Phishing Process

Phishing Process

  1. First an attacker creates the replica of original website and check whether there is anything which can be easily detected . After the successful creation , sometimes for the surety attacker runs the phishing site on local host using the software like “xampp”
  2. Once the phishing site runs with zero error on the local host, attacker register for a fake domain and fake hosting provided fake information . Attacker tries to keep the domain look similar to the roginal one.
  3. Once the phishing site is  live , now attacker targets the users and send phishing link via mail or over the chats in such a way that user get manipulated and  opens the links . Once user login to the link , his credentials are recorded

Leave a Reply

Your email address will not be published. Required fields are marked *