Phishing...or What to Call It?

Slides:



Advertisements
Similar presentations
New Teacher Training Fall 2008 Web-based
Advertisements

How to Forward From Lotus Notes to your Preferred address.
PDS Web Pro Custom Web Design Quick Implementation Powerful Patient Portal Option Powerful Tools on Standard Website Click to see Home page example.
1 Welcome to SAPS Webmail. 2 Things we will learn about: 1. Login to mail.
Using SD K12 SharePoint®.
Microsoft Outlook Remote Web Access For HCDE Employees
X10 hosting Sign up for free account. Enter a domain name click continue Then Enter your address Enter a password.
Tracking Unwanted A companion document to Surfing the Information Highway Safely Peter Bilodeau, Educational Consultant (RECIT) Sir Wilfrid Laurier.
Your NEW Social Services Verification Tool
For new coming user, you need to request account before log-in to the system by 1. Go to 2. Click “Register”
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
Learning How to Leave a Comment on a Blog Office of Environmental Information – Office of Information Analysis and Access – Information Access Division.
GForge: A collaborative development environment Presentation by: Geoff Gerfin.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
How to send request for activating your Hotmail account go to site 
1 of 13 Back to Start Working Remotely Your company’s Windows SBS computer network makes it easy for you and your coworkers to work remotely—and to stay.
Get Started in 4 Easy Steps!
Setting up in Outlook Express. Select “Tools” from the toolbar menu.
HOW TO PULL YOUR VOICE MAILS INTO YOUR CLIENT Primary advantage: You will have a permanent.wav file on your PC and you choose when to delete it.
Regal Web Booking Engine Group Booking User Guide.
Reporting Phishing Incidents Heather Kimley June 13, 2012.
How to develop your website Chapter Websites Denise R. E. Copeland
An and Collaboration Suite LI 815 XR Kristen Gripp.
INTRODUCTION TO WORDPRESS. About WordPress The free service that we will use from WordPress is often used as blogging software – very little knowledge.
Understanding Technology Crime Investigation for Managers.
Regional School District 10 Outlook Web Application (OWA)
Creating a Canvas Account! Follow these simple directions to access the course materials for this year.
Configure the Server –Login to the Web-Based Server Manager Username “admin” Password – your password –You can change the.
MIDAS How to use Midas for posting and checking your grades.
IMPLEMENTATION OF OUTLOOK EXPRESS
AXIOMTEK e-Service System User Guide (Internal) AXIOMTEK e-Service System User Guide (Internal) Golden Chiu Customer Service Department Date: 2007/01/02.
What is this “thing”?  Basically it is a website where you would be able to collaborate with the group in a safe and private environment through a powerful.
Ning.com Tutorial. How do you create a Ning.com Social Network?
Google Apps: Mail Calendar Contacts Drive Groups.
Welcome to Internet Banking Demo. Type (corporate website) in the address bar of your web browser Click on Internet Banking.
Accessing Your Blog Access: Click on “Blogs” tab, drop down to your Blog.
UST Connect – Learn how to set up your profile and upload a resume. UST Connect is managed by UST Career Services. (713)
1 Tri-Creek District Google Groups. Google Groups Four Google Groups are used to communicate 1.Tri-Creek Scouts All Cub Scout, Boy Scout, and Venture.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
Pogoplug Pro Presented by Dave Mawdsley, DACS Member, Linux SIG Member (installing and using a Pogoplug Pro)
COLIN O’HANLON & NICK CIGANKO Sam Spade: Network Query Tool.
Instructions for Website How to register: 1. Click “Register” under the banner 1.
 Open the course to add an online class  Click on Add a Page (left side)  Type in a name  Click on Create  Click on the Content Tab  Click on Add.
Online Submission and Management Information -- Authors
Presented by Dave Mawdsley, DACS Member, Linux SIG Member
Outlook 2010 Just the basics!.
Public Schools of Robeson County
Claiming Your Google Listing
Fix Windows Live Mail Error ID 0X
Roadrunner Error 530 Call 1 (888) Toll-free
Stop Using ./ as in ./scriptname
How To Use As Another Account On Gmail
Reset AOL Mail Password Online How to Reset AOL Mail Password Online? Call AOL Technical Support Number to Reset AOL Mail Password by AOL.
CMRTA Website Handbook:.
Internet Worm propagation
New Functionality in ARIN Online
Click on the Create Student Account Link
Accessing your HEAR Register with Gradintelligence on the link provided on your registration . If you are eligible and do not receive a registration.
Blackboard Tutorial (Student)
Getting Full Text Articles Using PubMed and CINAHL
Online Schedule Change Request
Tutorial by Matt Hurst.
Requisition Approval Tracking Module
Contacting CT Support with MS Lync Chat room
Establishing a Tripod Account
Non-Resident Tuition Exception
How to Register For Access
Registration Stand By Me
WInnForum Workspace ~ How to communicate with your groups
How to Register For Access
Presentation transcript:

Phishing...or What to Call It? (a curious attempt at remote compromise) Presented by Dave Mawdsley, DACS Member, Linux SIG Leader April 15, 2015

A Look at My Web Calendar 1 A Look at My Web Calendar At http://madmod.com/calendar.html a customer can click a date—say the 22nd.

The Resulting Form 2 What appears is form with boxes to fill in. (I've filled them in somewhat.) Then clicking on Submit Request sends an e-mail to my account with the data.

What the User Sees Next 3 The form is posted to a cgi-bin Perl script which sends an e-mail to me. The webserver for my website takes the data and uses a sendmail script internally. This has worked properly for years and my customer continue to use it.

So What's This in my E-mail? 4 It has the look and feel of a phishing or denial of service incident. Unfortunately, emails such as this have appeared for a number of days recently.

A Look at the Full Header 5 I was looking for the originator of the e-mail address. I found an IP address that I could use, namely 46.161.41.199 . Using Network Tools I looked up 46.161.41.199 using the whois feature and found a useful e-mail address.

Email #1 6 My first e-mail to complain@bulletproof-web-ru :

E-mail #1 Reply 7 A good response from BulletProof Web Abuse

E-mail #2 Reply 8 A hopeful reply.

E-mail #2 Reply 9 A good response from BulletProof Web Abuse

Phishing...or What to Call It? (a curious attempt at remote compromise) This Presentation 'phishing.odp' can be downloaded from http://madmod.com/freebies.html