BROWSER IN THE BROWSER ATTACK TUTORIAL
To read full article, click here.
Hi everyone, I hope you all are doing good. In this Browser in the Browser Attack Tutorial, We are going to talk about a latest phishing technique i.e Browser in the Browser attack. Before we jump into the article, can you identify the difference between the image:
If you don’t know about phishing then in simple terms, it is an online attack that can be used to steal sensitive information like credentials, credit card details etc. Let’s take a short example: Suppose you have copied the sources code of Facebook’s website and host it on your server. Now you have given your malicious website’s link to your friend saying “Hey bro, I just got $100 by using this website, you just need to login to this website through Facebook account and you are done!“. Assuming that your friend has so much faith in you, he/she logs in to your website. BOOM! Now you got their Facebook credentials!!!
A/Q Cisco, “Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email. The goal is to steal sensitive data like credit card and login information, or to install malware on the victim’s machine. Phishing is a common type of cyber attack that everyone should learn about in order to protect themselves.“
Click here to know more.