-
Notifications
You must be signed in to change notification settings - Fork 0
/
darkside_of_scams.html
241 lines (211 loc) · 13.8 KB
/
darkside_of_scams.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta http-equiv="X-UA-Compatible" content="IE=edge">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Darkside of Scams (Win free laptop, iphone, tablet )</title>
<link rel="stylesheet" href="CSS/style.css">
<link rel="preconnect" href="https://fonts.googleapis.com">
<link rel="preconnect" href="https://fonts.gstatic.com" crossorigin>
<link href="https://fonts.googleapis.com/css2?family=Lobster&display=swap" rel="stylesheet">
<link rel="shortcut icon" href="res/web_icon.png">
</head>
<body>
<!-- ||||||||||||||||||||||---NAVBAR----|||||||||||||||||||||||||||||||||||||||||||||||||||||-->
<img src="res/Screenshot 2021-06-07 072924 (2).png" width="100%" alt="">
<nav>
<ul>
<li>
<a href="index.html">Home</a>
</li>
<li>
<a href="blogs.html">Blogs</a>
</li>
<li>
<a href="partners.html">Partners</a>
</li>
<li>
<a href="supporters.html">Supporters</a>
</li>
<li>
<a href="contact_us.html">Contact Us</a>
</li>
<li>
<a href="abous_us.html">About Us</a>
</li>
</ul>
</nav>
<!--||||||||||||||||||||||| Abut us heading--||||||||||||||||||||||||||||||||||||||| -->
<br>
<script src="index.js"></script>
<button class=second_button onclick=' back()'>
<span style="color: blueviolet;">Go Back</span>
</button>
<tag style="color: red; padding: 5%;">MUST READ !!</tag>
<div class='div2'>
<h2 style="color: rgb(245, 132, 132); margin-right:3%;">
Darkside of Scams (Win free laptop, iphone, tablet )
</h2>
<h5 style="color: rgb(198, 131, 123);"> Written by MG Hacker</h5>
</div>
<img src="res/SCAM_IMG.png" style="width: 96%; margin:2%" alt="">
<h4 style="color: wheat;margin-left: 50px; margin-right:3%;font-size: 20px; margin-left: 5%;"> >>What are these
scams and what is
their intention? </h4>
<h6 style="color: white ;margin-left: 50px; margin-right:3%;font-size: 15px; margin-left: 5%;">
So basically their intention is to get some data from us. And use that for some purpose, it can be wrong or
right depend on the attacker.
<h4 style="color: wheat;margin-left: 50px; margin-right:3%;font-size: 20px; margin-left: 5%;">>>Why I need to
write this Blog?</h4>
<h6 style="color: white ;margin-left: 50px; margin-right:3%;font-size: 15px; margin-left: 5%;"> Many people know
about these scams but they just fill details for just time pass or fun. So I need to write this blog to
aware and tell the reality of these scams, these are so much dangerous scam. In our Hacking language this
types of attack comes inside the Term SOCIAL ENGNEERING.
<br> Social Engineering is type of technique or attack in which attacker tries to manage his/her victims
mind to take over control of his/her mind. </h6>
<h4 style="color: wheat;margin-left: 50px;margin-right:3%; font-size: 20px; margin-left: 5%;"> >> What kind of
data
? </h4>
<h6 style="color: white ;margin-left: 50px; margin-right:3%;font-size: 15px; margin-left: 5%;">
They want our digital data like our ip address, cookies, mac address, device details, location, and many
more.
</h6>
<h4 style="color: wheat;margin-left: 50px;margin-right:3%; font-size: 20px; margin-left: 5%;"> >> Different
types
data stolen by
attackers and their uses by the attacker </h4>
<h6 style="color: rgb(170, 235, 152) ;margin-left: 50px;margin-right:3%; font-size: 15px; margin-left: 5%;">
1- IP Address - Internet Protocol address </h6>
<h6 style="color: white;margin-left: 50px; margin-right:3%; font-size: 15px; margin-left: 5%;"> Every device has
a
unique digital
address.
They can use it for IP spoofing.
<tag style="color: black;">IP Spoofing - </tag>in that attacker uses anyone IP in its own device
like If i will assign your IP in my device now my device has your device address so if now i
will visit any website it will get to know your ip hence it mean you visited that website but
actually it was visited by me .It can be too much harmful if an
attacker used your IP for doing some illegal stuffs.</h6>
<h6 style="color: rgb(170, 235, 152) ;margin-left: 50px; margin-right:3%;font-size: 15px; margin-left: 5%;">
2- MAC Adress - Media Access Control Address </h6>
<h6 style="color: white;margin-left: 50px; margin-right:3%; font-size: 15px; margin-left: 5%;">
It is a six byte hexadecimal address. IT is physical address of our network interface like in our
phone there is a controller that controls all networking process, it has its a physical address
like our network has ip address same as our network device has mac address. As hacker can use IP
for spoofing so he can also use your MAC for MAC spoofing to do illegal kind of things using your
device
identity.</h6>
<h6 style="color: rgb(170, 235, 152) ;margin-left: 50px; margin-right:3%;font-size: 15px; margin-left: 5%;"> 3-
Network Details
</h6>
<h6 style="color: white;margin-left: 50px; margin-right:3%; font-size: 15px; margin-left: 5%;">
So you will be thinking what he can do by using network details.
Remember by this a kind of scam even many big people couldn't escape from it.
Let as you are a business man. you used this scam website opened it and attacker got your ip, mac, location.
So now attacker has IP, MAC, and your location. Attacker will come into your area and will getinto your
network
and as he has your IP and MAC so he can now do IP and MAC spoofing. You will be thinking what is the problem
in
this, attacker has spoofed his IP and MAC in that business man's network now all mails and data that was
going
to business man device will goto attacker device as he has spoofed business man's IP and MAC. and by this
the
attacker can also take over all the controls of his business.
Now you can think how much big risky are these scams. By just opening that fake link your whole career,
business
can be ruined.
</h6>
<h6 style="color: rgb(170, 235, 152) ;margin-left: 50px; margin-right:3%;font-size: 15px; margin-left: 5%;">
4- Device Details</h6>
<h6 style="color: white;margin-left: 50px; margin-right:3%; font-size: 15px; margin-left: 5%;">
He can get to know many details related to device and he can sell that data on Darkweb.</h6>
<h6 style="color: rgb(170, 235, 152) ;margin-left: 50px; margin-right:3%;font-size: 15px; margin-left: 5%;">5-
Location
</h6>
<h6 style="color: white;margin-left: 50px; margin-right:3%; font-size: 15px; margin-left: 5%;"> I already told
you
in the example of network details. By location attacker can do anything.
</h6>
<h6 style="color: rgb(170, 235, 152) ;margin-left: 50px; margin-right:3%;font-size: 15px; margin-left: 5%;"> 6-
OS
details (like os version, os type, os installed date and many more)</h6>
<h6 style="color: white;margin-left: 50px; margin-right:3%; font-size: 15px; margin-left: 5%;"> As OS details he
can
try to infect your device and can hack your device.
</h6>
<h6
style="color: white;margin-left: 50px; font-family: 'Lucida Sans', 'Lucida Sans Regular', 'Lucida Grande', 'Lucida Sans Unicode', Geneva, Verdana, sans-serif; margin-right:3%; font-size: 17px; margin-left: 5%;">
Attacker can use these all details for hacking you and ruining your life and for illegal purpose.
Even he can make a good data using all your data and can sell it on Darkweb for earning purposes.
Darkweb is part of web that is not accessible by a normal person. It is accessed by hackers and IT
proffessionals.</h6>
<h2 style="margin-left:50px; font-family:'Franklin Gothic Medium', 'Arial Narrow', Arial, sans-serif;">
<tag style="color: red;">MUST READ !!</tag>
</h2>
<h4 style="color: wheat;margin-left: 50px; margin-right:3%;font-size: 20px; margin-left: 5%;">>>One more example
how it can be harmful</h4>
<h6 style="color: white;margin-left: 50px; margin-right:3%; font-size: 15px; margin-left: 5%;">
okay, so let there is a girl name her as Angella.<br>
She was using her phone as usual she uses one day one link of scam came on her whatsapp.<br>
That scam was of winning Iphone for free. <br>
She opened that link.<br>
<tag style="color: black;">So IN THE BACKSIDE of this The attacker has now that girls IP, MAC, Location,
Device Details.</tag>
<br>now website is asking for some commmon info like her name age mobile no and some other details.
now after clicking on that submit button. She reached to another page where she has to share tha website to
her friends, so she can win iphone or move to next step.
<br>
<tag style="color: black;">BUT IN BADCKSIDE when she pressed on that submit button she has given attacker
her camera access now the attacker can she her live image.</tag>
<br>She shared that link to her friends so she can further move to next step. And at the end website showe
we will contact you soon thans for coming your iphone will be delivered in few hours.
and sometimes even you know it is fake and you do all step and exit it but in real it is not ended.
Angella exited the website and as usual continued using her phone.
<tag style="color: black;"> So now attacker has her cam access he can she her at all time live.
Attacker has her image, no, Name he will search for her social media will collect more
information about Angella and after getting some sensitive and private inforamtion about
her attacker will start to blackmail using some anonymous mailing, messaging techniques.
And after that you know how much it can be dangerous for that girl.</tag>
</h6>
<h4 style="color: wheat;margin-left: 50px;margin-right:3%; font-size: 20px; margin-left: 5%;">>>I have one
threat report of this type of scam.</h4>
<h6 style="color: white;margin-left: 50px; margin-right:3%; font-size: 15px; margin-left: 5%;">It is a report of
iphone scam.
</h6>
<img src="res/iphone_scam.png" style="width: 96%; margin:2%; " alt="">
<h6 style="color: rgb(170, 235, 152) ;margin-left: 50px; margin-right:3%;font-size: 15px; margin-left: 5%;">What
is Win The New iPhone 12 scam?</h6>
<h6 style="color: white;margin-left: 50px; margin-right:3%; font-size: 15px; margin-left: 5%;">The main purpose
of this scam is to trick people into providing contact and other information that supposedly will be used to
contact winners of the iPhone 12. Nobody ever wins anything through websites like this one, on the contrary,
people who fall for such scams lose money, become victims of identity theft, lose access to personal
accounts and/or encounter other issues.
</h6>
<h6 style="color: white;margin-left: 50px; margin-right:3%; font-size: 15px; margin-left: 5%;">Report</h6>
<img src="res/report_phone_scam.png" style="width: 96%; margin: 2%;" alt="">
<h6 style="color: white;margin-left: 50px; margin-right:3%; font-size: 15px; margin-left: 5%;">At last I will
say be aware of these things and share this blog so more people may get know about these scams. YOUR
SECURITY IN YOUR HANDS.</h6>
<h2 style="margin-left:50px; font-family:'Franklin Gothic Medium', 'Arial Narrow', Arial, sans-serif;">
<tag style="color: red;">BE SECURE !! BE HAPPY !!</tag>
</h2>
<h2> Share your some reviews</h2>
<form method='post' name='contact' style='margin-left:2% ;'><input type='hidden' name='form-name' value='contact' />
<div>
<textarea name="comments" id="comments" style="font-family:sans-serif;font-size:15px; width: 60%; height: 80px;">
Type Your Reviews here...
Don't forget to mention your name.
</textarea>
</div>
<input type="submit" value="Submit">
</form>
<!--||||||||||||||||||||||||||||||||||||||||||||||||||||----COPYRIGHTED AREA-----||||||||||||||||||||||||||||||||||||||||||||||||||||-->
<div style="background-color:rgb(8, 70, 121);width: 100%; height: 15%; margin-bottom: 0.5%;">
<h5 style="color: rgb(241, 241, 241);font: 15px; margin-bottom: 2%;">© © 2022 Remote Coders( A Community for Hackers and Programmars) <br>by Tanmay
Tiwari </h5>
</div>
<div style="width: 100%;" class="elfsight-app-49284de3-2ef9-4783-abe2-9776fae5c581"></div>
<script src=index.js></script>
<script src="https://apps.elfsight.com/p/platform.js" defer></script>
</html>