• Buddahriffic@lemmy.world
    link
    fedilink
    arrow-up
    3
    ·
    23 hours ago

    Step 1: find phishing site
    Step 2: find/write brute force script that doesn’t stop on successful login but has longer random delay between attempts (so it isn’t obvious it’s a form of a DOS attack)
    Step 3: poison phishing site data

    Use proxies from areas that would normally use the service the phishing site is mimicking.

    Bonus step: in case the phishers use the same proxies source, make enough invalid login attempts to the actual service to get the proxies IP blocked so they can’t use them to test the large number of invalid logins to find if any are valid.