how hackers do a phishing page in 8 lines of code using html

 How Hackers do a phishing page in  8 lines of code 

phishing,what is phishing?

        Phishing is a cybercrime where scammers deceive individuals or organizations by creating fake emails, websites, or messages that appear legitimate to trick victims into providing sensitive information, such as login credentials, financial data, or personal details. These fraudulent attempts aim to steal valuable information or gain unauthorized access to accounts and can lead to identity theft, financial loss, or other malicious activities. To protect against phishing, it's crucial to be cautious of suspicious emails, links, and requests for personal information, and to verify the authenticity of websites and messages before sharing sensitive data. Always use strong passwords and enable multi-factor authentication whenever possible to enhance security.


PRACTICAL STEPS:

Here , I am gonna clone the amazon website with only 8 lines

HERE IS THE CODE
<html>
<head> phishing  </head>
<body>
<iframe style="display-none" name="csrf-iframe"></iframe>
 <form action="https://amazon.in" method="get" id="csrf-form"> </form>
<script>document.getElementById("csrf-form").submit() </script>
</body>
</html>

Here am using kali linux so follow the steps if you are a kali user

STEP 1:
    initially we need an editor to write our codes,so am using tha command

  • nano hi.html


the above extension is needed .html 

STEP 2:
    After that copy and paste the code so that you can finish it easily 
Even you can replace action field whatever website you need to be cloned 



STEP 3:
last but not least just right click and give the option open with browser









                     hey guys!,hopefully i think this article is useful ,if you need further more steps like how to host the above website and how can we gain credentials just comment below guys

Comments

Post a Comment

Popular posts from this blog

PlayItSafe google cyber security professional course 2 (COURSERA)

FOUNDATIONS OF CYBERSECURITY GOOGLE(COURSERA) QUIZ ANSWERS

HOW TO BYPASS THE 2FA(TWO FACTOR AUTHENTICATION)

AUTOMATED SCRIPT FOR FINDING XSS

Disclaimer

BEGINNER BUG BOUNTY TOOLS PART-1

Privacy policy

BITFLIPING

Things should do after sublister(sublist3r)