Professional Documents
Culture Documents
On
Phishing
Submitted By:
Hitesh Rana
CSE third sem.
Introduction
Phishing Techniques
Phishing Examples
Types of Phishing
Causes of Phishing
Anti Phishing
Effects of Phishing
Defend against Phishing Attacks
Conclusion
Reference
Phishing is the act of attempting to acquire
information such as username, password and
credit card details as a trustworthy entity in
an electronic communication.
Communications purporting to be from
popular social web sites ,auction sites, online
payment process or IT administrators are
commonly used to lure the unsuspecting
public .Phishing emails may contain links to
websites that are infected with malware.
LINK MANIPULATION
FILTER EVASION
WEBSITE FORGERY
PHONE PHISHING
In this example, targeted at South Trust Bank users, the
phisher has used an image to make it harder for anti-phishing
filters to detect by scanning for text commonly used in
phishing emails.
Deceptive - Sending a deceptive email, in bulk, with a
“call
to action” that demands the recipient click on a link.
Malware-Based - Running malicious software on the
user’s machine. Various forms of malware-based phishing
are:
Web Trojans
Data Theft
DNS-Based - Phishing that interferes with the integrity
of the lookup process for a domain name. Forms of DNS-
based phishing are:
Hosts file poisoning
Polluting user’s DNS cache
Proxy server compromise
Man-in-the-Middle Phishing - Phisher positions himself
between the user and the legitimate site.
Content-Injection – Inserting malicious content into legitimate site.