URL Obscuring COEN 252 Computer Forensics  Thomas Schwarz, S.J. 2004.

Slides:



Advertisements
Similar presentations
Introduction to Web Design Lecture number:. Todays Aim: Introduction to Web-designing and how its done. Modelling websites in HTML.
Advertisements

1. XP 2 * The Web is a collection of files that reside on computers, called Web servers. * Web servers are connected to each other through the Internet.
Basic Internet Terms Digital Design. Arpanet The first Internet prototype created in 1965 by the Department of Defense.
WEB DESIGN TABLES, PAGE LAYOUT AND FORMS. Page Layout Page Layout is an important part of web design Why do you think your page layout is important?
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
4.01 How Web Pages Work.
HTML5 and CSS3 Illustrated Unit E: Inserting and Working with Links
Internet Phishing Not the kind of Fishing you are used to.
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
CIS101 Introduction to Computing
URL Obscuring COEN 152/252 Computer Forensics  Thomas Schwarz, S.J
Introduction to HTML 2006 CIS101. What is the Internet? Global network of computers that are connected and communicate via a series of Protocols Protocols.
Computer Science 103 Chapter 2 HyperText Markup Language (HTML)
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
COMPUTER TERMS PART 1. COOKIE A cookie is a small amount of data generated by a website and saved by your web browser. Its purpose is to remember information.
URL Obscuring COEN 252 Computer Forensics  Thomas Schwarz, S.J
How the World Wide Web Works
COEN 252 Computer Forensics Phishing  Thomas Schwarz, S.J
UNDERSTANDING WEB AND WEB PROJECT PLANNING AND DESIGNING AND EFFECTIVE WEBSITE Garni Dadaian.
The Internet & Web Browsers Business Webpage Design Kelly Seale.
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
WEB SPOOFING by Miguel and Ngan. Content Web Spoofing Demo What is Web Spoofing How the attack works Different types of web spoofing How to spot a spoofed.
Lecturer: Ghadah Aldehim
Lesson 2 — The Internet and the World Wide Web
CSCI-235 Micro-Computer Applications The Internet.
Windows Internet Explorer 9 Chapter 1 Introduction to Internet Explorer.
1 HTML (Set Up Public Folder) Some material on these slides is taken directly from
Introducing Dreamweaver MX 2004
Windows Internet Explorer 9 Chapter 1 Introduction to Internet Explorer.
HTML Essentials HyperText. Why HyperText ? Hypertext is text or pictures which reference other pages which the reader can immediately access Hypertext.
Mohammed Mohsen Links Links are what make the World Wide Web web-like one document on the Web can link to several other documents, and those.
Web Page Design I Retest Terms Review. 1. Web pages are created using a language known as ___________. The coding of this language must follow specific.
Badvertisements: Stealthy Click-Fraud with Unwitting Accessories Mona Gandhi Markus Jakobsson Jacob Ratkiewicz Indiana University at Bloomington Presented.
XHTML Introductory1 Linking and Publishing Basic Web Pages Chapter 3.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
Internet Concept and Terminology. The Internet The Internet is the largest computer system in the world. The Internet is often called the Net, the Information.
Jacqueline A. Gill, Associate Professor EBSCOHOST Click the down or up arrows on your BROWSER to move forwards.
Informatics Computer School CS114 Web Publishing HTML Lesson 2.
Understanding HTML Code
Technology Standards Review. Where do you click to begin entering the address for the Web site to which you would like to go?
URL Obscuring COEN 252 Computer Forensics  Thomas Schwarz, S.J
CHAPTER 11 Spoofing Attack. INTRODUCTION Definition Spoofing is the act of using one machine in the network communication to impersonate another. The.
 The World Wide Web is a collection of electronic documents linked together like a spider web.  These documents are stored on computers called servers.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 1 1 Browser Basics Introduction to the Web and Web Browser Software Tutorial.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
XP New Perspectives on the Internet, 4e Tutorial 2 1 Browser Basics Introduction to Microsoft Internet Explorer and Netscape Navigator.
1 After completing this lesson, you will be able to: Transfer your files to the Internet. Choose a method for posting your Web pages. Use Microsoft’s My.
Internet Presentation. What is the Internet? The worlds largest computer network. A collection of local, regional and national computer networks linked.
Application Block Diagram III. SOFTWARE PLATFORM Figure above shows a network protocol stack for a computer that connects to an Ethernet network and.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
Phishing A practical case study. What is phishing? Phishing involves fraudulently acquiring sensitive information (e.g. passwords, credit card details.
Turning Windows 7 into a Web Server Ch 28. Understanding Internet Information Services.
1 UNIT 13 The World Wide Web Lecturer: Kholood Baselm.
How the Web Works Building a Website – Lesson 1. How People Access the Web Browsers People access websites using software called a web browser. To view.
1 WWW. 2 World Wide Web Major application protocol used on the Internet Simple interface Two concepts –Point –Click.
Jeopardy ProtocolsPartsPrograms General Internet HTML Q $100 Q $200 Q $300 Q $400 Q $500 Q $100 Q $200 Q $300 Q $400 Q $500 Final Jeopardy.
CSI 3125, Preliminaries, page 1 Networking. CSI 3125, Preliminaries, page 2 Networking A network represents interconnection of computers that is capable.
The Internet, Fourth Edition-- Illustrated 1 The Internet – Illustrated Introductory, Fourth Edition Unit B Understanding Browser Basics.
HTML HyperText Markup Language Victoria E. Kozlek.
Microsoft Office 2008 for Mac – Illustrated Unit D: Getting Started with Safari.
1 UNIT 13 The World Wide Web. Introduction 2 The World Wide Web: ▫ Commonly referred to as WWW or the Web. ▫ Is a service on the Internet. It consists.
Blended HTML and CSS Fundamentals 3 rd EDITION Tutorial 2 Creating Links.
Hyperlinks Links for Other Pages. Hyperlink (aka Link) Text (or image) user can click Takes user to different location In general, location can be: On.
HTML5 and CSS3 Illustrated Unit E: Inserting and Working with Links.
Creating simple website in Serif Web Plus And uploading to free hosting A2 ICT.
Agenda Spoofing Types of Spoofing o IP Spoofing o URL spoofing o Referrer spoofing o Caller ID spoofing o Address Spoofing.
CISC103 Web Development Basics: Web site:
ISYM 540 Current Topics in Information System Management
Inserting and Working with Links
Presentation transcript:

URL Obscuring COEN 252 Computer Forensics  Thomas Schwarz, S.J. 2004

URL Obscuring Internet based fraud is gaining quickly in importance. Phishing: The practice of enticing victims with spoofed to visit a fraudulent webpage.

URL Obscuring: Phishing Example Visible Link: Actual Link: Actual website IP: Uses Java program to overwrite the visible address bar in the window:

URL Obscuring: Phishing Example

URL Obscuring Phishs need to hide web-servers URL Obscuring Hide host of web service Use networking protocol

URL Basics Phishs can use obscure features of URL. URL consists of three parts: Service Address of server Location of resource.

URL Basics Scheme, colon double forward slash. An optional user name and password. The internet domain name RCF1037 format IP address as a set of four decimal digits. Port number in decimal notation. (Optional) Path + communication data.

Obscuring URL Addresses Embed URL in other documents Use features in those documents to not show complete URL URL rules interpret this as a userid. Hide this portion of the URL.

Obscuring URL Addresses Use the password field. has IP address Some browsers accept the decimal value 129*256** *256**2 + 2* = for the IP address. Works as a link. Does not work directly in later versions of IE

Obscuring URL Addresses works. Hide the ASCI encoding Or just break up the name: Or use active page technologies (javascript, …) to create fake links.

'Enroll your card with Verified By Visa program' Recent Phish sends SPAM consisting of a single image:

'Enroll your card with Verified By Visa program' The whole text is a single image, linked to the correct citi URL. If the mouse hovers over the image, it displays the correct citi URL. But surrounded by an HTML box that leads to the phishing website.

'Enroll your card with Verified By Visa program' Target webpage has an address bar that is overwritten with a picture with a different URL. Go to

Hiding Hosts Name Look-Up: OS checks HOST file first. Can use HOST file to block out certain sites adservers Affects a single machine. OSLocation Linux/etc/hosts Win95/98/MEC:\windows\hosts Win NT/2000/XP ProC:\winnt\systems32\etc\hosts Win XP HomeC:\windows\system32\drivers\etc\hosts

Subverting IP Look-Up In general, not used for phishing. Economic Damage Hillary for Senate campaign attack. Hiding illegal websites. (Kiddie Porn) DNS Server Sabotage IP Forwarding

Subverting IP Look-Up Port Forwarding URLs allow port numbers. Legitimate business at default port number. Illegitimate at an obscure port number. Screen clicks Embed small picture. Single pixel. Forward from picture to the illegitimate site. Easily detected in HTML source code. Password screens Depending on access control, access to different sites.