Skip to content

0x01369/Social-Engineering

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Social Engineering

The Poisoned Page method is a type of phishing attack that is used to steal login credentials for social media accounts. This method involves creating a fake login page that looks identical to the legitimate login page of a social media platform. The attacker then sends a link to this fake login page to their target, tricking them into entering their login credentials into the fake page.

Once the target enters their login information into the fake page, the attacker can then use that information to gain unauthorized access to the target's social media account. This can be used to steal sensitive information, spread malware, or impersonate the target.

The Poisoned Page method can be delivered through various methods, such as email, instant messaging, or social engineering. The attacker might use social engineering tactics like creating a sense of urgency or using a sense of familiarity to make the target more likely to click on the link.

To prevent falling victim to a Poisoned Page attack, it's essential to be cautious of unsolicited links and emails, even if they seem to come from a trusted source. It's also important to never enter login information into a page that is not the official login page of a social media platform and to check the URL of the website to ensure it's the correct one. Additionally, it's highly recommended to use a password manager to generate and store random and unique passwords for each account, and also to enable two-factor authentication (2FA) wherever possible.

A Site That Works With The Same Logic: https://beeceptor.com/

https://www.social-engineer.org/wp-content/uploads/2014/06/se.com-2013-logo-vector-digip-remake-dark.png

https://miro.medium.com/max/700/1*JcbVHQqtXl9wf6SjMG5HqA.png

Releases

No releases published

Packages

No packages published

Languages