Kurama сказал(а):
How could you steal expired cookies? What nonsense =D
sonxyz сказал(а):
i have phish with fresh cookie grabber
nakedpoet сказал(а):
can i see your work mate??
sonxyz сказал(а):
i have phish with fresh cookie grabber
Пожалуйста, обратите внимание, что пользователь заблокированvei сказал(а):
a normal php based phishing kit will not be able to steal cookies due to cross-site origin policies. the ONLY way to hijack a user's session cookies is via a reverse proxy which basically logs them into the proxy's session, which is then just captured and reused.
this requires a vps and evilginx2 does it perfectly and free. don't get scammed by someone offering you a phishing kit that also steals cookies because the cookies will be attached to the phishing domain and not the actual website being phished.
sonxyz сказал(а):
ur fucking stupid idiot , evilnginx2 doesnt support proxy instead of my support it , check out my video piece of money
vei сказал(а):
a normal php based phishing kit will not be able to steal cookies due to cross-site origin policies. the ONLY way to hijack a user's session cookies is via a reverse proxy which basically logs them into the proxy's session, which is then just captured and reused.
this requires a vps and evilginx2 does it perfectly and free. don't get scammed by someone offering you a phishing kit that also steals cookies because the cookies will be attached to the phishing domain and not the actual website being phished.
Пожалуйста, обратите внимание, что пользователь заблокированzrRnge сказал(а):
I know someone with a BOA page similar to what you’ve described here. It captures cookies and doesn’t redirect like the static scamas. Once credentials have been entered, it logs into the account but instead of showing the actual domain, it displays the phishing link and stays that way, even while logged in and transactions are being made on the account. Been trying to wrap my head around that
zrRnge сказал(а):
I know someone with a BOA page similar to what you’ve described here. It captures cookies and doesn’t redirect like the static scamas. Once credentials have been entered, it logs into the account but instead of showing the actual domain, it displays the phishing link and stays that way, even while logged in and transactions are being made on the account. Been trying to wrap my head around that
vei сказал(а):
that's a reverse proxy. that's what evilginx2 does. imagine it like they're logging into a computer and when they log in, you run up and steal the computer from in front of them. the website sees the same exact computer and session, so it thinks you're the same exact person. the difference is that when they log in, the session is transferred to you and they're left with a new session so that they don't ruin the session that was transferred to you.
this cannot be done on an all-PHP phishing kit due to the cross-site origin policies. otherwise, you would just need to iframe the entire site and let them use the iframe and collect the cookies and log all keystroke events using javascript to capture credentials. there's a reason if you try to iframe other websites, a lot won't load and if they do, you cannot collect any data without them sharing it voluntarily.
this is why the all-PHP phishers are good for attempting to steal recovery credentials like photo ID, mmn, pin numbers, recovery question answers, etc. you'd need to sign in as the logs come in and redirect them immediately to the 2fa phisher or whatever is necessary to get into the account if more than userass is needed. with the reverse proxy, they enter the 2fa into the actual site and as soon as the session is created that gives full access to the account, it's transferred to you.
sonxyz сказал(а):
I can do that , its easy
expert_kalash сказал(а):
Live panel + cookie saver plagin is ok
you won't find 365 proxy reverse