Skip to Main Content
Phishing Exposed
book

Phishing Exposed

by Lance James, Dave Jevans
November 2005
Intermediate to advanced content levelIntermediate to advanced
450 pages
11h 24m
English
Syngress
Content preview from Phishing Exposed
These are a couple of the many tricks that we can use when performing
what I call tracksploitation against phishers and other cyber-criminals. Brought up
in the previous chapter was the fact that the A-311 PHP reader has a bug in the
hexadecimal converter function as well, allowing cross-site scripting.This could
make room for an interactive Web bug trick to get more information about the
attackers, including IP addresses behind proxies and even what sites they fre-
quently visited. Fortunately, and unfortunately, the law requires a balance, so my
ideas of what should be done might not agree with the rest of the world’s when
it comes to privacy. Since ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

A Machine-Learning Approach to Phishing Detection and Defense

A Machine-Learning Approach to Phishing Detection and Defense

O.A. Akanbi, Iraj Sadegh Amiri, E. Fazeldehkordi
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

Robin Dreeke, Michele Fincher, Christopher Hadnagy
Ransomware

Ransomware

Allan Liska, Timothy Gallo

Publisher Resources

ISBN: 9781597490306