Главная
Study mode:
on
1
Introduction
2
How the web works
3
Email example
4
Wells Fargo example
5
Wells Fargo attacker
6
Consequences
7
Techcrunch
8
Criminal activity
9
Conclusion
10
Which systems to look at
11
Digital forensics inspector
12
Victim ethics
13
Nigerian prince scam
14
Indian accent scam
15
FBI
16
ssh commands
17
content management system
18
custom code
19
AOL
Description:
Explore the intricacies of phishing attacks and their consequences in this 33-minute conference talk from BSides 2013. Delve into the mechanics of the web, analyze real-world examples involving Wells Fargo and Techcrunch, and understand the criminal implications of these attacks. Learn about digital forensics, victim ethics, and various scam techniques, including the Nigerian prince and Indian accent scams. Gain insights into the FBI's involvement, ssh commands, content management systems, and custom code vulnerabilities. Discover which systems to scrutinize and how unwitting accomplices can become entangled in phishing schemes.

How to Become an Unwitting Accomplice in a Phishing Attack

Add to list