phishing a practical case study. what is phishing? phishing involves fraudulently acquiring...
TRANSCRIPT
![Page 1: Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details](https://reader035.vdocuments.mx/reader035/viewer/2022062517/56649f155503460f94c2a458/html5/thumbnails/1.jpg)
PhishingA practical case study
![Page 2: Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details](https://reader035.vdocuments.mx/reader035/viewer/2022062517/56649f155503460f94c2a458/html5/thumbnails/2.jpg)
What is phishing?
• Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details etc) by masquerading as a trusted entity.
![Page 3: Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details](https://reader035.vdocuments.mx/reader035/viewer/2022062517/56649f155503460f94c2a458/html5/thumbnails/3.jpg)
The sites
• www.noodlebank.com (i.e NOODLEBANK.com)
• www.nood1ebank.com (i.e NOOD1EBANK.com)
![Page 4: Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details](https://reader035.vdocuments.mx/reader035/viewer/2022062517/56649f155503460f94c2a458/html5/thumbnails/4.jpg)
The real site
![Page 5: Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details](https://reader035.vdocuments.mx/reader035/viewer/2022062517/56649f155503460f94c2a458/html5/thumbnails/5.jpg)
![Page 6: Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details](https://reader035.vdocuments.mx/reader035/viewer/2022062517/56649f155503460f94c2a458/html5/thumbnails/6.jpg)
![Page 7: Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details](https://reader035.vdocuments.mx/reader035/viewer/2022062517/56649f155503460f94c2a458/html5/thumbnails/7.jpg)
![Page 8: Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details](https://reader035.vdocuments.mx/reader035/viewer/2022062517/56649f155503460f94c2a458/html5/thumbnails/8.jpg)
![Page 9: Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details](https://reader035.vdocuments.mx/reader035/viewer/2022062517/56649f155503460f94c2a458/html5/thumbnails/9.jpg)
The spoofed email
![Page 10: Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details](https://reader035.vdocuments.mx/reader035/viewer/2022062517/56649f155503460f94c2a458/html5/thumbnails/10.jpg)
The spoofing
• The link appears as
www.noodlebank.com (i.e NOODLEBANK.com)
• But actually it links to
www.nood1ebank.com (i.e NOOD1EBANK.com)
![Page 11: Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details](https://reader035.vdocuments.mx/reader035/viewer/2022062517/56649f155503460f94c2a458/html5/thumbnails/11.jpg)
The fake site
![Page 12: Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details](https://reader035.vdocuments.mx/reader035/viewer/2022062517/56649f155503460f94c2a458/html5/thumbnails/12.jpg)
![Page 13: Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details](https://reader035.vdocuments.mx/reader035/viewer/2022062517/56649f155503460f94c2a458/html5/thumbnails/13.jpg)
![Page 14: Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details](https://reader035.vdocuments.mx/reader035/viewer/2022062517/56649f155503460f94c2a458/html5/thumbnails/14.jpg)
![Page 15: Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details](https://reader035.vdocuments.mx/reader035/viewer/2022062517/56649f155503460f94c2a458/html5/thumbnails/15.jpg)
![Page 16: Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details](https://reader035.vdocuments.mx/reader035/viewer/2022062517/56649f155503460f94c2a458/html5/thumbnails/16.jpg)
![Page 17: Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details](https://reader035.vdocuments.mx/reader035/viewer/2022062517/56649f155503460f94c2a458/html5/thumbnails/17.jpg)
![Page 18: Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details](https://reader035.vdocuments.mx/reader035/viewer/2022062517/56649f155503460f94c2a458/html5/thumbnails/18.jpg)
The “steal”
• When Debasis entered his username-password at the spoofed website, the username-password was sent across to the criminal carrying out the phishing attack.
• In this case study the username-password is sent across to a spamavert email address so that it can be seen by everyone trying out this case study.
![Page 19: Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details](https://reader035.vdocuments.mx/reader035/viewer/2022062517/56649f155503460f94c2a458/html5/thumbnails/19.jpg)
![Page 20: Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details](https://reader035.vdocuments.mx/reader035/viewer/2022062517/56649f155503460f94c2a458/html5/thumbnails/20.jpg)
More examples…
• In this case study, the user was enticed with a misleading URL. Such urls can be created easily using simple html code such as:
<a href=http://www.nood1ebank.com>http://www.noodlebank.com</a>
• This link displays the correct url but on clicking takes the user to the spoofed url.
![Page 21: Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details](https://reader035.vdocuments.mx/reader035/viewer/2022062517/56649f155503460f94c2a458/html5/thumbnails/21.jpg)
Using a url with an ip address
http://[email protected]
• This url does not lead to noodlebank.com, it leads to the website on the IP address 67.19.217.53
![Page 22: Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details](https://reader035.vdocuments.mx/reader035/viewer/2022062517/56649f155503460f94c2a458/html5/thumbnails/22.jpg)
Using a split domain name
http://www.NOODLEBANK.com.securitycheck.secure-login.nood1ebank.com/login.asp
• This url does not lead to noodlebank.com, it leads to the spoofed website.
![Page 23: Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details](https://reader035.vdocuments.mx/reader035/viewer/2022062517/56649f155503460f94c2a458/html5/thumbnails/23.jpg)
Using an obfuscated url
http://www.NOODLEBANK.com%00@%36%37%2e%31%39%2e%32%31%37%2e%35%33
• This url does not lead to noodlebank.com, it leads to the website on the IP address 67.19.217.53
![Page 24: Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details](https://reader035.vdocuments.mx/reader035/viewer/2022062517/56649f155503460f94c2a458/html5/thumbnails/24.jpg)
Hex to ASCII converter
http://www.dolcevie.com/js/converter.html
![Page 25: Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details](https://reader035.vdocuments.mx/reader035/viewer/2022062517/56649f155503460f94c2a458/html5/thumbnails/25.jpg)
Useful urls
• To try out the genuine website:http://www.noodlebank.com
• To try out the spoofed website:http://www.nood1ebank.com
• To see the usernames-passwords being “stolen”http://spamavert.com/mail.php?alias=noodlebank_com
![Page 26: Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details](https://reader035.vdocuments.mx/reader035/viewer/2022062517/56649f155503460f94c2a458/html5/thumbnails/26.jpg)
Questions?