Browser in the Browser (BITB) Phishing Technique - Created by mr.d0x

As cybersecurity professionals, we constantly educate users to review the URL before interacting with a website. This Browser in the Browser technique created by mr.d0x is one way that this advice can be abused and used against us.
Disclaimer: This content is intended to be consumed by cyber security professionals, ethical hackers, and penetration testers. Any attacks performed in this video should only be performed in environments that you control or have explicit permission to perform them on.
00:00 - Intro
01:00 - Explaining BITB
02:45 - Initial Landing Page
04:40 - Performing BITB
08:50 - Final Thoughts
👇 SUBSCRIBE TO INFINITELOGINS KZread CHANNEL NOW 👇
kzread.info...
Blog post mentioned in video:
mrd0x.com/browser-in-the-brow...
mr.d0x's Twitter:
/ mrd0x
___________________________________________
Social Media:
Website: infinitelogins.com/
Twitter: / infinitelogins
Twitch: / infinitelogins
___________________________________________
Donations and Support:
Like my content? Please consider supporting me on Patreon:
/ infinitelogins
Purchase a VPN Using my Affiliate Link
www.privateinternetaccess.com...
___________________________________________
Tags: #CyberSecurity #Phishing #UserAwarenessTraining

Пікірлер: 115

  • @phionababirye1494
    @phionababirye14942 жыл бұрын

    I saw it on Twitter but I just wanted a clear demo and this is it, brilliant technique

  • @dashcamdiariessa
    @dashcamdiariessa2 жыл бұрын

    This is scary real, and it can be modified so much that the average person, maybe even some people like us wouldn’t even know the difference. The scariest one I have come across is a redirect that takes you to your already signed in page, hijacks the cookie session with Microsoft oauth and sends it back to the CNC

  • @beamboyz4901

    @beamboyz4901

    2 жыл бұрын

    People have been making crypto scam pages and using the turtwalet pop up to steal your info its crazy cheat to buy the pages not just one all of the top 100 company in crypto pack is being sold for 200 USD en

  • @mohamedsantuur9794

    @mohamedsantuur9794

    Жыл бұрын

    Ab

  • @alfredoneves3976
    @alfredoneves39762 жыл бұрын

    very cool, normally the url tells the target that the page is fake but this can work better

  • @-jamiestorch-4562
    @-jamiestorch-45622 жыл бұрын

    Hi there.This is pretty cool phish.Almost anyone would be fooled and phished by this.I would like to see more stuff like this and gophish.

  • @billyjbryant
    @billyjbryant2 жыл бұрын

    Brilliant technique, thanks for doing the video demonstrating it in action. Great work.

  • @InfiniteLogins

    @InfiniteLogins

    2 жыл бұрын

    I appreciate you 🙏

  • @dawnS33ker
    @dawnS33ker Жыл бұрын

    I would love to see a video on setting up a phishing website. That would be awesome.

  • @chrismagistrado6014
    @chrismagistrado60142 жыл бұрын

    Amazing! Great technique! Thanks for sharing via a video!

  • @InfiniteLogins

    @InfiniteLogins

    2 жыл бұрын

    I appreciate you 🙏

  • @skybreaker022
    @skybreaker0222 жыл бұрын

    Great video and informative ! Thanks 👍

  • @InfiniteLogins

    @InfiniteLogins

    2 жыл бұрын

    Thank you!

  • @NateClay
    @NateClay Жыл бұрын

    This is why I always go to the direct company website, never opening email links or messages from anywhere else.

  • @jminormedia1025
    @jminormedia10252 жыл бұрын

    😳 This is worrisome!!

  • @cussonspride7514
    @cussonspride7514 Жыл бұрын

    Thanks for the share

  • @arooobine
    @arooobine2 жыл бұрын

    So if I understand correctly, the way to detect this is to check if you can drag the OAuth window outside of the parent window. If you can't, it's a fake window. Correct?

  • @jesjames

    @jesjames

    2 жыл бұрын

    Correct. It's a simple DIV container that looks like a new browser window. So, as you correctly understood, you can't drag this login popup on a second monitor.

  • @InfiniteLogins

    @InfiniteLogins

    2 жыл бұрын

    That's a pretty quick check that it simple enough to train!

  • @billspaced

    @billspaced

    2 жыл бұрын

    @@InfiniteLogins How about don't ever log into a site like "canva" using credentials from another (way more important) site?

  • @mariad6519

    @mariad6519

    5 ай бұрын

    @@jesjames Well, most of us don't have a second monitor... How do we recognize it? That wasn't actually addressed in the entire video, either... In fact, I've already wasted my time watching a few videos on this topic and they're all useless.

  • @jesjames

    @jesjames

    5 ай бұрын

    @@mariad6519 I said second monitor to explain the test you could do. On a single monitor you just have to reduce the main browser window and you shouldn't be able to drag it out of that

  • @Danny-we4vz
    @Danny-we4vz Жыл бұрын

    I experienced this over a year ago from a phishing site pretending to be Steam with fake popup logins, I found it pretty amusing as someone must have put into a lot of effort to mimic the frontend.

  • @j.harbers
    @j.harbers2 жыл бұрын

    I think I'm witnessing a phishing revolution here. I am an ICT student and as a part-time job I help the elderly with their computers. I think I should start warning them about this technique... We're going to see this a lot in the future, because I don't see a very simple way how to patch this.

  • @Ken.-

    @Ken.-

    2 жыл бұрын

    Euthanasia

  • @j.harbers

    @j.harbers

    2 жыл бұрын

    @@Ken.- the elderly or me 😂

  • @SierraSierraFoxtrot
    @SierraSierraFoxtrot2 жыл бұрын

    I can't believe no one has thought of this before!

  • @InfiniteLogins

    @InfiniteLogins

    2 жыл бұрын

    I'm sure others have. This is the first I've seen though

  • @ps-ib6ct
    @ps-ib6ct2 жыл бұрын

    While reading the article on arstech i actually had to think a moment whats the vector of attack here, i mean this is so simple and seamless and yet very effective

  • @InfiniteLogins

    @InfiniteLogins

    2 жыл бұрын

    Super simple. That's what makes this so cool! But scary..

  • @johnwatts8900
    @johnwatts89002 жыл бұрын

    Hey.. Thx alot for the great content. Just stumbled across your channel and subbed 🙂 Like the sound of your keyboard. What keyboard is it, and what keys is on it. Thx again for the content.

  • @InfiniteLogins

    @InfiniteLogins

    2 жыл бұрын

    It's just a basic clicky keyboard. I think brand is "bloody"

  • @neverlookbackwilly
    @neverlookbackwilly4 ай бұрын

    3:33 that was exactly the purpose of my click, ngl using it for evil is another thing, but I wanted to know how to do it...

  • @dusansedlacik5864
    @dusansedlacik58642 жыл бұрын

    All you have to do is advise users to try pulling a "pop-up" out of the browser ...

  • @InfiniteLogins

    @InfiniteLogins

    2 жыл бұрын

    Good advice!

  • @devids8033
    @devids80332 жыл бұрын

    It shows a blank page if used on mobile phone, only displays on PC

  • @houdammari9809
    @houdammari98092 жыл бұрын

    Imagine This With Autofill 🤯

  • @mohamedmahmoudkeddamadi5355
    @mohamedmahmoudkeddamadi53552 жыл бұрын

    The only solution is just to copy each time the link of the popup and paste it and open it in the browser to see if it is valid or not, stay safe.

  • @vinaygowda3562
    @vinaygowda35622 жыл бұрын

    Hi Team could you please share the report for this Browser in the Browser (BITB) Phishing Technique

  • @saibrin1283
    @saibrin12832 жыл бұрын

    I think if the Page will accept any value in this case we know if its fake or not

  • @InfiniteLogins

    @InfiniteLogins

    2 жыл бұрын

    Good point. Some phishing sites I've seen will actually always say "incorrect password" in hopes to get you to try entering other passwords you use.

  • @nazir309
    @nazir3092 жыл бұрын

    One way to be safe is to always provide wrong password in first try - if wrong password is verified successfully, it means it's not a genuine website. And why not make a habit to always enter wrong user name and password on first try.

  • @cybersec0x004

    @cybersec0x004

    2 жыл бұрын

    Yep, that's a good point but for this particular reason, I came up with an idea of using python on the backend to verify the credentials when victim submits the form. This even bypasses 2FA because you can just prompt the user to verify this login hoping he doesn't check the location of login attempt. This way submiting wrong credentials wouldn't work. I think password managers with autofill could help alot.

  • @InfiniteLogins

    @InfiniteLogins

    2 жыл бұрын

    Users may still copy/paste their password in if they think the password management extension doesn't work on the pop-up window.. but I like the way you think!

  • @cybersec0x004

    @cybersec0x004

    2 жыл бұрын

    ​@@InfiniteLogins Yep, the password manager should in that case tell them, that the URL is different and that it may be dangerous to fill in the data. I already have part of that idea implemented. I used javascript to send credentials to python flask API. Python then inputs the data to facebook login page using selenium and sends the result back to victims browser. It works, but it takes like 3 seconds each time you pass in the data because of the whole selenium login process.

  • @getadvicefromsara3164

    @getadvicefromsara3164

    2 жыл бұрын

    @@cybersec0x004 hello bro which python script you use in backend ..?

  • @cybersec0x004

    @cybersec0x004

    2 жыл бұрын

    @@getadvicefromsara3164 I wrote my own.

  • @tagggg
    @tagggg2 жыл бұрын

    Scary. Does this attack trick password managers like LastPass as well?

  • @Skyler827

    @Skyler827

    2 жыл бұрын

    It won't fool the automatic form-filling functionality because those are tied to the actual page URL, but it will fool users who aren't using the autofill forms.

  • @InfiniteLogins

    @InfiniteLogins

    2 жыл бұрын

    Exactly!

  • @jpdemer5
    @jpdemer52 жыл бұрын

    Anything the browser creators (Mozilla, MS, Apple) can do to detect this, and disable it or warn the user?

  • @InfiniteLogins

    @InfiniteLogins

    2 жыл бұрын

    I don't think so.. It's common for sites to use s for legitimate purposes, so it would be a hard thing to expect the browser to be able to tell the difference.

  • @ClipCentralUnbleeped
    @ClipCentralUnbleeped2 жыл бұрын

    The issue for most users will be they will not be familiar with the tools needed to identify this type of attack. This is going to wreak havoc on a lot of people. Unless this can be patched out or existence with some sort of link validation or check, this is going to change the game for bad actors.

  • @InfiniteLogins

    @InfiniteLogins

    2 жыл бұрын

    User awareness needs to evolve as hackers do.

  • @lauraconrad7543
    @lauraconrad75432 жыл бұрын

    Could you do a video to show what we could look for in developer mode to detect this? Also could you explain Kellen Green's comments: If the IDP added "Header set X-Frame-Options DENY", I believe this could be prevented.

  • @mitchy1990s

    @mitchy1990s

    2 жыл бұрын

    could you not just make sure the parent browser window is not fullscreen, then attempt to drag the login pop-up outside of the boundaries of the parent window. a normal authentic window would be on top and free to move to any bounds. a fake phishing pop-up is contained and locked inside the boundaries of the parent browser. no?

  • @sapito169

    @sapito169

    2 жыл бұрын

    It is css heder wont fire and wont work

  • @InfiniteLogins

    @InfiniteLogins

    2 жыл бұрын

    The X-FRAME-OPTIONS header being set can prevent a site from being called via s, but that header would need to be set on the phishing site that the attacker already controls.. and they hacker wouldn't set that lol. For example, trying to google.com doesn't work, because they have that header set. But I could spin up my own phishing site for Google without the header, and then display it within an .

  • @MondayAbigail-zo8sz

    @MondayAbigail-zo8sz

    Жыл бұрын

    Can you teach me how to build a phishing page

  • @LEADER0FY0U
    @LEADER0FY0U2 жыл бұрын

    Seen this in the wild a handful of times. The obvious solution for me is to stop google and such sites prompt to log in, in a popup browser and instead handle it on their main page where you connect applications instead. I think this will be solved as well by the 'passwordless' system microsoft and the likes were working on.

  • @arffdhlullah4869
    @arffdhlullah48692 жыл бұрын

    hi ! so this BITB site login page link if we want to get some cred information, the way to exploit it is require to send the link to victims through email or any medias ? not popped up on the real website. isnt it ?

  • @arffdhlullah4869

    @arffdhlullah4869

    2 жыл бұрын

    and if it can be popped up on the real website, how we can identify this type attack ? whats the difference from real login page popped up ?

  • @InfiniteLogins

    @InfiniteLogins

    2 жыл бұрын

    Yup, the victim would have to be tricked first into going to a fake site. The URL of the fake site would be the victims red flag to notice something is wrong.

  • @yss1978
    @yss19782 жыл бұрын

    Waooo, impressive. But how anybody can prove if the login page is original with this new way of pishing? 🤔

  • @techademy9354

    @techademy9354

    2 жыл бұрын

    In a real page, the new page is an actual window that can be dragged even outside the current browser window. The fake one is just an Iframe, u cant drag it outside

  • @saniahlam8466
    @saniahlam84662 жыл бұрын

    Hi ! how to send index.html file in email link after editing ?

  • @InfiniteLogins

    @InfiniteLogins

    2 жыл бұрын

    🤷‍♂️

  • @prantarkhisa7319
    @prantarkhisa7319 Жыл бұрын

    It's not working for 2fa

  • @kgreen
    @kgreen2 жыл бұрын

    If the IDP added "Header set X-Frame-Options DENY", I believe this could be prevented.

  • @billyjbryant

    @billyjbryant

    2 жыл бұрын

    He isn't loading the IDP's real page. This is a phishing page, made to look like the real thing down to impersonating the browser address bar. The IDP would not be able to protect you from this.

  • @kgreen

    @kgreen

    2 жыл бұрын

    @@billyjbryant Ooh gotcha we're not even hitting the real IDP.

  • @InfiniteLogins

    @InfiniteLogins

    2 жыл бұрын

    The X-FRAME-OPTIONS header being set can prevent a site from being called via s, but that header would need to be set on the phishing site that the attacker already controls.. and they hacker wouldn't set that lol. For example, trying to google.com doesn't work, because they have that header set. But I could spin up my own phishing site for Google without the header, and then display it within an .

  • @bm5522
    @bm55222 жыл бұрын

    I see the comments about dragging around the other screen to see if it's fake or not but what happens if you did this on a mobile phone

  • @kwalm7536

    @kwalm7536

    2 жыл бұрын

    It wouldn't make as much sense on mobile because the windows are skinned for macOS or Windows

  • @bm5522

    @bm5522

    2 жыл бұрын

    I mean I guess that makes some sense but still can't help but wonder if I went to one of the websites If it would still function the same

  • @InfiniteLogins

    @InfiniteLogins

    2 жыл бұрын

    Mobile is a good question. The genius behind this is that anybody can make additional templates, have the site check user agent values, and then display the appropriate template back. I bet a mobile friendly one could be created

  • @sudosupsudo1528
    @sudosupsudo1528 Жыл бұрын

    Similar to beef-xss petty theft no?

  • @kirillitvinenko355
    @kirillitvinenko355 Жыл бұрын

    So scary this method....it works only on PC, right? On mobile phones we are safe?

  • @Sindromo
    @Sindromo2 жыл бұрын

    This isnt anything new, i've seen method like this long time ago with steam scammers where they link you to a site with "login with steam" option

  • @InfiniteLogins

    @InfiniteLogins

    2 жыл бұрын

    Nice! It was new to me so I figured I'd share.

  • @startide
    @startide2 жыл бұрын

    Time to teach people to click the lock icon to check if it's legit... but yeah that's a nastly little trick.

  • @Kyuubi840

    @Kyuubi840

    2 жыл бұрын

    And even then, the page can fake the little floating window that Chrome and Firefox open when you do that, and they can fake the info inside it. They can't fake the popup once you click to view the certificate details though, I guess

  • @InfiniteLogins

    @InfiniteLogins

    2 жыл бұрын

    That's a good idea!

  • @Goexotic_intl
    @Goexotic_intl2 жыл бұрын

    This will still show your url that point to the bitb template so this is a dumb phishing

  • @sapito169
    @sapito1692 жыл бұрын

    Lol Now we Will teach user to use inpect opción 🤣🤣🤣

  • @InfiniteLogins

    @InfiniteLogins

    2 жыл бұрын

    😂

  • @Ken.-
    @Ken.-2 жыл бұрын

    Doesn't seem like much of a useful attack. If you didn't notice that you are on a phishing site to begin with, then making anything look real after that won't matter since the only people falling for this already aren't looking at the URL anyway. It's like worrying about deep fakes. You don't need a sophisticated attack for unsophisticated people.

  • @ErikRoberts1981

    @ErikRoberts1981

    2 жыл бұрын

    Don't forget, a lot of mail filtering services obfuscate the email addresses. So on a well constructed email that can pass the filter it can still fool those wanting to check the URL.

  • @Ken.-

    @Ken.-

    2 жыл бұрын

    @@ErikRoberts1981 But you still have to go there before you can see the second "real" looking one.

  • @ErikRoberts1981

    @ErikRoberts1981

    2 жыл бұрын

    @@Ken.- Sure, but for it to work you want to send them to a legit site (that you own) offering some kind of service that they want. Because you own the domain and if you get the SSL cert for it, it looks legit. It's the part where you ask them to log on or create an account that this window pops up.

  • @InfiniteLogins

    @InfiniteLogins

    2 жыл бұрын

    Erik has some solid points here.

  • @xcorrupter6698
    @xcorrupter66982 жыл бұрын

    Can you please make a video on how to setup a phishing page

  • @sleekbr7666

    @sleekbr7666

    2 жыл бұрын

    Your name suggests you're not upto something good.

  • @sleekbr7666

    @sleekbr7666

    2 жыл бұрын

    @Vintage B He's a crazy noob.

  • @getadvicefromsara3164

    @getadvicefromsara3164

    2 жыл бұрын

    @@sleekbr7666 me too would you help out plzzzzz

  • @waelmas
    @waelmas5 ай бұрын

    How To: Evilginx + BITB | Browser In The Browser without s in 2024 kzread.info/dash/bejne/nql-zNqpddq8eKw.html Just released this new version that makes this work with Evilginx to bypass MFA. This version does not use any s, meaning it completely bypasses framebusters 🤞 (Not trying to self promote under this video, but saw a lot of traffic coming from it to my video and thought I’d leave this comment that might be helpful)

  • @dickteteak136
    @dickteteak1362 жыл бұрын

    🍀 𝐩𝓻Ỗ𝓂Ø𝓈M

Келесі