Skip to Main Content
Phishing Exposed
book

Phishing Exposed

by Lance James, Dave Jevans
November 2005
Intermediate to advanced content levelIntermediate to advanced
450 pages
11h 24m
English
Syngress
Content preview from Phishing Exposed
Figure 7.9 Disappointing Results
Tracksploitation
One of the many initiatives I personally would like to see is unique techniques
to track phishers by using certain exploits for intelligence. A simple example of
this is the language of Java.Yes, it’s an awful language (don’t hate me, Java lovers!),
but it has some neat perks in the Web world. Simply thought out, Java uses its
own TCP/IP stack to make connections.This feature can be used to thwart
proxies from attackers who do not happen to know this information (a good
number of them don’t think about it). When does a phisher use a proxy? When
he is testing account information to verify whether the logins ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

A Machine-Learning Approach to Phishing Detection and Defense

A Machine-Learning Approach to Phishing Detection and Defense

O.A. Akanbi, Iraj Sadegh Amiri, E. Fazeldehkordi
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

Robin Dreeke, Michele Fincher, Christopher Hadnagy
Ransomware

Ransomware

Allan Liska, Timothy Gallo

Publisher Resources

ISBN: 9781597490306