Using python to get revenge on an evil phishing website!

Sdílet
Vložit
  • čas přidán 26. 06. 2024
  • Join this channel to get access to perks:
    / @cybrzone
    this video shows how to use burpe suite to intercept post requests and then use python to flood POST requests to the malicious domain!
    Code
    github.com/CybrZone/phishkiller

Komentáře • 102

  • @CybrZone
    @CybrZone  Před 5 dny +4

    czcams.com/video/FDiLptM1pQs/video.html UPDATE

  • @s8r4
    @s8r4 Před 5 dny +55

    2 easy upgrades to make their life much harder is generating unique emails and passwords, the other one is using asynchronous requests so you can send hundreds per second instead of one by one. If they're also checking what ip the data is coming from you'd also have to diversify that, otherwise it's extremely easy to filter out all the bogus requests.

    • @pouyatoutounchy1238
      @pouyatoutounchy1238 Před 4 dny

      Will use asynchronous requests next time.

    • @adambamf9365
      @adambamf9365 Před 4 dny +6

      a large proxy pool on automatic rotation above my pay grade

    • @carteldebellamy677
      @carteldebellamy677 Před 2 dny

      ​@@adambamf9365 lovely idea 😂

    • @rainy2182
      @rainy2182 Před 2 dny +1

      Also, would want to make it over random periods of time, so it wouldn't be easy to just remove the recent submissions

  • @mendonca4086
    @mendonca4086 Před 6 dny +56

    Not all heroes wear capes!

  • @CybrZone
    @CybrZone  Před 6 dny +28

    I really appreciate everyone that has/is contributing to the project. There is a lot of good in the world. Old family members of mine have been frauded in the past with similar things so I take these quite personally lol.

  • @Iith_a
    @Iith_a Před 7 dny +44

    it would be perfect if you creat random emails everytime.

    • @coresnap
      @coresnap Před 6 dny +5

      Yeah, that'd be amazing. Could easily do that too. lol

    • @salim444
      @salim444 Před 6 dny +5

      and spread it into multiple days so they can't just delete it conveniently. maybe add some variations too to make it harder

    • @antagonist4823
      @antagonist4823 Před 5 dny +2

      but you know the req comes from the same ip address?

    • @chrissametrinequartz9389
      @chrissametrinequartz9389 Před 5 dny +1

      @@antagonist4823 just use a rotating proxy

    • @DutchRider
      @DutchRider Před 4 dny

      @@antagonist4823 this and same data... takes 1 query to clean the database...

  • @buddy4235
    @buddy4235 Před 5 dny +14

    Nice Video! One thing I notice is that everyone just floods forms with the same info over and over. The only problem is if they export the data into something like Microsoft Excel or Google Sheets they can very easily delete all of the data that you put in. What I would have done is created a list and have it randomly pick from a list of fake emails and passwords then submit it.

    • @eyvypee3849
      @eyvypee3849 Před 3 dny

      or iterate through a number of positions (10) to put a random letter from the alphabet + @ + again random + . + random domain.
      same for the password. have fun filtering them :D

  • @bobbyrandomguy1489
    @bobbyrandomguy1489 Před 5 dny +11

    This is BEAUTIFUL. You could also pipe your traffic through proxychains with tor configured (super ez setup) and they wouldnt be able to filter you from their traffic even if they wanted

    • @Dooneh
      @Dooneh Před 5 dny

      Do you have any pages with an easy tutorial?

    • @alphacat9663
      @alphacat9663 Před 5 dny +1

      Less likely, you'd be flooding the nodes and the traffic would be slower. He can use a spoofer tho

    • @bobbyrandomguy1489
      @bobbyrandomguy1489 Před 4 dny

      @alphacat9663 true this could possibly cause issues given tor is a bit slower than surface web. Crude solution would just be to put some time delays in. Or use non tor proxies. There big lists regularly updated on github. altho free proxies are quite slow too

    • @mestari6289
      @mestari6289 Před 2 dny

      Tor exit nodes are very easy to filter since their addresses are public information.

  • @Pablito_Dev
    @Pablito_Dev Před 6 dny +5

    this was a super fun video ! love your sense of humor and how hacking can be used for good!

  • @emptycode1782
    @emptycode1782 Před 5 dny +5

    i dont know much python but these will really help:
    1 - multi threading
    2 - generate fake email:pass into a .txt , and split each line with ":" , then you can iterate over each line and get yourself an email and password and submit the request
    3 - i doubt this goofy website will ever ban your ip , but its a possibility , in that case we can use proxies

    • @H1NTR0X1
      @H1NTR0X1 Před 20 hodinami

      Bro you can do this with python with library call faker it's generating fake data like names emails and passwords.

  • @jesusonthekeys2856
    @jesusonthekeys2856 Před 5 dny

    hey man love the video im a python lover and have seen people work on scripts like this so wanted to sit down and make a crazy one going to make a branch on your github with full credit of course love the vid keep it up :)

  • @unsuspiciousinternetuser

    just checked the github, i love where this is going hahaha nice job

  • @72FeralHogs
    @72FeralHogs Před 5 dny +2

    Just made a PR that adds dynamic user agents, async, and proxy support. Happy phishkilling

  • @store-manager-deluxe
    @store-manager-deluxe Před 3 dny +1

    What would have been better is if you randomized the email and password for each request being sent. That way the people hosting it would have had to dig through thousands of fake details to even get access to someones account. Probably would do this using TOR aswell.

  • @justsomeguy8982
    @justsomeguy8982 Před 5 dny +3

    nice work but you should have used some randomly generated emails/password as getting rid of same responses would be super easy

  • @Thuz_hd
    @Thuz_hd Před 6 dny

    I improved some parts of the script but can't publish my branch. Is it a Problem on my end or on the repo?

  • @user-du3zt7ui8f
    @user-du3zt7ui8f Před 5 dny +1

    You may also do it with multithreading (if it have some cdn anti ddos protection, make some new proxy connections each time), and as some people wrote here in the comments, generate a new password and email.

  • @whome1209
    @whome1209 Před 5 dny

    Things like Gophish attach credentials to an ip address, wouldnt you need to be changing ip address every time for this to actually be effective?

  • @mowlandproduction
    @mowlandproduction Před 4 dny +1

    You can optimize itt using Multi Threading with Threading library cuz that's builtin in python 3, that can cause much trouble to the Phisher Website, Even you can takedown that website using a DoS Script in python 3

  • @anwari.h.g7072
    @anwari.h.g7072 Před 5 dny

    Your channel may be dead, but you've won a subscriber now.❤

  • @W.RonanJohannesPaulDiii

    awesome video mate

  • @Muziek37414
    @Muziek37414 Před 3 dny

    This would be a fun project to learn python in and get some random fake user data api's in

  • @retzerR
    @retzerR Před 5 dny +3

    Improvements you could do:
    * Use a libary like faker to generate a fake email name@domain
    * Better show progress, e.g. show a count
    * Multi threading ( thx @VoltVentures )
    Apart from that cool video

    • @VoltVentures
      @VoltVentures Před 5 dny +1

      threading!!

    • @retzerR
      @retzerR Před 5 dny +1

      @@VoltVentures yeah, I forgot. Great suggestion

  • @tennesseetuned
    @tennesseetuned Před 6 dny

    I know its rate limited but could you not just send this request to intruder and load a password and username list as if you were going to brute force the login and send it? You can even tunnel Burp thought tor via proxychains. Am I wrong here? I am still learning.

  • @prodKossi
    @prodKossi Před 7 dny +4

    You would probably also need to randomize the IP's sending requests, otherwise they could also filter out responses from your network. And as you said, obviously the data submitted would have to be more realistic as well. Oh and the user-agent..
    Cool demo anyways though man 💜

    • @CybrZone
      @CybrZone  Před 7 dny

      true, this is just a basic demo anyway. Mainly showing burp suite. Hopefully this becomes a bigger project as other people are already contributing.

    • @apoorvmitthu
      @apoorvmitthu Před 7 dny

      What about the user agent? Could you please tell something about that?

    • @CybrZone
      @CybrZone  Před 7 dny

      @@apoorvmitthu they could use .htaccess file to block specific user agents.

    • @prodKossi
      @prodKossi Před 7 dny

      @@CybrZone Or just filter out all the user-agents that spammed the server with fake data too - either way its a nice demo to just teach the basic consept :)

    • @oktaviantkac1061
      @oktaviantkac1061 Před 6 dny

      @@CybrZone yes, but its not very good idea to "show" here on youtube very complex attacking codes - some people would be possible to do some bad things :) Every little bit experienced hacker will be possible to make this script more sofisticated, and add more functions!:) But yes, yours videos are very usefull and good! Keep doing it, and good luck :)

  • @pouyatoutounchy1238
    @pouyatoutounchy1238 Před 4 dny

    I had a similar one and what I did in the Python script was make the email and password random with random intervals between posting the data and also IP changes using auto IP changer. The reason was making it harder for them to delete the data from their database, assuming they used SQL-like databases. So eventually I posted so much data that they took down the whole link possibly to make a new one 😁😉

  • @lokluex3824
    @lokluex3824 Před 50 minutami

    The module faker can create fake but realistic looking emails and passwords

  • @arceas
    @arceas Před 6 dny

    You should make it add random entries, now they could filter out the duplicates

  • @CattoFace
    @CattoFace Před 5 dny

    Ive been doing something similar with the phishing links I get, but with the faker library, and usually with more fields: name,email,password, credit card,address, etc

  • @zer0k4ge
    @zer0k4ge Před 5 dny +2

    Great video! Glad to see someone using their skills for good. Just wondering if I can have your permission to make a video about this? and obviously give you credit, just added a function to generate random emails and a couple extra parameters for the different data keys. I also offered some guidance on where to find phishing links to experiment with. Let me know.

    • @CybrZone
      @CybrZone  Před 5 dny +2

      Of course, I’m doing an update video including some of this as well. Code has changed massively now thanks to everyone

  • @apoorvmitthu
    @apoorvmitthu Před 7 dny

    Can they remove the entries after a particular time, so that they can still have the access to the already phished data?

    • @emptycode1782
      @emptycode1782 Před 5 dny

      yes they can , thats why its a good idea to not use multi threading or just keep doing some post requests from time to time , just because they wont notice it

  • @adambamf9365
    @adambamf9365 Před 4 dny

    nice work !;

  • @musprodev
    @musprodev Před 5 dny

    I will contribute

  • @muhammedanswarc.k990
    @muhammedanswarc.k990 Před 5 dny

    Next time add a little bit of randomness so they cant get rid of it, like usa dictionary for email domains use a dictionary for local part and so on, Nice video BTW punish em real hard.😁😁

  • @jw200
    @jw200 Před 2 dny

    how you find the phishing links?

  • @Pokedollar
    @Pokedollar Před 4 dny

    I like the idea of you wanting to stop scammers, but, using the same email address (especially an unrealistic one, as you took) and password is easily detectable. Not only that, as soon as the scammer sees, there's like 1000s of entries with that certain email, they will simply match and replace that data. Instead, you could be trying to work on a bot that randomizes the email and password everytime. Even better, would be emails that seem like they could be real, to make their life even harder. For example, you could take a list of first names and last names, and shuffle email addresses with that.

  • @okcapo
    @okcapo Před 5 dny

    You should: Thread the requests & try to use php injection on form parts(email || password) :)

  • @adambamf9365
    @adambamf9365 Před 4 dny

    mybe add 'While True' for automation and then try temp mail for fake emails and a wordlist for pswrds

  • @enijar
    @enijar Před 5 dny

    You could improve this by using the faker library to create realistic and varied submissions, which would be better than having all submissions the same, as the bad actor can easily bulk delete similar submissions

  • @FaizKhan-of9qv
    @FaizKhan-of9qv Před 3 dny

    use threads to send multiple request per second

  • @TJsport2023
    @TJsport2023 Před 7 dny +1

    My friend i asked you for help and never reply

  • @sun3k
    @sun3k Před 6 dny

    Theres a lot of malware in minecraft mods on youtube, because im pretty decent at reading bytecode (and most arent even hiding it) I also nuked quite a few urls, I remember one time the guy had django with debug so I saw the backend code with my ip throwing an error because it was blacklisted lol. I guess I wasn't the first person.

  • @mnsss.
    @mnsss. Před 5 dny

    Love the video! Would love to help if there is any ideas or room to help in. Come from backend engineering background and recently decided to switch over onto the cybersecurity side hoping to one day be a top pen tester. Would be great to be of any help to anyone honestly and also welcome any help. So if you need help or anyone else wants to connect with like minded people lmk!

  • @Greatmohamed
    @Greatmohamed Před 5 dny

    Liked it ❤

  • @dhimandutta9376
    @dhimandutta9376 Před 5 dny

    Bro there is an extra comma at line number 8

  • @TheElJoyHunter
    @TheElJoyHunter Před 5 dny

    just use the intruder with numbers increasing till 1000 and this will sent him 1000 request to that endpoint .

    • @mlchael7267
      @mlchael7267 Před 5 dny

      it needs to be randomized or else they will just drop all the entries with the email or pass

  • @zFede_Rico
    @zFede_Rico Před 5 dny

    Everybody gangsta untill a guy with kali linux starts recording and launching tools

  • @Iunderman
    @Iunderman Před 6 dny

    cant u use threading for multiple sends

    • @CybrZone
      @CybrZone  Před 6 dny

      yep the updated code uses threading

  • @remy2885
    @remy2885 Před 4 dny

    legend! next time make them install a rootkit

  • @visio_crystal
    @visio_crystal Před 7 dny

    I checked the repo, you didn’t include the url link in the repo…
    Use threading to send more requests

  • @unastar
    @unastar Před 5 dny

    Hubieras usado multi hilos pero buen video😂

  • @cedric6941
    @cedric6941 Před 5 dny

    you should have randomized both the email and password, they can easily filter out everything but the credentials you were requesting to the server
    good video though

  • @oktay9784
    @oktay9784 Před 5 dny

    imagine sending request with thousands of threads using the concurrent module

    • @emptycode1782
      @emptycode1782 Před 5 dny

      usually thats not a good idea.
      depending on the website its usually better to have small amount of threads (10 20 )

    • @oktay9784
      @oktay9784 Před 4 dny

      @@emptycode1782 its just a scammer website. usually they dont have bot protection like cloudflare or smt. I had a similar situation before and I had no problem despite sending thousands of requests.

  • @giorgiosproject
    @giorgiosproject Před 5 dny

    You should add random gmail generator and fake pass generator with random python libs, to insert the script into a while loop until you press a sigint or something like that hahahha

  • @pp0x280
    @pp0x280 Před 4 dny

    SELECT * FROM table WHERE ip = yours

  • @AmaanKhan-gq3qv
    @AmaanKhan-gq3qv Před dnem

    class mate ,haha

  • @centralintelligenceagency3143

    you should have used random emails and passwords, otherwise it is easy to remove this spam from database

  • @PELLYBELLY
    @PELLYBELLY Před 5 dny +1

    parsing a word list and adding random emails / passwords that way would be clutch

  • @C0ck_team
    @C0ck_team Před 5 dny

    i love the idea, but you will need tens if not hundreds of those spamming instances in order to crash a website

  • @mryiit
    @mryiit Před 6 dny

    You can just do while True and u can make credentials random

    • @CybrZone
      @CybrZone  Před 6 dny

      Yep code has seen afew improvements.
      Will do an update video, now has threads, randomness of emails and names without relying on hardcoded list etc.
      Also will have random user agents.
      people have helped massively.

    • @mryiit
      @mryiit Před 5 dny

      @@CybrZone Cool!

  • @AtefCodes
    @AtefCodes Před 5 dny

    could have been more devastating if you generated random email strings, that way they cannot just identify which email is real or not, gg none the less

    • @anthonyschwartz6114
      @anthonyschwartz6114 Před 5 dny

      If you watched the entire video, that’s exactly what he said…. But he admitted his python skills weren’t that great and left it for anyone with more skill to modify and use as well…

    • @AtefCodes
      @AtefCodes Před 5 dny

      @@anthonyschwartz6114 yeah chatgpt can code this script in 5 minutes