Desktop Phishing
we thank Zero Thunder for desgning such a wonderfull n complete tute on this topic
Code:
http://www.mediafire.com/download.php?zog4z0mgzmd
What is Desktop Phishing
This is a very advance way of Phishing. a lot different than the common way of Phishing. In the common way of phishing you can't get the real domain for an example: http://www.phishier.freehost.com but in Desktop Phisher you can get the http://www.phisher.com.
Old way of Phishing = http://www.paypal.freehost.com
Desktop Phishing = http://www.paypal.com
Whats Deference between
Phishing and Desktop Phishing
What is a Phisher Arm
Phisher Arm is programme that will change your IP Mapping Settings, Youdon't need to know a programme any programming laguage for this . you can make a Phisherarm with some tools you have in your computer
How DeskTop Phisher Works
Desktop Phisher need a Phisher Arm to get the victom to the phisher page . whenvictim run the phisher arm it will change the IP mapping on ur system it will add the attackers IPto the domain you made a phisher. When he type the domain it will locate to the phisher host uhave with.
Desktop Phishing -by Zeri Thunder
Wednesday, August 26, 2009
Posted by Ryan at 7:14:00 AM
Labels: Info
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment