.anything.com , an query is sent to Domain Name Server(DNS) to look up for the IP address associated with that website/domain. But before doing this the hosts file on our local computer is checked for the IP address associated to the domain name.

Suppose we make an entry in hosts file as shown. When we visit www.anywebsite.com , we would be taken to this 115.125.124.50. No query for resolving IP address associated with www.anywebsite.com would be sent to DNS.


What is the attack ?
 
I hope you have got an idea that how modification of this hosts file on victim's computer can be misused.
We need to modify victim's hosts file by adding the genuine domain name and IP address of our fake website /phishing page.Whenever victim would visit the genuine website , he would be directed to our fake login page and domain name in the URL box would remain genuine as typed by victim. Hence domain name is spoofed.



Steps to perform attack 

1. Host phishing page on your computer. 
Since the webshosting sites like 110mb.com,ripway.com etc where we usually upload our phishing page do not provide a IP that points to your website like www.anything.110mb.com. An IP address points to a webserver and not a website. So we need to host the phishing page on our computer using a webserver software like wamp or xampp.

Download the wamp or xampp.

  • Copy your phishing page and paste it in the WWW directory in wamp, the default path is "C:\Wamp\WWW" 
  • Run Wamp server on your pc
  • Right click the wamp icon in the system tray and select Start all services, Visit your public IP address and you must see your phishing page

2.Modify Hosts file.
If you dont have physical access to victim's computer. Then copy your hosts file and paste anywhere. 
Edit it with any text editor and associate your public IP address with domain you wish as show.

Like in this case , when victim would visit gmail.com , he would be take to website hosted on IP 'xxx.xxx.xxx.xxx'.

Replace it with your public IP.
 
3. Compress hosts file such that when victim opens it, it automatically gets copied to default 
location C:\Windows\system32\drivers\etc and victim's hosts file get replaced by our modified hosts file. 







The you can bind this file with any exe using a binder or directly give it to victim. He/she is supposed to click it
and you are done .

Limitation of attack 
 
1.Since our pubilc IP address is most probably dynamic that it gets changed everytime we disconnect and
connect. To overcome this we need to purchase static IP from our ISP. 
2. The browser may warn the victim that Digital Certificate of the website is not genuine.


Countermeasures:-
 
Never just blindly enter your credentials in a login page even if you yourself have typed a domain name in
web browser. Check the protocol whether it is "http" or "https" . https is secure,


Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Hacking | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Windows 8 shortcuts: Keyboard Shortcuts-1
    List of Windows 8 Shortcuts Have you tried Microsoft’s latest Operating system Windows 8 yet? If you already tried, then you’ll find a huge ...
  • Facebook Auto Liker Without Access Token
    AUTO LIKER SITE http://fb-auto-posts-liker.blogspot.com/ Friends.... Now u can use the World's 1st Facebook Auto-Liker Without Access To...
  • Six Tips for protecting Wireless Networks-Wi-Fi
                                                                                                             With the growing presence of the te...
  • Windows Defender Free Download
    Windows Defender is software that helps protect your computer against pop-ups, slow performance, and security threats caused by spyware and ...
  • How to Hack My Space Hacking
    MySpace being one of the world’s largest social networks, has become today a favorite place for many to maintain secret relationships and ex...
  • Free Router Simulator Softwares
    If you are going to take a networking exam like CCNA, CCNP… it is better to practice with real routers. But when the budget is not big enoug...
  • WINDOWS MEDIA PLAYER FIREFOX PLUGIN 1.0.0.8 Free Download
    WINDOWS MEDIA PLAYER FIREFOX PLUGIN 1.0.0.8                                   Microsoft Corporation - 311KB (Freeware) Windows Media Player ...
  • Hacking Gmail account using GX cookie
    Introduction Hacking web application was always curious for the script kiddies. And hacking free web email account is every geek first attem...
  • Windows 7 Ultimate Highly Compressed in 10 Mb Only Free Download
    Win dows 7 Ultimate is the most versatile and powerful edition of Windows 7. It is including the ability to run many Windows XP productivity...
  • Total PDF Converter 2.1.233 + Key Free Download
    Total PDF Converter 2.1.233 + Key Total PDF Converter converts PDF files to HTML, DOC (Word), text, Excel, PostScript, CSV or image files (e...

Categories

  • Android
  • AntiVirus
  • Audio and video Players
  • Auto Cad
  • C/C++
  • CCNA
  • Converters
  • Facebook Auto Liker
  • Hacking
  • Inpage
  • Locks
  • Media players
  • MS Office
  • Nokia
  • photo Editors
  • Recovery
  • Recovery.
  • Sites Unblocker
  • Social Network
  • Softwares
  • Tricks
  • Typing Tutors
  • Ufone
  • UniversalDrivers
  • Video Editings
  • Visual Studio
  • Wifi
  • Windows

Blog Archive

  • ▼  2013 (166)
    • ►  October (1)
    • ►  August (31)
    • ▼  July (45)
      • How To Disable Right Click in Blogger(blogspot) or...
      • Free Router Simulator Softwares
      • Six Tips for protecting Wireless Networks-Wi-Fi
      • Useful Shortcut Keys For Facebook
      • How to Disable Startup Programs without any Softwa...
      • Windows Security Hacker Free Download
      • Password Hacking Faq
      • Hack Facebook Password
      • How to Hack Windows administrator password
      • How to Hack My Space Hacking
      • Desktop Phishing Tutorial - The Art of Phishing
      • Hackers compromised cPanel's proxy server used by ...
      • Fern wifi Cracker- A Wireless Penetration Testing ...
      • XSS EXPLOITS
      • Worm Attacks | Your Fb Account Can Be Hacked
      • Top 5 Computer Hackers Ever
      • Collection of All Google Tricks
      • Top 5 Computer Programmers in the World
      • Hacking Gmail account using GX cookie
      • Get Any Microsoft Products for FREE!!
      • TRACING An IP
      • How to Hack Email Account with Cookie stealing [Fo...
      • Hacking Single Player Games
      • Interesting Hacking Quotes
      • Hidden Features Of Format Factory
      • How To Check All System Configuration
      • A History About Hacking [Inforgraphic]
      • Top 10 Hollywood Movies About Hacking
      • Trick to find facebook Profile ID
      • Hack Facebook Account
      • Hacking Google maps and google Earth
      • How to become Worlds No 1 Hacker
      • Get password behind asterisks
      • How to view saved password in google chrome
      • Shocking Facts about Facebook Creator Mark Zuckerb...
      • Windows Security Hacker Free Download
      • How to Hack Windows administrator password
      • CHANGE YOUR DRIVES BACK GROUND
      • Find Your Missing USB Drive in Windows XP
      • How to Increase Virtual Memory and Boost Computer ...
      • Top 10 Windows 8 Tips And Tricks
      • AutoCAD 2007 with Crack Free Download Full Version
      • Autocad 2013 Download Full Version Free Download
      • Cisco Packet Tracer 5.3.3
      • Unity 4.1.5 Free Download`
    • ►  May (3)
    • ►  April (3)
    • ►  February (13)
    • ►  January (70)
Powered by Blogger.

About Me

Unknown
View my complete profile