Phishing Attack on Credential Harvester (Google)

المؤلفون

  • Haytham F. Dhaw 1Dept. of General Section/ Higher Institute of Medical Technology Baniwalid, Libya مؤلف
  • Alhadi A. Alajeili Libyan Center for Engineering Research and information Technology, Baniwalid, Libya مؤلف
  • Khalid M. Ajbrah Dept. of Computer Engineering & IT/ College of Electronic Technology Baniwalid, Libya مؤلف
  • Abdesalam A. Almarimi Dept. of Computer Engineering & IT/ Higher Institute of Engineering Technologies Baniwalid, Libya مؤلف
  • Mohammed A. Abdulsalam Libyan Center for Engineering Research and information Technology, Tripoly, Libya مؤلف

DOI:

https://doi.org/10.58916/jhas.v8i3.179

الكلمات المفتاحية:

Computer security، Web security، Ethical hacking

الملخص

Abstract—Vulnerabilities and weaknesses of web applications are targeting by attackers. Therefore, penetration testing techniques are very important for building strategies which make the system is secure. This paper proposes a penetration testing model for phishing attack which is a common these days. The proposed model was implemented using the latest versions of VMware-machine, kali-Linux, and Windows 10. The Hiddeneye, Ngrok, and bitly tools were used. This was achieved by information gathering method. The obtained results of the phishing attack were identified and their appropriate countermeasures were defined.

التنزيلات

تنزيل البيانات ليس متاحًا بعد.

المراجع

L. Irwin, "The 5 most common types of phishing attack," July.09.2019. Available: https://www.itgovernance.eu/blog/en/the-5-most-common-types-of-phishing-attack. [Accessed Dec.26.2019].

H. Farag. and A. Almarimi, "Investigation of Threats for Common Network Attacks," In the Proceeding of LICTEE2019’02, Tripoli, Libya, Mar, 2019.

Apwg, "Phishing Activity Trends Reports," Oct.26.2019. Available: https://apwg.org/trendsreports/. [Accessed: Dec.25.2019].

Maria V. and other, "Spam and phishing in Q2 2019," Nov.26.2019. Available: https://securelist.com/spam-and-phishing-in-q2-2019/92379/ [Accessed: Dec.30.2019].

Maria V. and other, "Spam and phishing in Q3 2019," Nov.26.2019. Available: https://securelist.com/spam-report-q3-2019/95177/ [Accessed: Dec.30.2019].

S. Phirashisha, G. Mary, K. Ushamary, S. Bobby. "Phishing-An Analysis on the Types, Causes, Preventive Measuresand Case Studies in the Current Situation," Journal of Computer Engineering (IOSR), p-ISSN: 2278-8727, 2015, PP. 01-08.

B. Jan-Willem, M. Lorena, J. Marianne, H. Pieter, "Spear phishing in organisations explained," Information and Computer Security. 25. 00-00. 10.1108/ICS-03-2017-0009, 2017, pp. 593-613.

"Ngrok," Dec.3.2019. [online]. Available: https://ngrok.com/product. [Accessed: Dec.30.2019].

B. Gupta, A. Nalin, P. Kostas. "Defending against Phishing Attacks: Taxonomy of Methods, Current Issues and Future Directions," Telecommunication Systems. 2017, 10.1007/s11235-017-0334-z.

التنزيلات

منشور

2023-09-07

إصدار

القسم

Article

كيفية الاقتباس

Haytham F. Dhaw, Alhadi A. Alajeili, Khalid M. Ajbrah, Abdesalam A. Almarimi, & Mohammed A. Abdulsalam. (2023). Phishing Attack on Credential Harvester (Google). مجلة جامعة بني وليد للعلوم الإنسانية والتطبيقية, 8(3), 448-457. https://doi.org/10.58916/jhas.v8i3.179

الأعمال الأكثر قراءة لنفس المؤلف/المؤلفين

المؤلفات المشابهة

1-10 من 25

يمكنك أيضاً إبدأ بحثاً متقدماً عن المشابهات لهذا المؤلَّف.