Phishing Seminar Report
Phishing Seminar Report
Phishing Seminar Report
CHAPTER 1
INTRODUCTION
Dept of CSE 1
GSSSIETW, Mysore
Phishing
CHAPTER 2
PHISHING TECHNIQUES
LINK MANIPULATION
Most methods of Phishing use some form of technical deception designed to make
a link in an e-mail appear to belong to the spoofed organization. Misspelled URLs or the
use of sub domains are common tricks used by Phishers. In the following example,
http://www.yourbank.example.com/, it appears as though the URL will take you to the
example section of the yourbank website; actually this URL points to the "yourbank" (i.e.
Phishing) section of the example website.
An old method of spoofing used links containing the '@' symbol, originally
intended as a way to include a username and password. For example,
http://www.google.com@members.tripod.com/ might deceive a casual observer into
believing that it will open a page on www.google.com, whereas it actually directs the
browser to a page on members.tripod.com, using a username of www.google.com: the
page opens normally, regardless of the username supplied.
FILTER EVASION
Phishers have used images instead of text to make it harder for anti-
Phishing filters to detect text commonly used in Phishing e-mails.
WEBSITE FORGERY
Once a victim visits the Phishing website the deception is not over. Some
Phishing scams use JavaScript commands in order to alter the address bar. This is done
either by placing a picture of a legitimate URL over the address bar, or by closing the
original address bar and opening a new one with the legitimate URL.
Fig 2.1 An website which does not shows real address bar
PHONE PHISHING
Messages that claimed to be from a bank told users to dial a phone number
regarding problems with their bank accounts. Once the phone number (owned by the
Phishers) was dialed, prompts told users to enter their account numbers and PIN. Vishing
(voice Phishing) sometimes uses fake caller-ID data to give the appearance that calls come
from a trusted organization.
CHAPTER 3
REASONS OF PHISHING
Let's consider some of the reasons people fall victim to Phishing scams.
TRUST OF AUTHORITY
When a Phishing email arrives marked as “High Priority” that threatens to close
our bank account unless we update our data immediately, it engages the same authority
response mechanisms that we've obeyed for millennia. In our modern culture, the old
markers of authority – physical strength, aggressiveness, ruthlessness – have largely
given way to signs of economic power. “He's richer than I am, so he must be a better
man”. If you equate market capitalization with GDP then Bank of America is the 28th
most powerful country in the world. If you receive a personal email purported to come
from BOA questioning the validity of your account data, you will have a strong
compulsion to respond, and respond quickly.
Most people feel that they can tell an honest man by looking him in the eye. You
can spot a “professional” panhandler before he gets to the fourth word in his spiel.
Without clues from the verbal and physical realms, our ability to determine the validity of
business transactions is diminished. This is a cornerstone of the direct mail advertising
business. If a piece of mail resembles some type of official correspondence, you are much
more likely to open it. Car dealers send sales flyers in manila envelopes stamped
“Official Business” that look like the envelopes tax refund checks are mailed in. Banks
send credit card offers in large cardboard envelopes that are almost indistinguishable
from FedEx overnight packages. Political advertisements are adorned with all manner of
patriotic symbols to help us link the candidate with our nationalistic feelings.
E-MAIL AND WEB PAGES CAN LOOK REAL
The use of symbols laden with familiarity and repute lends legitimacy (or the
illusion of legitimacy) to information—whether accurate or fraudulent—that is placed on
the imitating page. Deception is possible because the symbols that represent a trusted
company are no more 'real' than the symbols that are reproduced for a fictitious company.
Certain elements of dynamic web content can be difficult to copy directly but are often
easy enough to fake, especially when 100% accuracy is not required. Email messages are
usually easier to replicate than web pages since their elements are predominately text or
static HTML and associated images. Hyperlinks are easily subverted since the visible tag
does not have to match the URL that your click will actually redirect your browser to.
The link can look like
http://bankofamerica.com/login but the URL could actually link to
http://bankofcrime.com/got_your_login
CHAPTER 4
ANTI PHISHING TECHNIQUES
Spam Filters
Anti-Phishing Toolbars
To identify a page as a phishing site, there are a variety of methods that can be
used, such as white lists (lists of known safe sites), blacklists (lists of known fraudulent
sites), various heuristics to see if a URL is similar to a well-known URL, and community
ratings. The toolbars examined here employ different combinations of these methods. By
using publicly available information provided on the toolbar download web sites as well
as observations from using each toolbar we get a basic understanding of how each toolbar
functions. Some of the toolbars that are used for anti-phishing are
1) eBay Toolbar
The eBay Toolbar uses a combination of heuristics and blacklists. The toolbar
also gives users the ability to report phishing sites, which will then be verified before
being blacklisted.
4) McAfee SiteAdvisor
SiteAdvisor claims to detect not just phishing websites, but any sites that send
spam, offer downloads containing spyware, or engage in other similar bad practices. The
determination is made by a combination of automated heuristics and manual verification.
8) Spoofguard
Spoofguard does not use white lists or blacklists. Instead, the toolbar employs a
series of heuristics to identify phishing pages.
9) AntiPhish
AntiPhish is an academic solution which keeps track of where sensitive
information is being submitted to.
those who are not allowed for access. So, the major concern for any user is to safeguard
his/her password. The password can be cracked with the attacks such as Guessing attack,
Brute-force attack, Dictionary attack, Phishing attack etc.,.
Another problem regarding password is single password problem where the user uses a
single password for both vulnerable sites and financial sites. The hackers can break into
the vulnerable sites that simply stores username and password and apply those retrieved
combination of username and password on high security sites such as banking sites.
All these problems at a single stroke can be solved by hashing the master password using
domain name as key on client side. Some of the applications/tools that use this powerful
technique are
1) Password Composer
This extension [25] puts a tiny red icon to the left of a password entry field. If one
clicks on this icon, the password field is overlaid with a replacement input, where one can
supply a single, secure password (Master Password).
3) Password generator
Password Generator gets the hostname from the page's URL and mixes it together
with one’s personal master password using a little cryptographic magic MD5. It always
gets the same result if given that hostname and master password, but will never get that
result if either changes.
4) Hassapass
Hasspass automatically generates strong passwords from a master password and a
parameter like domain name. The password generation is performed inside this very
browser window in JavaScript
5) Genpass
GenPass is a JavaScript/MD5 bookmarklet-based password generator. GenPass is
no longer being updated. Presently consider using SuperGenPass; however, note that
SuperGenPass is not compatible with GenPass—given the same input, they generate
different passwords.
6) Password Hasher
When the master key is given to Password Hasher and it enters the hash word into
the site's password field. A hash word is the result of scrambling the master key with a
site tag. Click on a # marker next to a password field or press the Control-F6 key
combination when in a password field or choose Password Hasher from either the Tools
menu or the right-click popup menu on a password field to enter the master key.
7) Pwdhash
Pwdhash is a browser extension that transparently converts a user's password into
a domain-specific password. The user can activate this hashing by choosing passwords
that start with a special prefix (@@) or by pressing a special password key (F2).
Pwdhash automatically replaces the contents of these password fields with a one-way
hash of the pair (password, domain-name).
Based on the features like application type, hashing algorithm, security, password
strength, spoof proof, visibility to webpage, visibility to user etc., Pwdhash is the best
among the above mentioned applications. But some of its disadvantages are as follows
a) Invisible to user - Password hashing done by Pwdhash is invisible to user. If this
extension stops working, user will not know about this, i.e., passwords will not be
hashed.
CHAPTER 5
ANTI-PHISHING
SOCIAL RESPONSES
People can take steps to avoid Phishing attempts by slightly modifying their
browsing habits. When contacted about an account needing to be "verified" (or any other
topic used by Phishers), it is a sensible precaution to contact the company from which the
e-mail apparently originates to check that the e-mail is legitimate. Alternatively, the
address that the individual knows is the company's genuine website can be typed into the
address bar of the browser, rather than trusting any hyperlinks in the suspected Phishing
message.
Nearly all legitimate e-mail messages from companies to their customers contain
an item of information that is not readily available to Phishers. Some companies, for
example PayPal, always address their customers by their username in e-mails, so if an e-
mail addresses the recipient in a generic fashion ("Dear PayPal customer") it is likely to
be an attempt at Phishing. E-mails from banks and credit card companies often include
partial account numbers. However, recent research has shown that the public do not
typically distinguish between the first few digits and the last few digits of an account
number—a significant problem since the first few digits are often the same for all clients
of a financial institution. People can be trained to have their suspicion aroused if the
message does not contain any specific personal information. Phishing attempts in early
2006, however, used personalized information, which makes it unsafe to assume that the
presence of personal information alone guarantees that a message is legitimate.
Furthermore, another recent study concluded in part that the presence of personal
information does not significantly affect the success rate of Phishing attacks, which
suggests that most people do not pay attention to such details.
TECHNICAL RESPONSES
Most Phishing websites are secure websites, meaning that SSL with strong
cryptography is used for server authentication, where the website's URL is used as
identifier. The problem is that users often do not know or recognize the URL of the
legitimate sites they intend to connect to, so that the authentication becomes meaningless.
A condition for meaningful server authentication is to have a server identifier that is
meaningful to the user. Simply displaying the domain name for the visited website as
some some anti-Phishing toolbars do is not sufficient. A better approach is the pet name
extension for Firefox which lets users type in their own labels for websites, so they can
later recognize when they have returned to the site. If the site is not recognized, then the
software may either warn the user or block the site outright. This represents user-centric
identity management of server identities.
Some suggest that a graphical image selected by the user is better than a pet name
The Bank of America's website is one of several that ask users to select a personal
image, and display this user-selected image with any forms that request a password.
Users of the bank's online services are instructed to enter a password only when they see
the image they selected. However, a recent study suggests few users refrain from entering
their password when images are absent. In addition, this feature (like other forms of two-
factor authentication) is susceptible to other attacks.
Security skins are a related technique that involves overlaying a user-selected
image onto the login form as a visual cue that the form is legitimate. Unlike the website-
based image schemes, however, the image itself is shared only between the user and the
browser, and not between the user and the website. The scheme also relies on a mutual
authentication protocol, which makes it less vulnerable to attacks that affect user-only
authentication schemes.
Specialized spam filters can reduce the number of Phishing e-mails that reach
their addressees' inboxes. These approaches rely on machine learning and natural
language processing approaches to classify Phishing e-mails.
Several companies offer banks and other organizations likely to suffer from
Phishing scams round-the-clock services to monitor, analyze and assist in shutting down
Phishing websites. Individuals can contribute by reporting Phishing to both volunteer and
industry groups, such as PhishTank.
LEGAL RESPONSES
On January 26, 2004, the U.S. Federal Trade Commission filed the first
lawsuit against a suspected Phisher. The defendant, a Californian teenager, allegedly
created a webpage designed to look like the America Online website, and used it to steal
credit card information. In the United States, Senator Patrick Leahy introduced the Anti-
Phishing Act of 2005. Companies have also joined the effort to crack down on Phishing.
CHAPTER 6
HOW ANTI-PHISHING SOFTWARE WORKS
Protection in enabled, the sites are downloaded into a list and checked for any anti-
phishing services. A warning sign will appear if any suspicious activity is detected. The
Netcraft toolbar makes use of a risk rating system, allowing you the option of entering a
password (or not). TrustWatch makes the Internet Explorer toolbar, and can help validate
a Web site and provide a site report when needed. This option also allows you to review
all suspected sites and find out which ones use SSL technology. Earthlink Toolbar with
ScamBlocker will verify any popup messages that you may encounter as you visit a site,
and can help you find out all the details on current phishing scams.
Anti-phishing software is designed to track websites and monitor activity; any
suspicious behaviour can be automatically reported, and even reviewed as a report after a
period of time. Anti-phishing toolbars can help protect your privacy and reduce the risk
of landing at a false or insecure URL. Although some people have concerns over how
valuabe anti-phishing software and toolbars may be, security threats can be reduced
considerably when they are managed by the browser program. Other companies that are
trained in computer security are investigating other ways to report phishing issues;
programs are being designed that can analyze web addresses for fraudulent behavior
through new tactics, and cross-checking domain names for validity.
The best and in most using Anti-Phishing Software is Netcraft Anti-Phishing Toolbar
Advantages
Disadvantages
• No single technology will completely stop phishing. So Phishing attacks can not
be completely stopped
• Even Anti-Phishing software's should be upgraded with respect to the Phishing
attacks.
CHAPTER 8
FEW SNAPSHOTS OF PHISHING WEBSITES
CONCLUSION
BIBLIOGRAPHY
[1] http://en.wikipedia.org/
[2] http://webopedia.com/
[3] http://computerworld.com/
[4] http://www.anti-phishing.info/
[5] http://lorrie.cranor.org/