anti phishing technology
Download
Skip this Video
Download Presentation
Anti-Phishing Technology

Loading in 2 Seconds...

play fullscreen
1 / 38

Anti-Phishing Technology - PowerPoint PPT Presentation


  • 194 Views
  • Uploaded on

Anti-Phishing Technology. Chokepoints and Countermeasures. Aaron Emigh Radix Labs [email protected] A Typical Phishing Email. Phishing Information Flow. Step 1: Phish Delivery. Authentication. Reducing False Positives. . Image Recognition. Simple idea: recognize logos.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Anti-Phishing Technology' - Jims


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
anti phishing technology

Anti-Phishing Technology

Chokepoints and Countermeasures

Aaron EmighRadix [email protected]

image recognition
Image Recognition

Simple idea: recognize logos

image recognition8
Image Recognition

Maybe not so simple…

image recognition9
Image Recognition

Fully render, then retrieve sub-images

education
Education

Why Johnny can’t identify phish…

unmask deceptive links
Unmask Deceptive Links

<P>To go to a surprising place via a cloaked URL, click on

<A HREF="http://security.ebay.c[email protected]">this link.</A>

<P>To go to a surprising place via a cloaked URL with a password, click on

<A HREF="http://security.ebay.com:[email protected]">this link.</A>

<P>To go to a surprising place via an open redirect, click on

<A HREF="http://redirect.ebaysecurity.com?url=phisher.com">this link.</A>

<P>To go to a surprising place via misleading link, click on

<A HREF="http://phisher.com">http://security.ebay.com.</A>

unmask deceptive links19
Unmask Deceptive Links

<P>To go to a surprising place via a cloaked URL, click on

<A HREF="http://[email protected]">this link.</A>

<P>To go to a surprising place via a cloaked URL with a password, click on

<A HREF="http://security.ebay.com:[email protected]">this link.</A>

<P>To go to a surprising place via an open redirect, click on

<A HREF="http://redirect.ebaysecurity.com?url=phisher.com">this link.</A>

<P>To go to a surprising place via misleading link, click on

<A HREF="http://phisher.com">http://security.ebay.com.</A>

secure path that was then
Secure Path (That Was Then)

Login: aaron

Password: ******

anti phishing technology38

Anti-Phishing Technology

Chokepoints and Countermeasures

Aaron EmighRadix [email protected]

ad