Phishing and Anti-phishing techniques - PowerPoint PPT Presentation

About This Presentation
Title:

Phishing and Anti-phishing techniques

Description:

... Browser Capabilites Desktop Agents Token based Digitally Signed ... a keylogger can be installed via a web page script which exploits a browser vulnerability. – PowerPoint PPT presentation

Number of Views:1770
Avg rating:3.0/5.0
Slides: 21
Provided by: csClemson
Category:

less

Transcript and Presenter's Notes

Title: Phishing and Anti-phishing techniques


1
Phishing and Anti-phishing techniques
  • Sumanth, Sanath and Anil
  • CpSc 620

2
Email Message
  • Subject CONFIRM YOUR ACCOUNT
  • Reply-To CLEMSON.EDU SUPPORT TEAM"
  • From "CLEMSON.EDU SUPPORT TEAM
  • Date Tue, 1 Dec 2009 174205 -0400
  • To lt"Undisclosed-Recipient"_at_iocaine.ui
    ts.clemson.edugt
  • Dear CLEMSON.EDU Webmail user,
  • This mail is to inform all our CLEMSON.EDU
    webmail users that we will be maintaining and
    upgrading our website in a couple of days from
    now to a new link. As a Subscriber you are
    required to click on the link below and login to
    check if you have access to the new link.
  • Click Here www.webmail.clemson.edu
  • Failure to do this will immediately will render
    your email address deactivated. Thank you for
    using CLEMSON.EDU.
  • CCIT SUPPORT TEAM

3
What is Phishing?
  • Phishing scams are typically fraudulent email
    messages or websites appearing as legitimate
    enterprises (e.g., your university, your Internet
    service provider, your bank).
  • These scams attempt to gather personal, financial
    and sensitive information.
  • Derivation of the word phishing.

4
How to phish?
  • Compromised Web servers Email and IM
  • Port Redirection
  • Botnets
  • Key loggers

5
Compromised Web Servers
Found!!
Compromised Web Server
Send Bulk Email
Attacker
6
Port Redirection
  • Server is compromised and a program is loaded
  • All the port 80 ie., http requests are redirected
    to the attackers server
  • Software known as redir
  • Execute the software using
  • redir --lport80 l addrltIP addr orig servergt
    -cport80 -caddrIP addr attacker

7
Using Botnets
  • Botnets are computers infected by worms or
    Trojans and taken over surreptitiously by hackers
    and brought into networks to send spam, more
    viruses, or launch denial of service attacks.
  • Remotely controlled by the attacker.
  • SQL Injection attacks

8
SQL Injection attacks
Server
Attacker
9
Keyloggers
  • Keyloggers are designed to monitor all the key
    strokes
  • Hardware
  • Software
  • Modified to extract personal information

10
Current Statistics
Source http//www.avira.com/
11
Anti-phishing
  • Ways
  • Browser Capabilites
  • Desktop Agents
  • Token based
  • Digitally Signed Email
  • Domain Monitoring

Client Level
Server Level
Enterprise Level
12
Browser Capabilites
  • Disable pop ups
  • Disable Java runtime support
  • Prevent the storage of non-secure cookies
  • Ensure that downloads are checked by anti-virus
    software
  • Eg Mozilla Firefox Verification

13
Browser Capabilites
14
Desktop Agents
  • Install Anti-virus software which can prevent
    phishing
  • Personal IDS
  • Firewall
  • Toolbars Google, Yahoo, NetCraft

15
Token based Authentication
Token based Authentation
16
Digitally Signed Email
CA Server Validate Senders Certificate
Senders Cert
SMTP
Recipient
Mail Server
Sender
17
Gmail - Verification
18
Domain Monitoring
  • Monitor the registration of Internet domains
    relating to their organisation and the expiry of
    corporate domains
  • Google - Safe Browsing API
  • www.phishtank.com

19
References
  • Honeynet Projecy http//www.honeynet.org
  • The Phishing Guide
  • - Understanding and Preventing Phishing attacks
  • Justice Department - http//www.justice.gov/
  • Statistics - http//www.avira.com/
  • Cross-site scripting attacks http//www.wikipedi
    a.org/
  • Images from PayPal, Gmail
  • Demo - Clemson Webmail Only for Ethical Hacking
    ?
  • RSA Token Authentication - http//www.entrust.com

20
Thank You !!!!
Write a Comment
User Comments (0)
About PowerShow.com