Get Mystery Box with random crypto!

- Tecnologica Mente - Well today I decided to bring as an argu | Informatic Warrior

- Tecnologica Mente -
Well today I decided to bring as an argument
phishing

Let's start immediately what do you say?

-REASSUNTINO? ECCO -

As the first topic of today we take the "Phishing", have you ever heard of it? It is the technique used by Internet scammers to clone sites and modify them to steal users' personal data.
His operation is not complicated at all:
Let's say that the cloned site is that of the victim's bank, the latter receives an e-mail inviting him to click on a link ... if you do, you are directed to a page completely identical to that of the bank in which they are asked for username and password. If you fall into the trap, the data will be sent to the dear scoundrel who has conveniently placed a link on the Fake page that transfers the data to his e-mail address.
This is a superfine technique, but the following steps show how it can also be done by inexperienced or low-grade criminals

-IL PHISHING - I recommend ... do not do it

¤ Cloning:
First you must identify the site to be copied. So you have to clone it in every aspect and since it's an illegal activity scoundrels use all the elements on the page, but how do they do it? Well using appropriate software like Wget or HTTrack.
The former is more suitable for professionals while the latter is more appreciated by the novices of the sector. HTTrack can be downloaded from www.httrack.com/page/2/en/index.html
Once the version is selected and the file is installed, you can start the copy protocols. You must click Next, then you must enter a name in the "New project name" box, then "forward" and "add URL" specifying the web address to be cloned. Click "Next" and "Finish" again, after some time the site is cloned

¤The changes
But the dear Furfante must modify codes to succeed in his intent:
With the notepad (Windows for example) you insert a link in which the user authentication data will be sent (I can not be more specific, it would represent a crime)

¤The scam is served
And now the final step.
The scoundrel copies the cloned / modified site into a free hosting service and the most anonymous as possible (most likely a foreign service) if you find a list on www.free-webhosts.com at this point create a fake e-mail address send to unfortunate victim


I hope this post of information can please.