FakeGPT
Overview
.
βββ app.js
βββ crypto.js
βββ img.GIF
βββ loader.js
βββ manifest.json
βββ ui.html

1. Which encoding method does the browser extension use to obscure target URLs, making them more difficult to detect during analysis?

2. Which website does the extension monitor for data theft, targeting user accounts to steal sensitive information?
3. Which type of HTML element is utilized by the extension to send stolen data?

4. What is the first specific condition in the code that triggers the extension to deactivate itself?

5. Which event does the extension capture to track user input submitted through forms?

6. Which API or method does the extension use to capture and monitor user keystrokes?

7. What is the domain where the extension transmits the exfiltrated data?

8. Which function in the code is used to exfiltrate user credentials, including the username and password?

9. Which encryption algorithm is applied to secure the data before sending?

10. What does the extension access to store or manipulate session-related data and authentication information?

Last updated