Any Internet aggression attack, the purpose of which is to manipulate a victim's files and sensitive information, begins with reconnaissance and obtaining unauthorized account access. Usually, this is done using targeted phishing. The article will describe in detail the process of preparing and conducting an act of gaining access to the target's account. A social network with a form on a main page was chosen as a platform on which the sequence of manipulations will be explained. Method danger is characterized by high availability of technical measures and a relatively low entry threshold. This scientific article’s main goal is to inform members of information security and IT community about a multi-stage computer attack that exists both independently and serves as an initial set of measures in other, larger-scale attacks and their combinations. Problem decomposition of the methodology used by an attacker in the first stages of targeted digital stalking is solved.
Keywords: Internet aggression, phishing, cyberattack, unauthorized access, web form, markup language, user intrface, hosting, malware, content filtering