-
Notifications
You must be signed in to change notification settings - Fork 5
Description
📌 Challenge Overview
Challenge Title:
Login Trap: Identify the Phishing Attempt
Difficulty Level:
- Beginner
- Intermediate
- Advanced
Description / Scenario:
This scenario simulates a realistic phishing login page designed to trick users into entering their credentials. The goal is to help participants recognize subtle signs of fraudulent websites and understand the importance of verifying URLs and site authenticity before submitting sensitive information.
Learning Objective:
From this challenge, the player should learn to carefully inspect login pages for signs of phishing, such as suspicious URLs, unusual design elements, or unexpected requests for information. They should become more cautious about sharing credentials and understand the importance of verifying website authenticity to protect against scams and data theft.
Phishing Technique Used:
- The page mimics a legitimate login interface with identical logos and styling but uses a fake URL or subtle visual differences to deceive users.
- JavaScript alters input placeholders or disables browser security indicators to hide warnings.
- The script generates misleading pop-ups or error prompts to pressure users into re-entering credentials.
- Transparent overlays or disabled buttons that trick users into clicking unintended elements, capturing sensitive data without obvious signs.
- JavaScript intercepts form submission to silently capture credentials and prevent normal login flow.
📸 Screenshots / Demo
Upload 1–2 images or attach a short screen recording to help us preview the interaction.
🪙 Reward Wallet Address (USDT - ERC20 Polygon/Arbitrum)
(Required if accepted for the 30 USDT reward)
0x2B602d2f559a0bADf4D5956D03f2b330fBC2e9F9
✅ By submitting this challenge, I agree to open-source it under the project's license and allow the Unphishable team to modify or improve it for consistency.