Identifying Vulnerable Websites by Analysis of Common Strings in Phishing URLs

Provided by: University of Alabama
Topic: Security
Format: PDF
It has been shown that most phishing sites are created by means of a vulnerable web server being repurposed by a phisher to host a counterfeit website without the knowledge of the server's owner. In this paper, the authors examine common vulnerabilities which allow these phishing sites to be created and suggest a method for identifying common attack methods, as well as, help inform webmasters and their hosting companies in ways that help them to defend their servers. Their method involves applying a longest common substring algorithm to known phishing URLs, and investigating the results of that string to identify common vulnerabilities, exploits, and attack tools which may be prevalent among those who hack servers for phishing.

Find By Topic