Pharming
!
[email protected] Y Id : Peyman_shahkar www.Desperado.coo.ir
"#
".
# ,
# $
%&
'
( )
*#+
'
# ,
# -
1 ' " /0) 3- 4
'"#
+- "
+ "
2)
"
"
,+
0
:! 2
# - 2 - 5 6' .
" 7
. ; -
-
7 phishing 1 7 "
phishing
<# 2 .= #
2 7 6> , 1*
#B+ 4
'$ 2
1*7 - C
#
3 pharming 1 + " "0F, *# 7 G H#
-
K.7
' #2
( )
+
' 3#
0' +J(
1
L 2 $?7 9 /O 0'
0( 0 D
E '
+
2 # ,
+
( P
'
+F 0
B+K H#
3
+J3
# , + <#
I7 ! "J0D- C # H#
N , -M
2,
*( 7 6 A
pharming
$ ' *#
*7
- @ 4+
*#+ 6 09-
'
-
<# 1 ' "
'
$ .9
1*7 .= # ?# @= 9
.
8
'2
0 '
$ 2
/7 2 '"
#
K.7 $
*7 0
/# =
' *# J.( <# +R 2 4 Q
"% RU C# = - ' " V#+ ' *7
M\ +
' '" _
' '" 2
0'[ H#
K
" `
- <#
( ) <# bc7 1 ' " *J] $ ' " a# 1+
K.7
'G9
' *# 7 G H# + 6.9 7 <# 1 + *# $
' <#
g
'H C
MH
'<
H
+- "
+
B+K CX
1
0' 67
-+ c '
- + " 47
$g # ". $4 4 . 2
1
#2
+
' H# Td
7
' <# 1 ' /O
H
' '" _
' + 9
1 .7 = " 3 4
'
1*7
"#
@ 1 # _ # < A "_
+- "
$ + "
-
+- " C ( B+K *# 7 G IP
7 ! '" _ N"O
'
( )
' ".
$B+K
' +0,
` "
+
%
+J(
0' "
%
+- "
A
# $" # - 8 2
+ NBoarder GuardM 2 <.= 2
:!
' B+K
*7 <
7 + <#
2 j+ <#
7
H
'" _
i ' .=
0'
7 + <#
1
$*7
C #
[ H# Y + 7 $*7 ActiveX control
:!
+J( H = - $*7
'<
0' $ 2 "
' +0
3 DNS -
' TS
' ^7+- ' "#
C# = ' + " f( $ 2"
'
h J-
+J(
' *#
+,+
B+K *# 7 G
H
+
# C# = H#
e- A 6.9 7
2
"7 .7
NredirectorM \
Z C # H#
+O "% RU C# = <# 1 ' 2
1 ' " /O N ' " *J] $ + "
0' RKX
+ "-
W RX Y
+ K ' E%+.
4 # = $g+7 , k :
C= P $ 2
<# 6P 0(
' *#
#
+
0' H# @
* D=+
/O 1
"#
@
( 1*7 2
body M "O j+ <.= *
+
_#
l= R ^7+-
8
`
j+ <# 1
( ) ' +- "
"% <
( )
*#+
*#+ +
'"
B+K
# $4 . <#
' ( )
".
K.
3#
# # *7
' *7 2
' *7 2
$
"
'B '
$" F# 1 + *J%
Nguard
3
'
( ) ' "# ,
"O
+
0'
! "O
Y + ( ' "
+,
l= R <# "# +-
'$ 2 $
"= k C ( H# <.
1+
(
'"
" $
'6
" #@ =
' 1*7 H +
0'
1 *#+ V# O- 7 ! "7 .7
'
* .# H= -
+, ".
0' H#
# 2 $*7 login
.
/O 6
*0 %
.7 = 3' 8
'
) +J(
9# D C % ' <# 1 ' *8= R "
+- "
0
*0 %
1*7 Nstrong authenticationM +% *#+ V# O-
#2 4 .
' :
l= R
+ " 1 '
"U 1 '
' 7
$*=
' *#+ /O
<.
B+K ^7+-
+O #
8 ' "9' ^7+- +J( <#
*#+ H#
<
' *#+
$ +% *#+ V# O-
1
K.7 " #@ = C ( +- "
0'
' ' @ A " F# $*#+ V# O-
0
2 !+
.#+ 2 *8= R
_
" #@ = +.' = 1
"
#m- "_ +_A
PIN 6 +J(
0'
"# %
+- " $
K.7
+
-
+-
+J(
0'
'G9
2 NSSL (Secure Socket Layer $ 2 &
7
- _
2 - ". $
' *#
0
" @ $
_@
6
"# +-
+_
' ^7+-
47
( )
' H#
$4 Q
' ' " *8= R $ '
+ +J(
H# +
1*7
4 7 " + % <# $ .# 2
1*7
27 +- "
.9
#;! "
_@
"
'
"7 .7 _# & )
7
+ "%
1 + " 47
C % $ _# & )
# 2 CJ%
' -+ c ' p - 2 CJ% H#
0'
1
7G
# ! B+K *# 7 %n
= oF
'
@
$ 7
2 7 ^7+-
7 <#
.#
-
"O
l= R ?D 1
<.=
'6
r+U+ - H# '
+
8
$
+
= "O
l= R *
O
+- "
r+U+ - L #;!
r+U+ -
1*= #;!
1 )+
27 ' V#+ -
'
+, G . $ +
'
( )
"7
2
+
#
<#
'
+ _
@
*0 %
' : A 1 + " #2 * . # "F% "0
+
K.7 C % B+K
"F% #
8
+- "
+- " $6
' n K# * . # q
.# $ +
". 1 + "#
1*9 *#+ 2 *8= R
< h J-
1 ' *8= R $h J- * '"+ %
7
".
2
A K.7
g9
- C % "# . +, C ( <# A % ,+-
111*7 u
H#
111 ' " * 0 %C
"
#@
<#
' "U
/O
!
$q 0 (
#@ $ +
.=
JU 5 %
2
*
*
#@
= $ .9
t
1
]+
^7 s
'
7
K.7
s
$C
2YO
#;c
"= k *
l= R
s
K.7 ".
= j+ <# 2 ' "
"k ".
2 "#v W57 # "O '6
5 t @= Y X+O
3- + H# !
t * # ' @=
' *U+ 7 1*7
v g D
$4+J% +
1
:!
' ^7
6.9 7 C'
"= k
2
*#+ V# O-
, ,+- + @
v "0
+0
' '"
1*7
27$ *
@=
3- 2 7 K.7 ".
# <# ' 2 "U
+(
+<#
%
+ <#
1
1 + "
.
r+U+ - +8
<# " '
TTTTTTTTTTTTTTTTTTTTTTTTT ircert 2