© The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature 2022
G. SonowalPhishing and Communication Channelshttps://doi.org/10.1007/978-1-4842-7744-7_4

4. What Does a Phishing URL Look Like?

Gunikhan Sonowal1  
(1)
Tinsukia, Assam, India
 
A uniform resource locator (URL) designates a specific Internet resource such as a web page, a text file, a graphics file, or an application program. These are all examples of resources stored on a server. Figure 4-1 shows the structure of a URL, which is made up of several sections. Specifically, a URL primarily consists of a protocol, subdomain, domain, and top-level domain. A URL may optionally include a path, port, query, or search parameter after the domain.
Figure 4-1

Example of URL ...

Get Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.