Главная
Study mode:
on
1
Introduction
2
What is Phishing
3
Spam vs Fishing
4
Fishing Stats
5
Advancements
6
Cost of cybercrime
7
Bad modern advice
8
Perimeter defenses
9
Domain names
10
Perceptual hashing
11
Quantize
12
Resize
13
Discrete cosine transform
14
Difference hash
15
Hamming distance
16
Threat Glass
17
Web Rendering
18
Ice Bucket Challenge
19
Image Extraction
20
Known Good Sites
21
Optimizations
Description:
Explore advanced phishing detection techniques using perceptual hashing in this conference talk from AppSecUSA 2014. Delve into current approaches to combating phishing attacks and discover a novel method presented alongside a new tool. Learn about various perceptual hashing algorithms and their application in identifying malicious sites impersonating popular platforms like PayPal and Amazon. Gain insights into code collection, malicious site identification, and a browser extension designed to leverage these techniques. Understand the differences between spam and phishing, examine cybercrime costs, and critically evaluate modern anti-phishing advice. Investigate perimeter defenses, domain name strategies, and the intricacies of perceptual hashing, including quantization, resizing, and discrete cosine transform. Explore concepts such as difference hash, Hamming distance, and web rendering in the context of phishing detection. Discover optimizations and practical applications through real-world examples like the Ice Bucket Challenge. Read more

Improved Phishing Detection Using Perceptual Hashing - AppSecUSA 2014

OWASP Foundation
Add to list
0:00 / 0:00