• Buddahriffic@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      13 hours ago

      Step 1: find phishing site
      Step 2: find/write brute force script that doesn’t stop on successful login but has longer random delay between attempts (so it isn’t obvious it’s a form of a DOS attack)
      Step 3: poison phishing site data

      Use proxies from areas that would normally use the service the phishing site is mimicking.

      Bonus step: in case the phishers use the same proxies source, make enough invalid login attempts to the actual service to get the proxies IP blocked so they can’t use them to test the large number of invalid logins to find if any are valid.