Contenu connexe
Similaire à Applying Fuzzy Hashing to Phishing Page Identification (20)
Applying Fuzzy Hashing to Phishing Page Identification
- 1. 1© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
APPLYING FUZZY
HASHING TO
PHISHING PAGE
IDENTIFICATION
Adrian Hada, Senior Security Researcher
- 2. 2© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
ABOUT ME
• Senior Security Researcher
• Mostly malware & honeypots
• Sometimes phishing
• @ht_adrian
- 3. 3© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
PHISHING
• We all know what it is
• Users know(?) what it is
- 4. 4© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
IP/DOMAIN REPUTATION
- 5. 5© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
VISUAL HASHING
- 6. 6© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
VISUAL HASHING
Rendering Failures
- 7. 7© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
VISUAL HASHING
Templates
- 8. 8© 2018 KEYSIGHT AND/OR ITS AFFILIATES. ALL RIGHTS RESERVED. |
PHISHING PROCESS
Template
DeployProfit