Section 9.5. Criminal or Victim?


9.5. Criminal or Victim?

It is critical that you determine whether a web site associated with a scam is the sole work of the con artist, or whether a legitimate and innocent site has been hijacked . I would estimate that one-third of the phishing sites that I look at have been hijacked. In almost all of these cases, the owner of the legitimate site is completely unaware of the attack until their ISP notifies them or closes the site down.

The telltale sign of a hijacked site lies in the URL for the first web page of the scam. If the site is under the complete control of the scammer, then the URL will typically point to a page at the top level of the document tree, or perhaps one level down from it. On the other hand, the scammer will try and hide the page within the existing document tree so as to avoid detection by the owner. Sites such as the ones listed here are often located several levels down the tree and often include a directory name that begins with a period. By default, these are hidden from a basic Unix directory listing and from a web index list. The first two of these examples use dot directories, whereas the last two bury their content in directories that are commonly found on Linux systems. All appear to be hijacked servers.

  • /.eBay/signin.html">http://<domain>/.eBay/signin.html

  • /docs/.pay/engpay">http://<domain>/docs/.pay/engpay

  • /manual/ib2/Controller/key/index.html">http://<domain>/manual/ib2/Controller/key/index.html

  • /ws/webalizer">http://<domain>/ws/webalizer

In contrast, if the scammer owns the site, then there is no need for this subterfuge, as these examples illustrate:

  • http://203.71.176.6/visa/

  • http://211.144.199.5/CitizensBank/OnlineBanking/index.html

  • http://citifinancialinf.com/citifinancial/



Internet Forensics
Internet Forensics
ISBN: 059610006X
EAN: 2147483647
Year: 2003
Pages: 121

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net