Step 1: find phishing site
Step 2: find/write brute force script that doesn’t stop on successful login but has longer random delay between attempts (so it isn’t obvious it’s a form of a DOS attack)
Step 3: poison phishing site data
Use proxies from areas that would normally use the service the phishing site is mimicking.
Bonus step: in case the phishers use the same proxies source, make enough invalid login attempts to the actual service to get the proxies IP blocked so they can’t use them to test the large number of invalid logins to find if any are valid.
I can tell when I’m being phished if my password works on the first try
Step 1: find phishing site
Step 2: find/write brute force script that doesn’t stop on successful login but has longer random delay between attempts (so it isn’t obvious it’s a form of a DOS attack)
Step 3: poison phishing site data
Use proxies from areas that would normally use the service the phishing site is mimicking.
Bonus step: in case the phishers use the same proxies source, make enough invalid login attempts to the actual service to get the proxies IP blocked so they can’t use them to test the large number of invalid logins to find if any are valid.
I want to do this now…
Ok, that’s pretty funny. Nicely done