background image


Chapter 10

Figure 10-4: Initial page and link to the cloned page

When the target clicks the link, he is presented with the cloned web 

page shown in Figure 10-5, which looks exactly like the real Gmail Wel-
come page.

Figure 10-5: Cloned Gmail Welcome page 

Notice that the URL text at the top of Figure 10-5 shows our malicious 

web server. As in preceding examples, you can register a similar domain 
name to avoid this issue. Once the target enters his username and password 
in the appropriate fields, you can intercept and harvest the credentials.