Skip to Main Content
Phishing Exposed
book

Phishing Exposed

by Lance James, Dave Jevans
November 2005
Intermediate to advanced content levelIntermediate to advanced
450 pages
11h 24m
English
Syngress
Content preview from Phishing Exposed
Let’s take a look at an example of a form that shows significant weaknesses
with CSS.Two of the key tricks of performing CSS tests are to make sure that
your activity remains benign and to keep an eye on the placement of the injec-
tion. Just because you try some HTML within the query string and it doesn’t
work, that doesn’t mean there is no weakness. In the next chapter we’ll cover
some detailed examples of filter bypassing to perform CSS even when a vendor
believes it has fixed the problem. Let’s take a look at a simple example.
Comcast is a known target for phishing because it allows phishers to gain
access to personal and possibly confidential infor ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

A Machine-Learning Approach to Phishing Detection and Defense

A Machine-Learning Approach to Phishing Detection and Defense

O.A. Akanbi, Iraj Sadegh Amiri, E. Fazeldehkordi
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

Robin Dreeke, Michele Fincher, Christopher Hadnagy
Ransomware

Ransomware

Allan Liska, Timothy Gallo

Publisher Resources

ISBN: 9781597490306