Skip to Main Content
Phishing Exposed
book

Phishing Exposed

by Lance James, Dave Jevans
November 2005
Intermediate to advanced content levelIntermediate to advanced
450 pages
11h 24m
English
Syngress
Content preview from Phishing Exposed
actually need to accomplish the phish. Second, which is the important detail, is
that all phishers have a login account to the target bank site, so they have an idea
of what occurs before and after a user logs in. In this trivial demonstration, we
know that Login.cgi works such that we can transparently add the URI to the end
of Login.cgi and pass it on. In the chapter covering Web exploitation, we will
demonstrate very creative attacks that can occur that are less basic but extremely
effective.
Tricks of the Trade…
Man in the Middle
Phishing itself is technically an MITM technique, since the phisher is the
attacker in the middle attempting to intercept ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

A Machine-Learning Approach to Phishing Detection and Defense

A Machine-Learning Approach to Phishing Detection and Defense

O.A. Akanbi, Iraj Sadegh Amiri, E. Fazeldehkordi
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

Robin Dreeke, Michele Fincher, Christopher Hadnagy
Ransomware

Ransomware

Allan Liska, Timothy Gallo

Publisher Resources

ISBN: 9781597490306