exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 6 of 6 RSS Feed

Files

Iframe URI Phishing
Posted Apr 23, 2013
Authored by G2

This is a brief tutorial that discusses obfuscation techniques used by phishers.

tags | paper
SHA-256 | 4c282764be11f363487575a3810708ce4b9779823e5dbdad0c980365b13992d5
Remote Internal Phishing And Location Bar And SSL Indicator Falsification
Posted Dec 12, 2010
Authored by 599eme Man, Jordi Chancel

Whitepaper called Remote Internal Phishing and Location Bar and SSL Indicator Falsification. Written in French.

tags | paper, remote
SHA-256 | 0d5d742362363217a84b8ce97b7c039fd834ab2ce631eaf909021a53799585b0
Whitepaper Called Phishing And Anti-Phishing
Posted Apr 30, 2010
Authored by Rockey Killer

Whitepaper called Phishing and Anti-Phishing.

tags | paper
SHA-256 | 97a9b959e96f8d68cdd0466a74e7da4f68b3f4fa5527a93c95c365005fd0655f
Whitepaper Called XSS And Iframe Phishing
Posted Jul 8, 2009
Authored by 599eme Man

This whitepaper discusses the use of cross site scripting and iframe injection when performing phishing attempts.

tags | paper, xss
SHA-256 | 92d2e388e627a22176d3cf95df9244027d7a33e2a5ee6c88c835f004ce97179e
Phishing-101.txt
Posted Mar 3, 2008
Authored by IMC Graham Phisher

Small write-up called Phishing 101 - Effective Phishing.

tags | paper
SHA-256 | 1db0a3f2844afd0e72547450678eb082020a456230d4a2ed3e4e1c0ff2eefddd
cmucylab06018.pdf
Posted Dec 6, 2006
Authored by Lorrie Cranor, Serge Egelman, Jason Hong, Yue Zhang

Phinding Phish - An Evaluation Of Anti-Phishing Toolbars.

tags | paper
SHA-256 | 39a4081ef151734c39ea676878e7857228973e9ae86a267caf8150b6e2836069
Page 1 of 1
Back1Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close