Anti phishing technology
Download
1 / 38

Anti-Phishing Technology - PowerPoint PPT Presentation


  • 194 Views
  • Updated On :

Anti-Phishing Technology. Chokepoints and Countermeasures. Aaron Emigh Radix Labs [email protected] A Typical Phishing Email. Phishing Information Flow. Step 1: Phish Delivery. Authentication. Reducing False Positives. . Image Recognition. Simple idea: recognize logos.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Anti-Phishing Technology' - Jims


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
Anti phishing technology l.jpg

Anti-Phishing Technology

Chokepoints and Countermeasures

Aaron EmighRadix [email protected]







Image recognition l.jpg
Image Recognition

Simple idea: recognize logos


Image recognition8 l.jpg
Image Recognition

Maybe not so simple…


Image recognition9 l.jpg
Image Recognition

Fully render, then retrieve sub-images







Education l.jpg
Education

Why Johnny can’t identify phish…




Unmask deceptive links l.jpg
Unmask Deceptive Links

<P>To go to a surprising place via a cloaked URL, click on

<A HREF="http:[email protected]">this link.</A>

<P>To go to a surprising place via a cloaked URL with a password, click on

<A HREF="http://security.ebay.com:[email protected]">this link.</A>

<P>To go to a surprising place via an open redirect, click on

<A HREF="http://redirect.ebaysecurity.com?url=phisher.com">this link.</A>

<P>To go to a surprising place via misleading link, click on

<A HREF="http://phisher.com">http://security.ebay.com.</A>


Unmask deceptive links19 l.jpg
Unmask Deceptive Links

<P>To go to a surprising place via a cloaked URL, click on

<A HREF="http:[email protected]">this link.</A>

<P>To go to a surprising place via a cloaked URL with a password, click on

<A HREF="http://security.ebay.com:[email protected]">this link.</A>

<P>To go to a surprising place via an open redirect, click on

<A HREF="http://redirect.ebaysecurity.com?url=phisher.com">this link.</A>

<P>To go to a surprising place via misleading link, click on

<A HREF="http://phisher.com">http://security.ebay.com.</A>









Secure path that was then l.jpg
Secure Path (That Was Then)

Login: aaron

Password: ******












Anti phishing technology38 l.jpg

Anti-Phishing Technology

Chokepoints and Countermeasures

Aaron EmighRadix [email protected]


ad