https://github.com/0dayctf/autofill_danger
Autofill Phishing
https://github.com/0dayctf/autofill_danger
autofill cyber infosec
Last synced: 7 months ago
JSON representation
Autofill Phishing
- Host: GitHub
- URL: https://github.com/0dayctf/autofill_danger
- Owner: 0dayCTF
- Created: 2024-07-06T15:25:24.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2024-12-16T23:12:47.000Z (10 months ago)
- Last Synced: 2025-03-08T04:08:38.470Z (7 months ago)
- Topics: autofill, cyber, infosec
- Language: HTML
- Homepage: https://autofill-danger.netlify.app
- Size: 19.5 KB
- Stars: 59
- Watchers: 1
- Forks: 5
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Autofill Phishing
# Try it yourself!
[https://autofill-danger.netlify.app](https://autofill-danger.netlify.app)## PoC Video
https://www.instagram.com/reel/C9DTe87OrTH/## Overview
This repo demonstrates an autofill phishing vulnerability in modern day browsers. It highlights how even the latest browsers might be susceptible to this type of basic attack, which has been around for around 8 years.
## Why This Attack Works
Many modern day web browsers offer autofill features to enhance user convenience by automatically filling in form fields with saved data. However, this convenience can be exploited due to:
- Attackers can hide input fields on a webpage, which get autofilled without the users knowledge.
- Users often trust autofill to only populate visible fields, unaware that hidden fields can also be filled.## How This Attack Works
This attack exploits the autofill feature of browsers. Here are the key steps involved:
1. **Crafted Web Form**: The attacker creates a web form with visible and hidden input fields.
2. **User Interaction**: The user visits the malicious website and interacts with the visible form fields.
3. **Autofill Trigger**: The browser's autofill feature automatically populates both visible and hidden fields with saved user data.
4. **Extraction**: The hidden fields capture sensitive information without the user’s knowledge, which is then sent to the attacker.## Photo

_Inspired by Viljami Kuosmanen - https://github.com/anttiviljami/browser-autofill-phishing_