BITB-Phishing

BITB

Browser In The Browser (BITB) attack is a sophisticated phishing and hard to detect.

BITB là hình thức giả mạo trang web phishing nhưng ngay trong trình duyệt pacman tinh vi hơn kết hợp giữa Man-in-the-middle và phishing in browser

Goto:

👉 MacOS-Chrome-DarkMode

👉 MacOS-Chrome-LightMode

👉 Windows-Chrome-DarkMode

👉 Windows-Chrome-LightMode

Usage

Each folder has a script.js file, the beginning of the file has some parameters you can change:

Demo

Demo

To Do list

If you can, feel free to contribute, thanks!

Moreover, you can also contribute ideas to To Do list

Bonus: you can also contribute more to my fake google login demo repo!

Detecting Color Preference

To get the most out of this you should determine the OS from the user agent and the color preference and display the appropriate template.

To find out if you should use dark or light templates check out: https://stackoverflow.com/questions/50840168/how-to-detect-if-the-os-is-in-dark-mode-in-browsers

Detecting BITB

Dragging the Window

One way of detecting BITB is by attempting to drag the window to the edge of the browser. If the window cannot escape the browser then it’s not a real window.

Browser Extension

@odacavo released a great browser extension that can detect and warn users about embedded iframes. It’s available here: https://github.com/odacavo/enhanced-iframe-protection

All credits go to @odacavo.

Disclaimer

Usage of these templates for attacking targets without prior consent is illegal. It’s the end user’s responsibility to obey all applicable laws. The developer is not responsible for any misuse of these templates.