Тёмный

How Hackers can use .zip domains for Social Engineering and Phishing attacks 

VillaRoot
Подписаться 1,6 тыс.
Просмотров 2,8 тыс.
50% 1

Disclaimer: For educational and Legal Pentesting use only.
Google just release .zip top level domains, which brings concern as it will now allow hackers to use this in their phishing attacks. In this video I give real examples how this will be used.
VillaRoot is currently a Pentester Consultant with a background in System Engineering managing and supporting Linux and Windows Servers.
Twitter: / villaroot

Опубликовано:

 

13 май 2023

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 16   
@cvport8155
@cvport8155 Год назад
Good work no stop #_# Please make more vd for advanced techniques red team and phishing tool and tricks for social eng gooo ❤
@user-sq2vl4vo1p
@user-sq2vl4vo1p Год назад
wow thanks you have been motivating me on my educational journey God blesss you
@villaroot
@villaroot Год назад
I'm glad to help! Best of luck on it!
@09Owais
@09Owais Год назад
Hi Villaroot, you’re really doing great! Just wanted to know if any method exists to deal with Google Safe Browsing while running phishing campaigns since it flags the site in less than a minute despite of using blacklisting and hiding phishlets! Quite annoying!
@villaroot
@villaroot Год назад
Thanks for the support! I honestly appreciate it. Google Safe Browsing is actually good at flagging phishing sites. Besides hoping the user doesn't Chrome, I've found these tips to help. Not a guarantee but it will 'add' to having your site not get flagged (In addition to what you're doing) 1. Age a new domain for at least 30 days. Preferably 90 days. So buy a new domain but don't use it for phishing yet and let it 'be out there' for those days so it can gain some reputation on being not malicious. You can also buy expired domains. Which are domains that have been purchased before but we're not renewed and available to buy. 2. Evilginx sends headers with 'Evilginx'. You have to manually remove them in the GitHub repository. If not, sites can see those headers and immediately mark it malicious. There might be more signatures that aren't well known. 3. Check if your domain is already categorized. Sites like McAfee and Symantec have online checkers. If they aren't categorized, age them and try to put in a categorized request for it. If it is categorized it adds to the legitimacy of the site. Hope this helps
@09Owais
@09Owais Год назад
To Be Honest! I have already applied these along with traffic analysis and identifying ranges to be blocked on proxy, I am using a proxy setup with blacklist config from apache. Nothing seems to have worked for now. It’s fine as long as the link is not opened, once the link is opened, it’s flagged! I’m afraid, that there doesn’t seem to be a way out 😢
@user-in1iv4fd4j
@user-in1iv4fd4j Год назад
really great content!It’s just a message to that you know you got a subscription from Taiwan
@villaroot
@villaroot Год назад
That's awesome to know! I appreciate the support from you!
@user-fw2wh7md6f
@user-fw2wh7md6f Год назад
hi villa can you do updated version of evilginx or how to still use evilginx 2.4 im having problems
@popboykemzykhil3822
@popboykemzykhil3822 Год назад
Hi VillaRoot, Please do you have a spamming toturial course to get o365? I am very much interested
@user-bc4gp4nr5v
@user-bc4gp4nr5v 14 дней назад
new upload??
@lucasfredrick2825
@lucasfredrick2825 Год назад
How can I run evil ginx2 when my pc goes off..or how do I keep a phishing campaigns active when my pc goes off
@villaroot
@villaroot Год назад
No, you'll have to have your PC on the whole time your phishing campaign is live. If a target clicks your link while your PC is off, the phishing environment will be offline so they'll get a 'cannot find' error.
@user-sq2vl4vo1p
@user-sq2vl4vo1p Год назад
Please boss i have some issues with my pcs & iphone an attaker have gained access to all my devices even when i get to use rdp its still the same please how can you help me or any advice on what to do please
@user-sq2vl4vo1p
@user-sq2vl4vo1p Год назад
i tried getting all tools to defend still keep coming andcoming pls i woudl appreciate ur help any
@villaroot
@villaroot Год назад
Your personal PC at your house? Or PC at work?
Далее
What Can You Do with Python? - The 3 Main Applications
11:30
ПРОЖАРКА ХАРЛАМОВА
00:15
Просмотров 49 тыс.
Happy 4th of July 😂
00:12
Просмотров 3,6 млн
Evilginx Cookies Capture (Outlook cookies)
3:31
How a DNS Server (Domain Name System) works.
6:05
Просмотров 4,8 млн
Self Hosted Open Source Digital Signage by Xibo
17:14
Просмотров 1,3 тыс.
Running a Buffer Overflow Attack - Computerphile
17:30
Dropbox vs Google Drive
13:29
Просмотров 573 тыс.
How I would learn to code (If I could start over)
9:16
How I Would Learn To Code (If I Could Start Over)
13:43
ПРОЖАРКА ХАРЛАМОВА
00:15
Просмотров 49 тыс.