- First an attacker creates the replica of original website and check whether there is anything which can be easily detected . After the successful creation , sometimes for the surety attacker runs the phishing site on local host using the software like “xampp”
- Once the phishing site runs with zero error on the local host, attacker register for a fake domain and fake hosting provided fake information . Attacker tries to keep the domain look similar to the roginal one.
- Once the phishing site is live , now attacker targets the users and send phishing link via mail or over the chats in such a way that user get manipulated and opens the links . Once user login to the link , his credentials are recorded