SlideShare ist ein Scribd-Unternehmen logo
1 von 18
PHISHING
SREEKANTH N
HISTORY
Originofname
Earliest hackers were known
as phreaks.
Phreaking means exploration,
experimenting and study of
telecommunication systems.
The “ph” spelling was used to
link phishing scams with these
underground communities.
A good reason for the use of
“ph” in place of the “f” in the
spelling of the term.
FirstRecordedmention
The first time that the term
“phishing” was used and
recorded was on January 2,
1996. The mention occurred in
a Usenet newsgroup
called AOHell.
Phishingbegins
Traced back to the early 1990s
via America Online, or AOL.
A group of hackers and pirates
that branded the warez
community are considered the
first “phishers.”
Created an algorithm that
allowed them to generate
random credit card numbers.
Successful hits were used to
make phony AOL accounts.
These accounts were used to
spam others in AOL’s
community.
HISTORY
Originofname
Earliest hackers were known
as phreaks.
Phreaking means exploration,
experimenting and study of
telecommunication systems.
The “ph” spelling was used to
link phishing scams with
these underground
communities.
A good reason for the use of
“ph” in place of the “f” in the
spelling of the term.
FirstRecordedmention
The first time that the term
“phishing” was used and
recorded was on January 2,
1996. The mention occurred
in a Usenet newsgroup
called AOHell.
Phishingbegins
By 1995, AOL was able to
stop the random credit card
generators
Then the warez group moved
on to other methods,
specifically pretending to be
AOL employees and
messaging people via AOL
Messenger for their
information.
This quickly became such a
problem that on January 2,
1996, the word “phishing”
was first posted in a Usenet
group dedicated to American
Online.
WHAT IS PHISHING?
Phishing is a cybercrime where targets are exploited
by someone posing as a legitimate institution to lure
individuals into providing sensitive data such as
personally identifiable information, banking and
credit card details, and passwords.
The information is then used to access
important accounts and can result in identity theft
and financial loss.
Phishing
Techniques
Spear
Phishing
Session
Hijacking
Email/Spam
Content
Injection
Web Based
Delivery
Link
Manipulation
Phishing
Techniques
Trojan
Malvertising
Phishing
through
Search
Engines
Vishing
(Voice
Phishing)
Smishing
(SMS
Phishing)
Malware
COMMON TYPES
• Deceptive - Sending a deceptive email, in bulk, with a “call to action” that demands the recipient click
on a link.
COMMON TYPES
• Malware-Based - Running malicious software on the user’s machine. Various forms of malware-based
phishing are:
• Key Loggers & Screen Loggers
• Session Hijackers
• Web Trojans
• Data Theft
COMMON TYPES
• DNS-Based - Phishing that interferes with the integrity of the lookup process for a domain name. Forms
of DNS-based phishing are:
• Hosts file poisoning
• Polluting user’s DNS cache
• Proxy server compromise
COMMON TYPES
• Content-Injection – Inserting malicious content into legitimate site.
• Three primary types of content-injection phishing:
• Hackers can compromise a server through a security vulnerability and replace or augment the legitimate
content with malicious content.
• Malicious content can be inserted into a site through a cross-site scripting vulnerability.
• Malicious actions can be performed on a site through a SQL injection vulnerability.
COMMON TYPES
• Man-in-the-Middle Phishing - Phisher positions himself between the user and the legitimate site.
• Search Engine Phishing - Create web pages for fake products, get the pages indexed by search engines,
and wait for users to enter their confidential information as part of an order, sign-up, or balance
transfer.
CAUSES OF PHISHING EFFECTS OF PHISHING
Misleading e-mails
No check of source address
Vulnerability in browsers
No strong authentication at websites
of banks and financial institutions
Limited use of digital signatures
Non-availability of secure desktop
tools
Lack of user awareness
Vulnerability in applications
Internet fraud
Identity theft
Financial loss to the original
institutions
Difficulties in Law Enforcement
Investigations
Erosion of Public Trust in the
Internet.
EFFECTS OF PHISHING
• Internet fraud
• Identity theft
• Financial loss to the original institutions
• Difficulties in Law Enforcement Investigations
• Erosion of Public Trust in the Internet.
HOW TO COMBAT PHISHING
• Educate application users
• Think before you open
• Never click on the links in an email , message boards or mailing lists
• Never submit credentials on forms embedded in emails
• Inspect the address bar and SSL certificate
• Never open suspicious emails
• Ensure that the web browser has the latest security patch applied
• Install latest anti-virus packages
• Destroy any hard copy of sensitive information
• Verify the accounts and transactions regularly
• Report the scam via phone or email.
HOW TO COMBAT PHISHING
• Formulate and enforce Best practices
• Authorization controls and access privileges for systems, databases and applications.
• Access to any information should be based on need-to-know principle
• Segregation of duties.
• Media should be disposed only after erasing sensitive information.
HOW TO COMBAT PHISHING
• Content Validation
• Never inherently trust the submitted data
• Never present the submitted data back to an application user without sanitizing the same
• Always sanitize data before processing or storing
• Check the HTTP referrer header
HOW TO COMBAT PHISHING
Session Handling
• Make session identifiers long, complicated and difficult to guess.
• Set expiry time limits for the SessionID’s and should be checked for every client request.
• Application should be capable of revoking active SessionID’s and not recycle the same SessionID.
• Any attempt the invalid SessionID should be redirected to the login page.
• Never accept session information within a URL.
• Protect the session via SSL.
• Session data should be submitted as a POST.
• After authenticating, a new SessionID should be used (HTTP & HTTPS).
• Never let the users choose the SessionID.
REFERENCES
http://www.antiphishing.org/reports/apwg_report_november_2006.pdf
http://72.14.235.104/search?q=cache:-T6-
U5dhgYAJ:www.avira.com/en/threats/what_is_phishing.html+Phishing+consequences&hl=en&gl=in&ct=cl
nk&cd=7
Phishing-dhs-report.pdf
Report_on_phishing.pdf
http://www.cert-in.org.in/training/15thjuly05/phishing.pdf
http://www.antiphishing.org/consumer_recs.html
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
pooja_doshi
 

Was ist angesagt? (20)

Sql Injection - Vulnerability and Security
Sql Injection - Vulnerability and SecuritySql Injection - Vulnerability and Security
Sql Injection - Vulnerability and Security
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 
Phishing
PhishingPhishing
Phishing
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Phishing
PhishingPhishing
Phishing
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Sql injections - with example
Sql injections - with exampleSql injections - with example
Sql injections - with example
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 

Ähnlich wie Phishing

00.fnc forensics overview new
00.fnc forensics overview new00.fnc forensics overview new
00.fnc forensics overview new
forensicsnation
 
Improving Phishing URL Detection Using Fuzzy Association Mining
Improving Phishing URL Detection Using Fuzzy Association MiningImproving Phishing URL Detection Using Fuzzy Association Mining
Improving Phishing URL Detection Using Fuzzy Association Mining
theijes
 
Phishing & spamming
Phishing & spammingPhishing & spamming
Phishing & spamming
Kavis Pandey
 

Ähnlich wie Phishing (20)

Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 
Phishing
PhishingPhishing
Phishing
 
edu 3 ppt.pptx
edu 3 ppt.pptxedu 3 ppt.pptx
edu 3 ppt.pptx
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
 
Cyber security-1.pptx
Cyber security-1.pptxCyber security-1.pptx
Cyber security-1.pptx
 
E commerce
E commerceE commerce
E commerce
 
Phishing
PhishingPhishing
Phishing
 
Attacks Types
Attacks TypesAttacks Types
Attacks Types
 
Computer Security Hacking
Computer Security HackingComputer Security Hacking
Computer Security Hacking
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Phishing 101 General Course
Phishing 101 General CoursePhishing 101 General Course
Phishing 101 General Course
 
00.fnc forensics overview new
00.fnc forensics overview new00.fnc forensics overview new
00.fnc forensics overview new
 
FNC Forensics Overview
FNC Forensics OverviewFNC Forensics Overview
FNC Forensics Overview
 
HACKING
HACKINGHACKING
HACKING
 
Improving Phishing URL Detection Using Fuzzy Association Mining
Improving Phishing URL Detection Using Fuzzy Association MiningImproving Phishing URL Detection Using Fuzzy Association Mining
Improving Phishing URL Detection Using Fuzzy Association Mining
 
Phishing & spamming
Phishing & spammingPhishing & spamming
Phishing & spamming
 
Seminar
SeminarSeminar
Seminar
 
Day 2
Day 2Day 2
Day 2
 
Phishing.pdf
Phishing.pdfPhishing.pdf
Phishing.pdf
 

Mehr von Sreekanth Narendran

Mehr von Sreekanth Narendran (20)

Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
Information Systems Control and Audit - Chapter 4 - Systems Development Manag...
 
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
Information Systems Control and Audit - Chapter 3 - Top Management Controls -...
 
Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1Information Systems Audit - Ron Weber chapter 1
Information Systems Audit - Ron Weber chapter 1
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Nmap
NmapNmap
Nmap
 
Transactional vs transformational leadership
Transactional vs transformational leadershipTransactional vs transformational leadership
Transactional vs transformational leadership
 
ECGC, Exim Bank, RBI, FEDAI, FEMA and SWIFT.
ECGC, Exim Bank, RBI, FEDAI, FEMA and SWIFT.ECGC, Exim Bank, RBI, FEDAI, FEMA and SWIFT.
ECGC, Exim Bank, RBI, FEDAI, FEMA and SWIFT.
 
Web services for banks
Web services for banksWeb services for banks
Web services for banks
 
Virus vs worms vs trojans
Virus vs worms vs trojansVirus vs worms vs trojans
Virus vs worms vs trojans
 
Business process reengineering
Business process reengineeringBusiness process reengineering
Business process reengineering
 
Hash cat
Hash catHash cat
Hash cat
 
International banking
International bankingInternational banking
International banking
 
Master Data Management
Master Data ManagementMaster Data Management
Master Data Management
 
Maltego Information Gathering
Maltego Information Gathering Maltego Information Gathering
Maltego Information Gathering
 
Leadership traits
Leadership traitsLeadership traits
Leadership traits
 
Network Miner Network forensics
Network Miner Network forensicsNetwork Miner Network forensics
Network Miner Network forensics
 
Autopsy Digital forensics tool
Autopsy Digital forensics toolAutopsy Digital forensics tool
Autopsy Digital forensics tool
 
Organizational development
Organizational developmentOrganizational development
Organizational development
 
Conducting an Information Systems Audit
Conducting an Information Systems Audit Conducting an Information Systems Audit
Conducting an Information Systems Audit
 
Indigo Case study
Indigo Case study Indigo Case study
Indigo Case study
 

Kürzlich hochgeladen

在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Kürzlich hochgeladen (20)

Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 

Phishing

  • 2. HISTORY Originofname Earliest hackers were known as phreaks. Phreaking means exploration, experimenting and study of telecommunication systems. The “ph” spelling was used to link phishing scams with these underground communities. A good reason for the use of “ph” in place of the “f” in the spelling of the term. FirstRecordedmention The first time that the term “phishing” was used and recorded was on January 2, 1996. The mention occurred in a Usenet newsgroup called AOHell. Phishingbegins Traced back to the early 1990s via America Online, or AOL. A group of hackers and pirates that branded the warez community are considered the first “phishers.” Created an algorithm that allowed them to generate random credit card numbers. Successful hits were used to make phony AOL accounts. These accounts were used to spam others in AOL’s community.
  • 3. HISTORY Originofname Earliest hackers were known as phreaks. Phreaking means exploration, experimenting and study of telecommunication systems. The “ph” spelling was used to link phishing scams with these underground communities. A good reason for the use of “ph” in place of the “f” in the spelling of the term. FirstRecordedmention The first time that the term “phishing” was used and recorded was on January 2, 1996. The mention occurred in a Usenet newsgroup called AOHell. Phishingbegins By 1995, AOL was able to stop the random credit card generators Then the warez group moved on to other methods, specifically pretending to be AOL employees and messaging people via AOL Messenger for their information. This quickly became such a problem that on January 2, 1996, the word “phishing” was first posted in a Usenet group dedicated to American Online.
  • 4. WHAT IS PHISHING? Phishing is a cybercrime where targets are exploited by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords. The information is then used to access important accounts and can result in identity theft and financial loss.
  • 6. COMMON TYPES • Deceptive - Sending a deceptive email, in bulk, with a “call to action” that demands the recipient click on a link.
  • 7. COMMON TYPES • Malware-Based - Running malicious software on the user’s machine. Various forms of malware-based phishing are: • Key Loggers & Screen Loggers • Session Hijackers • Web Trojans • Data Theft
  • 8. COMMON TYPES • DNS-Based - Phishing that interferes with the integrity of the lookup process for a domain name. Forms of DNS-based phishing are: • Hosts file poisoning • Polluting user’s DNS cache • Proxy server compromise
  • 9. COMMON TYPES • Content-Injection – Inserting malicious content into legitimate site. • Three primary types of content-injection phishing: • Hackers can compromise a server through a security vulnerability and replace or augment the legitimate content with malicious content. • Malicious content can be inserted into a site through a cross-site scripting vulnerability. • Malicious actions can be performed on a site through a SQL injection vulnerability.
  • 10. COMMON TYPES • Man-in-the-Middle Phishing - Phisher positions himself between the user and the legitimate site. • Search Engine Phishing - Create web pages for fake products, get the pages indexed by search engines, and wait for users to enter their confidential information as part of an order, sign-up, or balance transfer.
  • 11. CAUSES OF PHISHING EFFECTS OF PHISHING Misleading e-mails No check of source address Vulnerability in browsers No strong authentication at websites of banks and financial institutions Limited use of digital signatures Non-availability of secure desktop tools Lack of user awareness Vulnerability in applications Internet fraud Identity theft Financial loss to the original institutions Difficulties in Law Enforcement Investigations Erosion of Public Trust in the Internet.
  • 12. EFFECTS OF PHISHING • Internet fraud • Identity theft • Financial loss to the original institutions • Difficulties in Law Enforcement Investigations • Erosion of Public Trust in the Internet.
  • 13. HOW TO COMBAT PHISHING • Educate application users • Think before you open • Never click on the links in an email , message boards or mailing lists • Never submit credentials on forms embedded in emails • Inspect the address bar and SSL certificate • Never open suspicious emails • Ensure that the web browser has the latest security patch applied • Install latest anti-virus packages • Destroy any hard copy of sensitive information • Verify the accounts and transactions regularly • Report the scam via phone or email.
  • 14. HOW TO COMBAT PHISHING • Formulate and enforce Best practices • Authorization controls and access privileges for systems, databases and applications. • Access to any information should be based on need-to-know principle • Segregation of duties. • Media should be disposed only after erasing sensitive information.
  • 15. HOW TO COMBAT PHISHING • Content Validation • Never inherently trust the submitted data • Never present the submitted data back to an application user without sanitizing the same • Always sanitize data before processing or storing • Check the HTTP referrer header
  • 16. HOW TO COMBAT PHISHING Session Handling • Make session identifiers long, complicated and difficult to guess. • Set expiry time limits for the SessionID’s and should be checked for every client request. • Application should be capable of revoking active SessionID’s and not recycle the same SessionID. • Any attempt the invalid SessionID should be redirected to the login page. • Never accept session information within a URL. • Protect the session via SSL. • Session data should be submitted as a POST. • After authenticating, a new SessionID should be used (HTTP & HTTPS). • Never let the users choose the SessionID.