Cloned website creation is one of the serious
threat in Wireless network or internet. The password
stealing of humans is done by the hackers mostly through
internet. Nowadays internet is not so safe. Many cyber cases
reported recently based on bad or illegal activities. Safety on
humans is not guaranteed. Likewise nothing is safe in
internet. There is no guarantee in that also. Many of the
hackers were created cloned websites and they are mapping
ip address with the website name with the help of dns
spoofing. There are plenty of softwares available in market
to make an URL that start with https. In this paper we
propose a phishing website creation with the help of Kali
Linux social engineering toolkit. After the creation of cloned
website , use existing anti phishing tools to detect and
prevent the phishing websites. Prevention method mainly
focused on existing web browser plugins . Toolbars, online
websites for anti phishing, Online game for anti phishing.
And finally will do an analysis work on it. Our work mainly
focused on vmware virtual workstation and on my client_
PC. Cloned website created in Kali Linux(VM ware).
Detailed analysis work will be the core part of the work.
Arun Anoop M : He obtained his BTech in Computer Science and
Engineering from cochin university in the year 2008.He completed his
PG diploma in information security and system administration from
DOEACC center, NIT , Calicut and obtained his MTech in
Information Technology from kalasalingam university in the year
2011. Presently he is a PhD scholar under Anna University,Chennai.
He worked as an Assistant Professor in Computer Science and
Engineering, MESCE, kuttippuram, kerala. Now he is on study leave
for doing his FullTime PhD. Before joining MESCE he worked as
teaching assistant in information technology,Kalasalingam university,
krishnankoil, Tamilnadu. He is having 3.11 years of teaching
experience at MESCE and 6months teaching experience at
Kalasalingam University. He has attended many workshops, FDPs
and conferences. His areas of interest are network
security,WSN,digital forensics,Image Forensics,Multimedia security.
He has around 19 conferences and journals. And guided 6 Mtech
Main projects.
Cloning, Phishing, Anti Phishing, DNS Spoofing,
Password Stealing, Kali Linux, Spoofing, Wireless Network,
Social Engineering
We had given brief idea about phishing, its design and
had mentioned some important tools to defend against
phishing. We mentioned design phase based on kali linux
and webhost. After that we analyzed existing antiphishing
plugins -tools based on its performance. In future,
researchers can do dns spoofing to map ip address with
web address.
[1] Phishing, Available:
http://computer.howstuffworks.com/phishing.htm
[2] Phishing,Available:
https://www.phishtank.com/what_is_phishing.php
[3] Phishing,Available:https://www.phishtank.com/index.
php
[4] Phishing,Available:
http://searchsecurity.techtarget.com/definition/phishin
g
[5] Phishing,Available:
http://www.microsoft.com/security/onlineprivacy/
phishing-scams.aspx#Recognize
[6] Phishing,Available:
https://safety.yahoo.com/Security/PHISHINGSITE.
html
[7] Phishing,Available:
https://www.staysafeonline.org/stay-safe-online/keepa-
clean-machine/spam-and-phishing
[8] Srishti Gupta, Ponnurangam Kumaraguru,
Indraprastha Institute of Information Technology,
Delhi,” Emerging Phishing Trends and Effectiveness
of the Anti-Phishing Landing Page”,June 2014.
[9] Safe Browsing, Available:
https://developers.google.com/safe-browsing/
[10] McAfee SiteAdvisor - FREE PLUG-IN, Available:
http://www.siteadvisor.com/download/windows.html
[11] Net Craft toolbar,
Available:http://toolbar.netcraft.com/
[12] Net Craft toolbar plugin, Available:
https://addons.mozilla.org/enus/
firefox/addon/netcraft-toolbar/
[13] EarthLink_Toolbar,Available:
http://www.tucows.com/preview/359635/EarthLink-
Toolbar-For-Internet-Explorer
[14] Cloudmark_Anti-Fraud_Toolbar,Available:
http://www.tacktech.com/news.cfm?subtype=tech&nid
=6074
[15] EarthLink_Toolbar,Available:
http://www.earthlink.net/software/domore.faces?tab=t
oolbar
[16] eBay Toolbar,Available:http://download.cnet.com/eBa
y-Toolbar/3000-12512_4-10153544.html
[17] McAfee_SiteAdvisor,Available:
https://www.siteadvisor.com/final/index.html
[18] GeoTrust’s_TrustWatch_Toolbar,Available:
https://www.geotrust.com/comcasttoolbar/
[19] PC world Article,Available:
http://www.pcworld.com/article/135293/article.html
[20] Phishing,Available:
http://en.wikipedia.org/wiki/Phishing
[21] Anti-Phishing Phil , Available:
https://cups.cs.cmu.edu/antiphishing_phil/
[22] TrustedSec. Available: www.trustedsec.com
[23] You’ve heard of phishing – but what is vishing and
smishing?:Available:
http://www.barfordprimary.co.uk/bham/primary/barfor
d/arenas/websitecontent/web/5.esafetynewsletterissue5-
apr2012.pdf
[24] Anti Phishing phil, Available: http://cups.cs.cmu.edu/
antiphishing_phil/
[25] Anti-phishing,Available:
http://www.ucl.ac.uk/cert/antiphishing/
[26] Phishing scam game, Available: https://www.onguard
online.gov/media/game-0011-phishing-scams