SlideShare a Scribd company logo
3
Most read
5
Most read
7
Most read
Devendra Yadav 31/05/2007
Introduction 1 Phishing Techniques 2 Pharming Techniques 3 Phishing Statistical Highlights 4 Phishing/Pharming Demo 5
In Computing both Phishing and Pharming are  criminal activity  Both Phishing and Pharming are methods used to steal personal information over the Internet User Id/Password Credit Card Number PIN Phishing is typically carried out using email or an instant message, and often directs users to give details at a website  Pharming is a hacker's attack aiming to redirect a website's traffic to another (bogus) website.
Pharming is more dangerous than Phishing In Phishing incorrect client request is sent and if user is little bit intelligent he/she can identify it very easily In Pharming correct Client request is sent and that get redirected to wrong server. So identifying it is difficult for intelligent users also
Technique -1  Link manipulation In this technique hackers manipulate links in such manner that it’s difficult for user to identify whether is page is served form correct website or fake website. Few of such techniques are 1. Misspelled URLs e.g.  http://www.0rkut.com 2. Sub domains  e.g. http://www.yourbank.com.example.com/ 3. Using “@”  e.g. http://www.google.com@members.tripod.com/ Technique -2  Website forgery In this technique hackers alter the address bar 1. Hiding Address bar 2. Altering the content of Address bar using scripts 3. putting image with legitimate URL over address bar 1 2 4 3 Hacker Creates Fake website Send link of website to user using mail/instant messaging User opens link provided by Hacker  User start sending/receiving information from Fake website Hacker 1 Fake website 2 4 3 User
In Pharming attackers try to redirect the user’s requests (web traffic) to a bogus website, for doing this commonly used techniques are: Altering Host File  Host File location %windir%/system32/drivers/etc/hosts  (Windows) /etc/hosts  (Unix) Sample Host file Hijacking DNS Server/Local Network Router
Web Server IP : 64.233.187.99 google.com 64.233.187.99 64.233.187.99 google.com 1 2 3 4 2 IP add. is not specified in Host file IP add. is specified in Host file DNS & Host File
Number of unique phishing reports received in April:  23656 Number of unique phishing sites received in April:  55643 Number of brands hijacked by phishing campaigns in April:  172 Country hosting the most phishing websites in April:    United States No  hostname just IP address:  6 % Percentage of sites not using port 80:  1.5 % Average time online for site:  3.8 days Longest time online for site:  27 days Source: APWG(http://www.antiphishing.org)
Source: APWG(http://www.antiphishing.org)
United State 28.44% France 26.9% Republic of Korea 21.05%, Romania 2.04% China 1.9% Germany 1.9% Russia 1.75% United Kingdom 1.46% Turkey 1.46%, Netherlands 1.17%. Source: APWG(http://www.antiphishing.org)
Live Phishing URLs http://website.lineone.net/~farrago/cia/phish/ebay2.htm http://www.popsite-almere.nl/fotos/nieuws/data/www.anz.com/anzbank/ANZ/Bankmain.htm http://posssit.freehostia.com/bancoposta.online.it/bpol/poste//login-privati1.html http://www.safe-surf.org/cgi-bin/cgiproxy/nph-proxy.pl/000100A/http/www.myspace.com/ http://halifax-online-co-uk.idiotica.co.uk/_mem_/formslogin.asp/ http://session-7393533.nationalcity.com.userpro.tw/corporate/onlineservices/TreasuryMgmt/
Thank You !

More Related Content

PPTX
Different Types of Phishing Attacks
PPTX
Phishing ppt
PPTX
Phishing Presentation
PPTX
Phishing ppt
PDF
Phishing & Pharming Explained.pdf
PPT
P H I S H I N G
PPTX
Phishing Scams: 8 Helpful Tips to Keep You Safe
PPTX
Phishing attack
Different Types of Phishing Attacks
Phishing ppt
Phishing Presentation
Phishing ppt
Phishing & Pharming Explained.pdf
P H I S H I N G
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing attack

What's hot (20)

PPTX
Email phishing and countermeasures
PPTX
Phishing Attacks
PPT
Phishing
PPTX
Phishing Attack : A big Threat
PPTX
PPTX
PPT on Phishing
PPTX
PPTX
Phishing
PPT
Web spoofing
PPTX
Phishing techniques
PPTX
Anti phishing
PPTX
Encryption
PPTX
Social engineering
PPTX
What is Phishing and How can you Avoid it?
PPTX
Cross Site Scripting ( XSS)
PPTX
Hacking
PPTX
Phishing
PPTX
Different types of attacks in internet
PPTX
Ransomware attack
PPT
Phishing attacks ppt
Email phishing and countermeasures
Phishing Attacks
Phishing
Phishing Attack : A big Threat
PPT on Phishing
Phishing
Web spoofing
Phishing techniques
Anti phishing
Encryption
Social engineering
What is Phishing and How can you Avoid it?
Cross Site Scripting ( XSS)
Hacking
Phishing
Different types of attacks in internet
Ransomware attack
Phishing attacks ppt
Ad

Viewers also liked (20)

PPSX
Pharming attack
DOCX
HCG Diet Phase 2 Acceptable Food List
PPTX
Molecular pharming
PPTX
The Difference between Pharming and Phishing
PDF
Mobile Malware
PDF
RDM#2- The Distributed Web
PPTX
Mouse trapping 101
PPTX
e-branding
PPTX
Pharming y phising
PPT
Spyware and adware
PDF
Spyware
DOC
Ip spoofing (seminar report)
PDF
DefCamp 2013 - Night talks - Hacking, phreaking, carding & social engineering...
PPT
Social Engineering | #ARMSec2015
PPTX
06 e advertising
PPTX
E branding
PPT
ip spoofing
PDF
Social Engineering, or hacking people
PPTX
e – Branding
Pharming attack
HCG Diet Phase 2 Acceptable Food List
Molecular pharming
The Difference between Pharming and Phishing
Mobile Malware
RDM#2- The Distributed Web
Mouse trapping 101
e-branding
Pharming y phising
Spyware and adware
Spyware
Ip spoofing (seminar report)
DefCamp 2013 - Night talks - Hacking, phreaking, carding & social engineering...
Social Engineering | #ARMSec2015
06 e advertising
E branding
ip spoofing
Social Engineering, or hacking people
e – Branding
Ad

Similar to Phishing & Pharming (20)

PPT
Exploring And Investigating New Dimensions In Phishing
PDF
Improving Phishing URL Detection Using Fuzzy Association Mining
PDF
A Review on Antiphishing Framework
PDF
Study on Phishing Attacks and Antiphishing Tools
PDF
need help with a term paper 8 pages Write a term paper that discusse.pdf
PDF
Web phish detection (an evolutionary approach)
PDF
Web phish detection (an evolutionary approach)
PDF
Phishing Website Detection using Classification Algorithms
PDF
phishingppt-160209144204.pdf
PDF
E Mail Phishing Prevention and Detection
PDF
Aa4502172179
PPTX
phishing-technology-730-J1A0e1Q.pptx
PPTX
Online security and payment system
PDF
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
PDF
Detecting malicious URLs using binary classification through ada boost algori...
PPTX
Phishing
PDF
Bh4101338342
PDF
Phishing attack types and mitigation strategies
PPTX
Phishing attack, with SSL Encryption and HTTPS Working
PPTX
Phishing
Exploring And Investigating New Dimensions In Phishing
Improving Phishing URL Detection Using Fuzzy Association Mining
A Review on Antiphishing Framework
Study on Phishing Attacks and Antiphishing Tools
need help with a term paper 8 pages Write a term paper that discusse.pdf
Web phish detection (an evolutionary approach)
Web phish detection (an evolutionary approach)
Phishing Website Detection using Classification Algorithms
phishingppt-160209144204.pdf
E Mail Phishing Prevention and Detection
Aa4502172179
phishing-technology-730-J1A0e1Q.pptx
Online security and payment system
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
Detecting malicious URLs using binary classification through ada boost algori...
Phishing
Bh4101338342
Phishing attack types and mitigation strategies
Phishing attack, with SSL Encryption and HTTPS Working
Phishing

Recently uploaded (20)

PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Empathic Computing: Creating Shared Understanding
PPT
Teaching material agriculture food technology
PDF
Modernizing your data center with Dell and AMD
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Approach and Philosophy of On baking technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Machine learning based COVID-19 study performance prediction
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Electronic commerce courselecture one. Pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
A Presentation on Artificial Intelligence
PDF
Encapsulation theory and applications.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Digital-Transformation-Roadmap-for-Companies.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Per capita expenditure prediction using model stacking based on satellite ima...
Empathic Computing: Creating Shared Understanding
Teaching material agriculture food technology
Modernizing your data center with Dell and AMD
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Approach and Philosophy of On baking technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Machine learning based COVID-19 study performance prediction
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Electronic commerce courselecture one. Pdf
Encapsulation_ Review paper, used for researhc scholars
A Presentation on Artificial Intelligence
Encapsulation theory and applications.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
NewMind AI Monthly Chronicles - July 2025
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...

Phishing & Pharming

  • 2. Introduction 1 Phishing Techniques 2 Pharming Techniques 3 Phishing Statistical Highlights 4 Phishing/Pharming Demo 5
  • 3. In Computing both Phishing and Pharming are criminal activity Both Phishing and Pharming are methods used to steal personal information over the Internet User Id/Password Credit Card Number PIN Phishing is typically carried out using email or an instant message, and often directs users to give details at a website Pharming is a hacker's attack aiming to redirect a website's traffic to another (bogus) website.
  • 4. Pharming is more dangerous than Phishing In Phishing incorrect client request is sent and if user is little bit intelligent he/she can identify it very easily In Pharming correct Client request is sent and that get redirected to wrong server. So identifying it is difficult for intelligent users also
  • 5. Technique -1 Link manipulation In this technique hackers manipulate links in such manner that it’s difficult for user to identify whether is page is served form correct website or fake website. Few of such techniques are 1. Misspelled URLs e.g. http://www.0rkut.com 2. Sub domains e.g. http://www.yourbank.com.example.com/ 3. Using “@” e.g. http://www.google.com@members.tripod.com/ Technique -2 Website forgery In this technique hackers alter the address bar 1. Hiding Address bar 2. Altering the content of Address bar using scripts 3. putting image with legitimate URL over address bar 1 2 4 3 Hacker Creates Fake website Send link of website to user using mail/instant messaging User opens link provided by Hacker User start sending/receiving information from Fake website Hacker 1 Fake website 2 4 3 User
  • 6. In Pharming attackers try to redirect the user’s requests (web traffic) to a bogus website, for doing this commonly used techniques are: Altering Host File Host File location %windir%/system32/drivers/etc/hosts (Windows) /etc/hosts (Unix) Sample Host file Hijacking DNS Server/Local Network Router
  • 7. Web Server IP : 64.233.187.99 google.com 64.233.187.99 64.233.187.99 google.com 1 2 3 4 2 IP add. is not specified in Host file IP add. is specified in Host file DNS & Host File
  • 8. Number of unique phishing reports received in April: 23656 Number of unique phishing sites received in April: 55643 Number of brands hijacked by phishing campaigns in April: 172 Country hosting the most phishing websites in April: United States No hostname just IP address: 6 % Percentage of sites not using port 80: 1.5 % Average time online for site: 3.8 days Longest time online for site: 27 days Source: APWG(http://www.antiphishing.org)
  • 10. United State 28.44% France 26.9% Republic of Korea 21.05%, Romania 2.04% China 1.9% Germany 1.9% Russia 1.75% United Kingdom 1.46% Turkey 1.46%, Netherlands 1.17%. Source: APWG(http://www.antiphishing.org)
  • 11. Live Phishing URLs http://website.lineone.net/~farrago/cia/phish/ebay2.htm http://www.popsite-almere.nl/fotos/nieuws/data/www.anz.com/anzbank/ANZ/Bankmain.htm http://posssit.freehostia.com/bancoposta.online.it/bpol/poste//login-privati1.html http://www.safe-surf.org/cgi-bin/cgiproxy/nph-proxy.pl/000100A/http/www.myspace.com/ http://halifax-online-co-uk.idiotica.co.uk/_mem_/formslogin.asp/ http://session-7393533.nationalcity.com.userpro.tw/corporate/onlineservices/TreasuryMgmt/