THIS PROJECT IS MADE FOR DEMO AND EDUCATION PURPOSE ONLY AND HENCE, THE USE OF THIS REPOSITORY IS AT YOUR OWN RISK.
I, SHALL NOT BE LIABLE FOR ANY DAMAGED OR LEGAL CONSENTS BY YOUR USAGE OF THIS PROJECT.
The following demonstration illustrates how an attacker is able to create a public wireless network, and spoof your data. At the same time, the demonstration also showcase how the attacker processes your information and using various methods to send these data back to themselves.
No video yet, I will make one soon. ^_^.
In this section, I will be explaining what are the required packages before we start the installation.
- Ubuntu 18.04 and above
- apache and php web server package
apt install apache php -y
- git package
apt install git
- Slack workspace webhook integration. (OPTIONAL)
- Clone the git repository into the webserver.
git clone https://github.com/conan97zhang/NUS-phishing-DBS.git
- Move the NUS-phishing-DBS folder into the Nginx web server's root directory and rename it into m3.
mv -v NUS-phishing-DBS/* /var/www/html
- Associate the domain name internet-banking.dbs.com.sg with localhost IP address.
nano /etc/hosts
3.1 Amend the following line from
127.0.0.1 localhost
TO
127.0.0.1 internet-banking.dbs.com.sg
- Start apache web server
service apache2 start
In this section, I will be explaining how will the frontend (victim's browser) sends the data to the backend (attacker's server) seamlessly.
4.1 Load the website on your browser.
4.2 Start capturing the user inputs by opening 1 terminal.
Give Permission!
sudo chmod 777 /var/www/html/trace.sh
Run it!
./var/www/html/trace.sh
4.3 Go through all the steps in entering the details (VERY SIMPLE!!!)
In this section, I will be explaining how will the backend (attacker's terminal) sends the data from the frontend (victim's input) to a slackspace seamlessly. (API Integration link can be found at PREREQUISITE.)
5.1 Load the website on your browser.
5.2 Go through all the steps in entering the details (VERY SIMPLE!!!)
5.3 Start capturing the user inputs by opening 1 terminal.
Give Permission!
sudo chmod 777 /var/www/html/2slack.sh
Run it!
./var/www/html/2slack.sh
In the last section, we will be analysing the sample data output from Terminal 1 and Terminal 2 ( REFER TO EXECUTION(2) )
The data presented in this output is the input from the rogue DBS iBanking website.
UID=1234&PIN=12341234&submit=
From the above data, we can safely deduce the following information:
User ID: 1234
PIN: 12341234
The data presented in this output is the input from the rogue DBS iBanking website.
DBS Banking Credentials UID=dsdsd&PIN=sdsds&submit= UID=HACKNROLL%231&PIN=20202020&submit= UID=HNR2020%232&PIN=1324EWERW&submit= UID=12345T&PIN=123456&submit= UID=dfd&PIN=123&submit= UID=ee&PIN=dfd&submit= UID=1234&PIN=12341234&submit=
From the above data, we can safely deduce the following information: (TAKE THE LATEST DATA)
User ID: 1234
PIN: 12341234