Web Spoofing Presentation
Web Spoofing Presentation
Web Spoofing Presentation
Is MICR0SOFT.COM or
MICROSOFT.COM the correct address
for Microsoft?
Work in the Past
Princeton Part-I
In 1996, “Feltan et al “at Princeton
originated the Term WEB SPOOFING and
explored spoofing attacks in Netscape
Navigator & Internet Explorer.
LogicalLevel CODING
View Level FORMS
URL Rewriting
STEP I
A Phisher could insert a malicious script
inside a product review to attack the user.
The Script would modify the host site so
that the user believes he/she is interacting
with secure site.
this technique is also called as “Cross-
Scripting.”
STEP II
This done by using encoded characters to hide the
destination address of a link.
Ex-
“abc” = "abc”
before transmission.
Advanced Authentication
Two-factor Authentication – Require
proof of two out of three criteria (what
you are, what you have, or what you
know)
Requires some sort of hardware or time
sensitive information
Use a checksum to verify that the
information came from the users
machine and not a phisher.
Prominenet Anti-Phishing Tools
‘Anti-fraud tool bar’ from ‘Cloud
mark’
-based on black-list of bad sites.
‘Trustbar’ from ‘Comodo’