Browser in the Browser (BITB) Phishing Technique - Created by mr.d0x

Поделиться
HTML-код
  • Опубликовано: 19 авг 2024

Комментарии • 115

  • @dashcamdiariessa
    @dashcamdiariessa 2 года назад +17

    This is scary real, and it can be modified so much that the average person, maybe even some people like us wouldn’t even know the difference.
    The scariest one I have come across is a redirect that takes you to your already signed in page, hijacks the cookie session with Microsoft oauth and sends it back to the CNC

    • @beamboyz4901
      @beamboyz4901 2 года назад

      People have been making crypto scam pages and using the turtwalet pop up to steal your info its crazy cheat to buy the pages not just one all of the top 100 company in crypto pack is being sold for 200 USD en

    • @mohamedsantuur9794
      @mohamedsantuur9794 Год назад

      Ab

  • @phionababirye1494
    @phionababirye1494 2 года назад +5

    I saw it on Twitter but I just wanted a clear demo and this is it, brilliant technique

  • @alfredoneves3976
    @alfredoneves3976 2 года назад +1

    very cool, normally the url tells the target that the page is fake but this can work better

  • @j.harbers
    @j.harbers 2 года назад +2

    I think I'm witnessing a phishing revolution here. I am an ICT student and as a part-time job I help the elderly with their computers. I think I should start warning them about this technique... We're going to see this a lot in the future, because I don't see a very simple way how to patch this.

    • @Ken.-
      @Ken.- 2 года назад

      Euthanasia

    • @j.harbers
      @j.harbers 2 года назад

      @@Ken.- the elderly or me 😂

  • @arooobine
    @arooobine 2 года назад +24

    So if I understand correctly, the way to detect this is to check if you can drag the OAuth window outside of the parent window. If you can't, it's a fake window. Correct?

    • @jesjames
      @jesjames 2 года назад +6

      Correct. It's a simple DIV container that looks like a new browser window. So, as you correctly understood, you can't drag this login popup on a second monitor.

    • @InfiniteLogins
      @InfiniteLogins  2 года назад +3

      That's a pretty quick check that it simple enough to train!

    • @billspaced
      @billspaced 2 года назад +3

      @@InfiniteLogins How about don't ever log into a site like "canva" using credentials from another (way more important) site?

    • @mariad6519
      @mariad6519 6 месяцев назад +1

      @@jesjames
      Well, most of us don't have a second monitor... How do we recognize it? That wasn't actually addressed in the entire video, either... In fact, I've already wasted my time watching a few videos on this topic and they're all useless.

    • @jesjames
      @jesjames 6 месяцев назад +1

      @@mariad6519 I said second monitor to explain the test you could do. On a single monitor you just have to reduce the main browser window and you shouldn't be able to drag it out of that

  • @SierraSierraFoxtrot
    @SierraSierraFoxtrot 2 года назад +1

    I can't believe no one has thought of this before!

    • @InfiniteLogins
      @InfiniteLogins  2 года назад

      I'm sure others have. This is the first I've seen though

  • @NateClay
    @NateClay Год назад +3

    This is why I always go to the direct company website, never opening email links or messages from anywhere else.

  • @Danny-we4vz
    @Danny-we4vz Год назад +1

    I experienced this over a year ago from a phishing site pretending to be Steam with fake popup logins, I found it pretty amusing as someone must have put into a lot of effort to mimic the frontend.

  • @ps-ib6ct
    @ps-ib6ct 2 года назад +2

    While reading the article on arstech i actually had to think a moment whats the vector of attack here, i mean this is so simple and seamless and yet very effective

    • @InfiniteLogins
      @InfiniteLogins  2 года назад +1

      Super simple. That's what makes this so cool! But scary..

  • @dusansedlacik5864
    @dusansedlacik5864 2 года назад +2

    All you have to do is advise users to try pulling a "pop-up" out of the browser ...

  • @billyjbryant
    @billyjbryant 2 года назад +1

    Brilliant technique, thanks for doing the video demonstrating it in action. Great work.

  • @dawnS33ker
    @dawnS33ker Год назад

    I would love to see a video on setting up a phishing website. That would be awesome.

  • @-jamiestorch-4562
    @-jamiestorch-4562 2 года назад

    Hi there.This is pretty cool phish.Almost anyone would be fooled and phished by this.I would like to see more stuff like this and gophish.

  • @nazir309
    @nazir309 2 года назад +5

    One way to be safe is to always provide wrong password in first try - if wrong password is verified successfully, it means it's not a genuine website. And why not make a habit to always enter wrong user name and password on first try.

    • @cybersec0x004
      @cybersec0x004 2 года назад +1

      Yep, that's a good point but for this particular reason, I came up with an idea of using python on the backend to verify the credentials when victim submits the form. This even bypasses 2FA because you can just prompt the user to verify this login hoping he doesn't check the location of login attempt. This way submiting wrong credentials wouldn't work. I think password managers with autofill could help alot.

    • @InfiniteLogins
      @InfiniteLogins  2 года назад +1

      Users may still copy/paste their password in if they think the password management extension doesn't work on the pop-up window.. but I like the way you think!

    • @cybersec0x004
      @cybersec0x004 2 года назад

      ​@@InfiniteLogins Yep, the password manager should in that case tell them, that the URL is different and that it may be dangerous to fill in the data. I already have part of that idea implemented. I used javascript to send credentials to python flask API. Python then inputs the data to facebook login page using selenium and sends the result back to victims browser. It works, but it takes like 3 seconds each time you pass in the data because of the whole selenium login process.

    • @getadvicefromsara3164
      @getadvicefromsara3164 2 года назад

      @@cybersec0x004 hello bro which python script you use in backend ..?

    • @cybersec0x004
      @cybersec0x004 2 года назад

      @@getadvicefromsara3164 I wrote my own.

  • @mohamedmahmoudkeddamadi5355
    @mohamedmahmoudkeddamadi5355 2 года назад +1

    The only solution is just to copy each time the link of the popup and paste it and open it in the browser to see if it is valid or not, stay safe.

  • @mephs-l2
    @mephs-l2 5 месяцев назад

    3:33 that was exactly the purpose of my click, ngl
    using it for evil is another thing, but I wanted to know how to do it...

  • @saibrin1283
    @saibrin1283 2 года назад +2

    I think if the Page will accept any value in this case we know if its fake or not

    • @InfiniteLogins
      @InfiniteLogins  2 года назад

      Good point. Some phishing sites I've seen will actually always say "incorrect password" in hopes to get you to try entering other passwords you use.

  • @chrismagistrado6014
    @chrismagistrado6014 2 года назад +1

    Amazing! Great technique! Thanks for sharing via a video!

  • @tagggg
    @tagggg 2 года назад +5

    Scary. Does this attack trick password managers like LastPass as well?

    • @Skyler827
      @Skyler827 2 года назад +11

      It won't fool the automatic form-filling functionality because those are tied to the actual page URL, but it will fool users who aren't using the autofill forms.

    • @InfiniteLogins
      @InfiniteLogins  2 года назад

      Exactly!

  • @houdammari9809
    @houdammari9809 2 года назад +2

    Imagine This With Autofill 🤯

  • @yss1978
    @yss1978 2 года назад +2

    Waooo, impressive. But how anybody can prove if the login page is original with this new way of pishing? 🤔

    • @techademy9354
      @techademy9354 2 года назад +15

      In a real page, the new page is an actual window that can be dragged even outside the current browser window. The fake one is just an Iframe, u cant drag it outside

  • @skybreaker022
    @skybreaker022 2 года назад +1

    Great video and informative ! Thanks 👍

  • @johnwatts8900
    @johnwatts8900 2 года назад +1

    Hey.. Thx alot for the great content. Just stumbled across your channel and subbed 🙂 Like the sound of your keyboard. What keyboard is it, and what keys is on it. Thx again for the content.

    • @InfiniteLogins
      @InfiniteLogins  2 года назад

      It's just a basic clicky keyboard. I think brand is "bloody"

  • @ClipCentralUnbleeped
    @ClipCentralUnbleeped 2 года назад +1

    The issue for most users will be they will not be familiar with the tools needed to identify this type of attack. This is going to wreak havoc on a lot of people. Unless this can be patched out or existence with some sort of link validation or check, this is going to change the game for bad actors.

    • @InfiniteLogins
      @InfiniteLogins  2 года назад

      User awareness needs to evolve as hackers do.

  • @devids8033
    @devids8033 2 года назад

    It shows a blank page if used on mobile phone, only displays on PC

  • @LEADER0FY0U
    @LEADER0FY0U 2 года назад

    Seen this in the wild a handful of times. The obvious solution for me is to stop google and such sites prompt to log in, in a popup browser and instead handle it on their main page where you connect applications instead.
    I think this will be solved as well by the 'passwordless' system microsoft and the likes were working on.

  • @jminormedia1025
    @jminormedia1025 2 года назад

    😳 This is worrisome!!

  • @cussonspride7514
    @cussonspride7514 Год назад

    Thanks for the share

  • @jpdemer5
    @jpdemer5 2 года назад +1

    Anything the browser creators (Mozilla, MS, Apple) can do to detect this, and disable it or warn the user?

    • @InfiniteLogins
      @InfiniteLogins  2 года назад

      I don't think so.. It's common for sites to use s for legitimate purposes, so it would be a hard thing to expect the browser to be able to tell the difference.

  • @vinaygowda3562
    @vinaygowda3562 2 года назад

    Hi Team
    could you please share the report for this Browser in the Browser (BITB) Phishing Technique

  • @sudosupsudo1528
    @sudosupsudo1528 Год назад

    Similar to beef-xss petty theft no?

  • @kirillitvinenko355
    @kirillitvinenko355 Год назад

    So scary this method....it works only on PC, right? On mobile phones we are safe?

  • @prantarkhisa7319
    @prantarkhisa7319 Год назад

    It's not working for 2fa

  • @lauraconrad7543
    @lauraconrad7543 2 года назад +1

    Could you do a video to show what we could look for in developer mode to detect this? Also could you explain Kellen Green's comments: If the IDP added "Header set X-Frame-Options DENY", I believe this could be prevented.

    • @mitchy1990s
      @mitchy1990s 2 года назад +2

      could you not just make sure the parent browser window is not fullscreen, then attempt to drag the login pop-up outside of the boundaries of the parent window. a normal authentic window would be on top and free to move to any bounds. a fake phishing pop-up is contained and locked inside the boundaries of the parent browser. no?

    • @sapito169
      @sapito169 2 года назад

      It is css heder wont fire and wont work

    • @InfiniteLogins
      @InfiniteLogins  2 года назад +1

      The X-FRAME-OPTIONS header being set can prevent a site from being called via s, but that header would need to be set on the phishing site that the attacker already controls.. and they hacker wouldn't set that lol.
      For example, trying to google.com doesn't work, because they have that header set. But I could spin up my own phishing site for Google without the header, and then display it within an .

    • @MondayAbigail-zo8sz
      @MondayAbigail-zo8sz Год назад

      Can you teach me how to build a phishing page

  • @kgreen
    @kgreen 2 года назад

    If the IDP added "Header set X-Frame-Options DENY", I believe this could be prevented.

    • @billyjbryant
      @billyjbryant 2 года назад +2

      He isn't loading the IDP's real page. This is a phishing page, made to look like the real thing down to impersonating the browser address bar. The IDP would not be able to protect you from this.

    • @kgreen
      @kgreen 2 года назад

      @@billyjbryant Ooh gotcha we're not even hitting the real IDP.

    • @InfiniteLogins
      @InfiniteLogins  2 года назад +1

      The X-FRAME-OPTIONS header being set can prevent a site from being called via s, but that header would need to be set on the phishing site that the attacker already controls.. and they hacker wouldn't set that lol.
      For example, trying to google.com doesn't work, because they have that header set. But I could spin up my own phishing site for Google without the header, and then display it within an .

  • @bm5522
    @bm5522 2 года назад

    I see the comments about dragging around the other screen to see if it's fake or not but what happens if you did this on a mobile phone

    • @kwalm7536
      @kwalm7536 2 года назад +1

      It wouldn't make as much sense on mobile because the windows are skinned for macOS or Windows

    • @bm5522
      @bm5522 2 года назад

      I mean I guess that makes some sense but still can't help but wonder if I went to one of the websites If it would still function the same

    • @InfiniteLogins
      @InfiniteLogins  2 года назад

      Mobile is a good question. The genius behind this is that anybody can make additional templates, have the site check user agent values, and then display the appropriate template back. I bet a mobile friendly one could be created

  • @startide
    @startide 2 года назад +1

    Time to teach people to click the lock icon to check if it's legit... but yeah that's a nastly little trick.

    • @Kyuubi840
      @Kyuubi840 2 года назад +3

      And even then, the page can fake the little floating window that Chrome and Firefox open when you do that, and they can fake the info inside it. They can't fake the popup once you click to view the certificate details though, I guess

    • @InfiniteLogins
      @InfiniteLogins  2 года назад +1

      That's a good idea!

  • @saniahlam8466
    @saniahlam8466 2 года назад

    Hi ! how to send index.html file in email link after editing ?

  • @arffdhlullah4869
    @arffdhlullah4869 2 года назад

    hi ! so this BITB site login page link if we want to get some cred information, the way to exploit it is require to send the link to victims through email or any medias ? not popped up on the real website. isnt it ?

    • @arffdhlullah4869
      @arffdhlullah4869 2 года назад

      and if it can be popped up on the real website, how we can identify this type attack ? whats the difference from real login page popped up ?

    • @InfiniteLogins
      @InfiniteLogins  2 года назад +2

      Yup, the victim would have to be tricked first into going to a fake site. The URL of the fake site would be the victims red flag to notice something is wrong.

  • @Sindromo
    @Sindromo 2 года назад

    This isnt anything new, i've seen method like this long time ago with steam scammers where they link you to a site with "login with steam" option

    • @InfiniteLogins
      @InfiniteLogins  2 года назад

      Nice! It was new to me so I figured I'd share.

  • @Goexotic_intl
    @Goexotic_intl 2 года назад

    This will still show your url that point to the bitb template so this is a dumb phishing

  • @Ken.-
    @Ken.- 2 года назад +2

    Doesn't seem like much of a useful attack. If you didn't notice that you are on a phishing site to begin with, then making anything look real after that won't matter since the only people falling for this already aren't looking at the URL anyway.
    It's like worrying about deep fakes. You don't need a sophisticated attack for unsophisticated people.

    • @ErikRoberts1981
      @ErikRoberts1981 2 года назад +3

      Don't forget, a lot of mail filtering services obfuscate the email addresses. So on a well constructed email that can pass the filter it can still fool those wanting to check the URL.

    • @Ken.-
      @Ken.- 2 года назад

      @@ErikRoberts1981 But you still have to go there before you can see the second "real" looking one.

    • @ErikRoberts1981
      @ErikRoberts1981 2 года назад +5

      @@Ken.- Sure, but for it to work you want to send them to a legit site (that you own) offering some kind of service that they want. Because you own the domain and if you get the SSL cert for it, it looks legit.
      It's the part where you ask them to log on or create an account that this window pops up.

    • @InfiniteLogins
      @InfiniteLogins  2 года назад +2

      Erik has some solid points here.

  • @sapito169
    @sapito169 2 года назад +1

    Lol Now we Will teach user to use inpect opción 🤣🤣🤣

  • @xcorrupter6698
    @xcorrupter6698 2 года назад

    Can you please make a video on how to setup a phishing page

    • @sleekbr7666
      @sleekbr7666 2 года назад +9

      Your name suggests you're not upto something good.

    • @sleekbr7666
      @sleekbr7666 2 года назад

      @Vintage B He's a crazy noob.

    • @getadvicefromsara3164
      @getadvicefromsara3164 2 года назад

      @@sleekbr7666 me too would you help out plzzzzz

  • @waelmas
    @waelmas 5 месяцев назад

    How To: Evilginx + BITB | Browser In The Browser without s in 2024
    ruclips.net/video/luJjxpEwVHI/видео.html
    Just released this new version that makes this work with Evilginx to bypass MFA. This version does not use any s, meaning it completely bypasses framebusters 🤞
    (Not trying to self promote under this video, but saw a lot of traffic coming from it to my video and thought I’d leave this comment that might be helpful)

  • @dickteteak136
    @dickteteak136 2 года назад

    🍀 𝐩𝓻Ỗ𝓂Ø𝓈M