
Figure 7.9 Disappointing Results
Tracksploitation
One of the many initiatives I personally would like to see is unique techniques
to track phishers by using certain exploits for intelligence. A simple example of
this is the language of Java.Yes, it’s an awful language (don’t hate me, Java lovers!),
but it has some neat perks in the Web world. Simply thought out, Java uses its
own TCP/IP stack to make connections.This feature can be used to thwart
proxies from attackers who do not happen to know this information (a good
number of them don’t think about it). When does a phisher use a proxy? When
he is testing account information to verify whether the logins ...