Exploring Historical & Emerging Phishing Techniques
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
DOI : 10.5121/ijnsa.2013.5402 23
Marc A. Rader1 and Syed (Shawon) M. Rahman2, *
1CapellaUniversity, Minneapolis, MN, USA and Associate Faculty, Cochise CollegeAZ, USA
Mrader3@CapellaUniversity.edu
Associate Professor of Computer Science at the University of Hawaii-Hilo, Hawaii,
USA and Part-time Faculty at Capella University, Minneapolis, USA
*SRahman@hawaii.edu
ABSTRACT
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure.
These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most
organizations rely on training to mitigate and reduce risk of non-technical attacks such as social
engineering. Organizations lump IA training into small modules that personnel typically rush through
because the training programs lack enough depth and creativity to keep a trainee engaged. The key to
retaining knowledge is making the information memorable. This paper describes common and emerging
attack vectors and how to lower and mitigate the associated risks.
KEY WORDS
Security Risks, Phishing, Social Engineering, Cross Site Scripting, Emerging Attack Vectors, DNS poising.
1. INTRODUCTION
Phishing is a social engineering technique that is used to bypass technical controls implemented
to mitigate security risks in information systems. People are the weakest link in any security
program. Phishing capitalizes on this weakness and exploits human nature in order to gain access
to a system or to defraud a person of their assets.
You Might Be from AOL if…
You might be an AOLer If..
tweeCin by Negz [Read Me]
LiL’ Wicked Comz [Read Me]
Fu3 [Read Me]
You have just entered room pot
Archive from Dennis’s old website: http://ds86.net/
This file was labeled “r0cky.html”
You have just entered room "pot."
drunkenly has entered the room.
Troubled: » –Tech N9ne – The Waitress «
diAnaz: poofs gona sign offline for an hr and get on conf then come back
on and be like
denis: just because you didnt have your perms
diAnaz: yahhh partied with my niggas and hoez
diAnaz: all nite
denis: you made a new room
Ryan D Johnson AKA RJ2 – Archive
Hacker Game Documentation
File from: Tuesday, November 21, 2000, 7:27:00 PM
**Turn WordWrap ON**
**Forgive the typos**
Hacker Documentation
o.o – Notes From the Author
1.o – Getting Started
1.1 – Loading Hacker
1.2 – Common Errors………***Read this if there are errors!***
1.3 – Story Line
1.4 – Encryption Statement
2.o – How to play
2.1 – HackerHelp Program
2.2 – Hints
3.o – Miscellaneous
3.1 – Skinning Statement
3.2 – Update History
3.3 – Next Update
3.4 – Additional Help
3.5 – Things to come
4.o – Unreal Visions
->->->->->->->->->->->-<-<-<-<-<-<-<-<-<-<-<-
o.o – Notes From the Author [James Tyrrell]
Now listen all. I, in no way, endorse hacking. Hacking is a bad thing. It’s a crime actually, punishable by jail time. I don’t know how to hack. I do however, understand how server’s work, and with that knowledge created a computer game that allows people to connect to fake servers. In the game, they are aloud to try to break into them. That is all.
Next… This game is NOT realistic. It’s fun tho. Understand that please before emailing myself or anybody else at Unreal Visions!
Hacker is Freeware. It can be uploaded and distributed ANYWHERE as long as it contains the original unedited files it came with. This includes skins, sounds, documentation, and everything else. I want people to recognize MY skill, not someone elses.
I would like to thank the people that gave me little help. I created this program entirely by myself with only the aid of a few websites that had sound archives. Even that isn’t considered much. The beta testers tested to see if my creation was good, the didn’t actually test it however. Unfortunatly, I was in a lack of testers so this first release of the game may be bad. Again, I just want EVERYONE TO KNOW that I created this with no help from Unreal Visions, friends, or associates. It was hard. It took 3.5 months, but it’s first release is complete and I’m happy with it 😀





![tweeCin by Negz [Read Me]](https://i0.wp.com/justinakapaste.com/wp-content/uploads/2014/04/negz.png?fit=394%2C188&ssl=1)
