

On the other hand, actually pulling it off requires the victim to have Chromium app mode enabled and launched locally on their device. This hack could potentially be very dangerous simply because of how easy it might be to get fooled by it. Removing the URL largely deals with the easiest way to spot a scam from the real thing. Many users are less wary of desktop apps than websites, because once installed, they are assumed to be safe on the other hand, there’s always some degree of hesitation when visiting a strange website. With all of these things out of the equation, it’s fairly easy to create a clone of a familiar login form and try to trick users into typing their login credentials. The website is launched in a separate window, and on your taskbar, you’ll see the website’s favicon (the icon you normally see next to the website’s name in your browser tab) instead of the Chrome logo. For starters, the toolbars and the address bar both disappear. A few things happen when you launch Application Mode. In Google Chrome, Application Mode lets web devs create apps that resemble native applications. In reality, all inputs are sent to a malicious attacker. Using Application Mode allows threat actors to spread highly believable-looking local login forms that look like desktop applications. This is a feature that’s available in all Chromium-based browsers, which includes Google Chrome, Microsoft Edge, and Brave. Thanks to a new phishing method, hackers could steal all sorts of personal information by simply mimicking real login forms in Application Mode. this posted code will be updated for minor optimizations. # so now that we have found the right directory. If grep "Brave NTP background images component" "$manifest" &>/dev/null and evaluate the manifest.json file in that directory įind $HOME/.config -name "manifest.json" | while read manifest # dig into every directory that contain a manifest.json file. # first find the directory where the background pictures are: The following script will do that for you: #!/bin/bash Method one: Open Brave's wallpaper folder and open the photo.json file in pluma Here is a dirty little hack to make it possible in a not-too-inconvenient wayīrave hides its wallpapers in a directory with a random name and reads a photo.json file to learn which wallpapers it has to show and in which order. If you ever tried to change the backgrounds/wallpapers of Brave then you probably discovered that you can only have: a gradient, brave's preselected wallpapers, brave's preselected + brave ads wallpapers.
