Skip to Main Content
Phishing Exposed
book

Phishing Exposed

by Lance James, Dave Jevans
November 2005
Intermediate to advanced content levelIntermediate to advanced
450 pages
11h 24m
English
Syngress
Content preview from Phishing Exposed
Based on the results of this minimal organization, we can identify specific
attributes of this spammer:
The hash buster is nearly always connected to the subject.
The subject typically does not end with punctuation. However, if punc-
tuation is included, it is usually an exclamation point.
The file sizes are roughly the same number of lines (between 50 and
140 lines—short compared to most spam messages).
Every one of the forged e-mail addresses claims to come from
yahoo.com.
Every one of the fake account names appears to be repetitive letters fol-
lowed by a number. In particular, the letters are predominantly from the
left-hand side of the keyboar ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

A Machine-Learning Approach to Phishing Detection and Defense

A Machine-Learning Approach to Phishing Detection and Defense

O.A. Akanbi, Iraj Sadegh Amiri, E. Fazeldehkordi
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

Robin Dreeke, Michele Fincher, Christopher Hadnagy
Ransomware

Ransomware

Allan Liska, Timothy Gallo

Publisher Resources

ISBN: 9781597490306