Web application security - the fast guide Chapter 5: Attack Execution - the client | Page 15
Phishing
Attack requirement:
1. victim convinced that the message
is sent by legitimate party
2. the victim clicks on the fake link to
access the phished site that
collect sensitive data.
Attack process
BRAND
1. use a compromised machine or a
shared one to escape tracking.
2. Use the compromised machine to
send email that lead to the
phished version of the site
3. Victims will visit phished site and
provide sensitive information.
4. Information are directly used to
benefit before the scam get
disclosed.
2017-05-10
Web Application Security Fast Guide (book slides)
By Dr.Sami Khiami
Slide 15