Skip to Main Content
Phishing Exposed
book

Phishing Exposed

by Lance James, Dave Jevans
November 2005
Intermediate to advanced content levelIntermediate to advanced
450 pages
11h 24m
English
Syngress
Content preview from Phishing Exposed
Figure 5.52 Session Initiated as Session ID 0
Immediately following the session establishment, XSS-Proxy starts “fetching”
the main root of the document.domain, which in this case is (see Figure 5.53):
http://us.f900.mail.yahoo.com/ym/login/.rand=5mube7lk6nic9
Figure 5.53 XSS-Proxy Loads Its Code and Starts Fetching the Site in
Fragments
The attacker can now commence the control of the browser’s activity for this
session using the XSS-Proxy administration panel (see Figure 5.54).
www.syngress.com
The Dark Side of the Web • Chapter 5 285
335_PH_EXP_05.qxd 10/7/05 6:02 PM Page 285
Figure 5.54 XSS-Admin Panel
If we click our fetched document, we will see a ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

A Machine-Learning Approach to Phishing Detection and Defense

A Machine-Learning Approach to Phishing Detection and Defense

O.A. Akanbi, Iraj Sadegh Amiri, E. Fazeldehkordi
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

Robin Dreeke, Michele Fincher, Christopher Hadnagy
Ransomware

Ransomware

Allan Liska, Timothy Gallo

Publisher Resources

ISBN: 9781597490306