Contents:
Step 1 (Finding hosts)
Step 2 (Getting logs)
Step 3 (Other way to get logs)
Step 4 Check the quality
Step 5 Enjoy and share
Step 1
You need a list of hosters phishers use. Search for free hosts which allow php. In this tutorial I will be using ripway.com, which is used a lot by phishers.
Step 2
Getting logs.
Choose a site from the list made in step one. Go to google and search for:
Code:
site:ripway.com filetype:txt
Now the results will show .txt files on that hoster. Go throug the sesults and you will find phishers soon. Open them and save them. Congratulations, you stole a phisher!
Step 3
However most of the time the hoster will have shut down the phisher. There is a nice trick for this. Just use googles cache. I love the cache <3!>
Step 4
You need to check the quality. For this you can randomly choose accounts and try them. But a better method are account checkers. You insert your list there and that program checks all of them for you. Let them check, and save the accounts that work.
Step 5
Have Fun with this information
Thursday, July 16, 2009
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment