Thursday, May 26, 2016

How to do Desktop phishing | Tutorial on desktop phishing

hey guyzz first understand the concept behind desktop phishing:

Difference between phishing and desktop phishing is as follows.

In phishing

1.Attacker convinces the victim to click on the link of fakelogin pagewhich resembles a uine login page.
2.Victim enters his credentials in fake login page that goes to attacker.
3.Victim is then redirected to an error page or uine website depending on attacker.

But main drawback in phishing is that victim can sily differentiate between fake and rl login page by
looking at the domain name. We can overcome this in desktop phishing by spoofing domain name.

In desktop phishing
1.Attacker sends an executable file to victim and victim is supposed to double click on it. Attacker's job is done.
2.Victim types the domain name of orignal/uine website and is taken to our fake login page.
But the domain name remains the same as typed by victim
and victim doesn't come to know.
3.Rest of the things are same as in normal phishing.

What is Hosts File ?
The hosts file is atext filecontainingdomain namesand IP address associated with them.
Loion of hosts file in : C:\\System32\drivers\etc\
Whenever we visit any website,, an query is sent to Domain Name Server(DNS) to
look up for the IP address associated with that website/domain. But before doing this the hosts file on our local computer is checked for the IP address associated to the domain name.

Suppose we make an entry in hosts file as shown. When we, we would
be taken to this No query for resolving IP address associated withwww.anywebsite.comwould be sent to DNS.

What is the attack ?

I hope you have got an id that how modifiion of this hosts file on victim's computer can be misused.
We need to modify victim's hosts file by adding the uine domain name and IP address of our
fake website /phishing page. Whenever victim would visit the uine website , he would be directed to our fake login page
and domain name in the URL box would remain uine as typed by victim. Hence domain name is spoofed.

follow these simple Steps to perform attack:

1.Host phishing page on your computer.
Since the webshosting sites like, etc where we usually upload our phishing page do not provide a IP that points to your website An IP address points to a webserver and not a website. So we need to host the phishing page on our computer using a webserversoftwarelike wamp or xampp.
Downloadthe wamp or xampp.

Copy your phishing page and paste it in the WWW directory in wamp, the default path is "C:\Wamp\WWW"Run Wamp server on your pcRight click the wamp icon in the system tray and select Start all services, Visit your public IP address and you must see your phishing page
2.Modify Hosts file.
If you dont have physical access to victim's computer. Then copy your hosts file and paste anywhere.
Edit it with any text editor and associate your public IP address with domain you wish as show.

Like in this case , when victim would visit , he would be take to website hosted on IP ''.
Replace it with your public IP.
3.Compress hosts file such that when victim opens it, it automatically gets copied to default
loion C:\\system32\drivers\etc and victim's hosts file get replaced by our modified hosts file.

The you can bind this file with any exe using a binder or directly give it to victim. He is supposed to click it
and you are done .

NOTE:Limitations of attack:

1.Since our pubilc IP address is most probably dynamic that it gets changed everytime we disconnect and
connect. To overcome this we need to purchasestatic IPfrom our ISP.
2.The browser may warn the victim thatDigital Certifieof the website is not uine.

No comments:

Post a Comment