Title: Anti-Phishing Technology
1Anti-Phishing Technology
- Chokepoints and Countermeasures
Aaron EmighRadix Labsaaron_at_radixlabs.com
2A Typical Phishing Email
3Phishing Information Flow
4Step 1 Phish Delivery
5Authentication
6Reducing False Positives
?
7Reducing False Positives
8Image Recognition
- Simple idea recognize logos
9Image Recognition
10Image Recognition
- Fully render, then retrieve sub-images
11Patching
12Secure Patch Distribution
13Secure Patch Activation
14Automatic Secure Patch Activation
15Step 2 User Action
16Education
Why Johnny cant identify phish
17Personally Identifiable Information
18Personally Identifiable Information
19Unmask Deceptive Links
ltPgtTo go to a surprising place via a cloaked URL,
click on ltA HREF"http//security.ebay.com_at_phisher
.com"gtthis link.lt/Agt ltPgtTo go to a surprising
place via a cloaked URL with a password, click
on ltA HREF"http//security.ebay.compassword_at_phis
her.com"gtthis link.lt/Agt ltPgtTo go to a surprising
place via an open redirect, click on ltA
HREF"http//redirect.ebaysecurity.com?urlphisher
.com"gtthis link.lt/Agt ltPgtTo go to a surprising
place via misleading link, click on ltA
HREF"http//phisher.com"gthttp//security.ebay.com
.lt/Agt
20Unmask Deceptive Links
ltPgtTo go to a surprising place via a cloaked URL,
click on ltA HREF"http//security.ebay.com_at_phisher
.com"gtthis link.lt/Agt ltPgtTo go to a surprising
place via a cloaked URL with a password, click
on ltA HREF"http//security.ebay.compassword_at_phis
her.com"gtthis link.lt/Agt ltPgtTo go to a surprising
place via an open redirect, click on ltA
HREF"http//redirect.ebaysecurity.com?urlphisher
.com"gtthis link.lt/Agt ltPgtTo go to a surprising
place via misleading link, click on ltA
HREF"http//phisher.com"gthttp//security.ebay.com
.lt/Agt
21Interfere With Navigation
22Detecting DNS Poisoning
23Steps 2 and 4 Information Sharing
24Its the metadata, stupid!
25Step 4 Transmitting data
26Little Brother is Watching
27Step 4 Variant Cross-Site Scripting
28Cross-Site Scripting Countermeasure
29Steps 4 and 6 Secure Path
30Secure Path (That Was Then)
Login aaron Password
31Secure Path (This Is Now)
32Secure Path (This Is Now)
33Step 6 Data Without Value
34Two-Factor Authentication
35Two-Factor Authentication
36Password Hashing
37Policy-based data
38Aftermath Ex Post Facto Detection
39Aftermath Information Sharing
40Conclusions
41Anti-Phishing Technology
- Chokepoints and Countermeasures
Aaron EmighRadix Labsaaron_at_radixlabs.com