phishing and anti-phishing techniques

20
PHISHING AND ANTI-PHISHING TECHNIQUES Sumanth, Sanath and Anil CpSc 620

Upload: malia

Post on 10-Feb-2016

86 views

Category:

Documents


3 download

DESCRIPTION

Phishing and Anti-phishing techniques. Sumanth, Sanath and Anil CpSc 620. Email Message. Subject: CONFIRM YOUR ACCOUNT Reply-To: “CLEMSON.EDU SUPPORT TEAM" From: "CLEMSON.EDU SUPPORT TEAM“ Date: Tue, 1 Dec 2009 17:42:05 -0400 - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Phishing and  Anti-phishing techniques

PHISHING AND ANTI-PHISHING TECHNIQUESSumanth, Sanath and AnilCpSc 620

Page 2: Phishing and  Anti-phishing techniques

Email Message Subject: CONFIRM YOUR ACCOUNT Reply-To: “CLEMSON.EDU SUPPORT TEAM" From: "CLEMSON.EDU SUPPORT TEAM“ Date: Tue, 1 Dec 2009 17:42:05 -0400 To: <"Undisclosed-Recipient:;"@iocaine.uits.clemson.edu>

Dear CLEMSON.EDU Webmail user,

This mail is to inform all our {CLEMSON.EDU } webmail users that we will be maintaining and upgrading our website in a couple of days from now to a new link. As a Subscriber you are required to click on the link below and login to check if you have access to the new link.

Click Here: www.webmail.clemson.edu

Failure to do this will immediately will render your email address deactivated. Thank you for using CLEMSON.EDU.

CCIT SUPPORT TEAM

Page 3: Phishing and  Anti-phishing techniques

What is Phishing? Phishing scams are typically fraudulent

email messages or websites appearing as legitimate enterprises (e.g., your university, your Internet service provider, your bank).

These scams attempt to gather personal, financial and sensitive information.

Derivation of the word “phishing”.

Page 4: Phishing and  Anti-phishing techniques

How to phish? Compromised Web servers – Email and

IM Port Redirection Botnets Key loggers

Page 5: Phishing and  Anti-phishing techniques

Compromised Web Servers

Attacker

Search for Vulnerable Web servers

Install phishing websites

Send Bulk

EmailCompromise

d Web Server

Found!!

Page 6: Phishing and  Anti-phishing techniques

Port Redirection Server is compromised and a program is

loaded All the port 80 ie., http requests are

redirected to the attacker’s server Software known as ‘redir’ Execute the software using:

redir --lport=80 –l addr=<IP addr orig server> -cport=80 -caddr=IP addr attacker

Page 7: Phishing and  Anti-phishing techniques

Using Botnets Botnets are computers infected by

worms or Trojans and taken over surreptitiously by hackers and brought into networks to send spam, more viruses, or launch denial of service attacks.

Remotely controlled by the attacker. SQL Injection attacks

Page 8: Phishing and  Anti-phishing techniques

SQL Injection attacks

Attacker

Serverhttp request with sql query

Attack the server with some queries to drop the tables:http://localhost/products.asp?productId=0 or 1=1SQL pattern matching: like '%admin%'

Page 9: Phishing and  Anti-phishing techniques

Keyloggers Keyloggers are designed to monitor all

the key strokes Hardware Software

Modified to extract personal information

Page 10: Phishing and  Anti-phishing techniques

Current Statistics

Source: http://www.avira.com/

Page 11: Phishing and  Anti-phishing techniques

Anti-phishing Ways:

Browser Capabilites Desktop Agents Token based Digitally Signed Email Domain Monitoring

Client Level

Server Level

Enterprise Level

Page 12: Phishing and  Anti-phishing techniques

Browser Capabilites Disable pop ups Disable Java runtime support Prevent the storage of non-secure

cookies Ensure that downloads are checked by

anti-virus software Eg: Mozilla Firefox Verification

Page 13: Phishing and  Anti-phishing techniques

Browser Capabilites

Page 14: Phishing and  Anti-phishing techniques

Desktop Agents Install Anti-virus software which can

prevent phishing Personal IDS Firewall Toolbars – Google, Yahoo, NetCraft

Page 15: Phishing and  Anti-phishing techniques

Token based Authentication

Token based Authentation

Page 16: Phishing and  Anti-phishing techniques

Digitally Signed Email

SMTP

Sender Mail Server Recipient

Sender’s Cert

CA ServerValidate Sender’s Certificate

Page 17: Phishing and  Anti-phishing techniques

Gmail - Verification

Page 18: Phishing and  Anti-phishing techniques

Domain Monitoring Monitor the registration of Internet

domains relating to their organisation and the expiry of corporate domains

Google - Safe Browsing API www.phishtank.com

Page 19: Phishing and  Anti-phishing techniques

References Honeynet Projecy – http://www.honeynet.org The Phishing Guide

- Understanding and Preventing Phishing attacks Justice Department - http://www.justice.gov/ Statistics - http://www.avira.com/ Cross-site scripting attacks –

http://www.wikipedia.org/ Images from PayPal, Gmail Demo - Clemson Webmail – Only for Ethical Hacking RSA Token Authentication - http://www.entrust.com

Page 20: Phishing and  Anti-phishing techniques

Thank You !!!!