Skip to Main Content
Phishing Exposed
book

Phishing Exposed

by Lance James, Dave Jevans
November 2005
Intermediate to advanced content levelIntermediate to advanced
450 pages
11h 24m
English
Syngress
Content preview from Phishing Exposed
be able to safely assume that a set of Web-archived security mailing lists are quite
aware of the problem of spam, so some protection schemes should be in place.
We can hope that this will still be a “one-liner” for us to harvest the e-mail
addresses.A one-liner is one set of commands on the UNIX command prompt—
for example:
ls –la | grep –i somefile.txt
To do this, we locate one of the mailing-list submissions with an e-mail
address in it and see how they handle it. Here is one:
> > To: Steve Fletcher; security-basics@securityfocus.com
We want to target security-basics and be able to ensure that we can pick this
e-mail and others out of the HTML and ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

A Machine-Learning Approach to Phishing Detection and Defense

A Machine-Learning Approach to Phishing Detection and Defense

O.A. Akanbi, Iraj Sadegh Amiri, E. Fazeldehkordi
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

Robin Dreeke, Michele Fincher, Christopher Hadnagy
Ransomware

Ransomware

Allan Liska, Timothy Gallo

Publisher Resources

ISBN: 9781597490306