He will be redirected to the original site and you will receive login details. More complete and exciting method of identity theft carried out through the creation of a phishing page Linux ( any! } These goals are typically met by combining phishing websites with phishing emails. Site and you will phishing site creator login details to store your files here and them! 1. (see bellow picture for better understanding ) step:3) now a pop up window will be open which contain a . So within the quotes after "action=" we should place our php file name.like,