Skip to content

worm0x1/BITB-2.0

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

7 Commits
Β 
Β 
Β 
Β 

Repository files navigation

πŸ‘¨πŸ»β€πŸ’»οΈ BITB-2.0

This educational project demonstrates how Browser-in-the-Browser (BITB) attacks work, where hackers use fake browser windows (via iframes) to trick users into entering login credentials.


🚨 Protect Yourself:

Always verify URLs, enable 2FA, and avoid entering credentials in pop-up windows. Also, ensure your website is protected from being embedded in an iframe.


πŸ›‘οΈ Protect Web from Iframed:

Websites can prevent their content from being embedded in iframes by using HTTP headers like X-Frame-Options or Content-Security-Policy (CSP). This prevents attackers from creating fake login pages inside iframes on malicious sites.

  • X-Frame-Options: Use this header with DENY or SAMEORIGIN values to block your site from being embedded in iframes.

    • DENY: The website cannot be embedded in any iframe.
    • SAMEORIGIN: The website can only be embedded in iframes from the same origin (same domain).
  • Content-Security-Policy (CSP): This provides more granular control over which domains can embed your site, helping protect against BITB attacks.


🌐 Web Using Iframe Protection:

Many large companies, such as Google, Facebook, and Twitter, block their sites from being embedded in iframes to prevent phishing and other types of attacks.


🌐 Free Hosting & Subdomain

https://youtu.be/TV8CI3w6PlE


πŸ“Έ How does this look?

Screenshot1

Screenshot2

πŸŽ₯ Educational Demo

https://youtube.com/shorts/nrfAEaHKOO4


⚠️ Warning: This project is for educational purposes only. Never use it for malicious activities. Always obtain explicit consent before conducting a ny security tests.

About

Exposing BITB-2.0 Attacks: Social Engineering Uncovered πŸ”

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages