{"title":"“接近”是一个内置匿名群发邮件的一体化自动网络钓鱼攻击工具","authors":"Lingeshvaaran Linganathar, Vinesha Selvarajah","doi":"10.2991/ahis.k.210913.066","DOIUrl":null,"url":null,"abstract":"Phishing is a rapidly rising threat in the cyber world, costing internet users billions of dollars per year. It is an illicit operation that requires the use of a mixture of social engineering and technologies to gather personal information from Internet users. Many cyber-attacks are distributed through mechanisms that leverage end-user vulnerabilities, rendering end-users the weakest link in the security chain. Phishing techniques can be performed in various methods; however, email is the most popular medium. This paper explores why users need to understand phishing and the need for a system that demonstrates how real-world phishing attacks are conducted. The developed system is a Linux Based python tool named “Proximity” an All-in-One Automated Phishing Attack Tool with a built-in Anonymous Mass Mailer.","PeriodicalId":417648,"journal":{"name":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"“Proximity” an All-in-One Automated Phishing Attack Tool with Built in Anonymous Mass Mailer\",\"authors\":\"Lingeshvaaran Linganathar, Vinesha Selvarajah\",\"doi\":\"10.2991/ahis.k.210913.066\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Phishing is a rapidly rising threat in the cyber world, costing internet users billions of dollars per year. It is an illicit operation that requires the use of a mixture of social engineering and technologies to gather personal information from Internet users. Many cyber-attacks are distributed through mechanisms that leverage end-user vulnerabilities, rendering end-users the weakest link in the security chain. Phishing techniques can be performed in various methods; however, email is the most popular medium. This paper explores why users need to understand phishing and the need for a system that demonstrates how real-world phishing attacks are conducted. The developed system is a Linux Based python tool named “Proximity” an All-in-One Automated Phishing Attack Tool with a built-in Anonymous Mass Mailer.\",\"PeriodicalId\":417648,\"journal\":{\"name\":\"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)\",\"volume\":\"189 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2991/ahis.k.210913.066\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2991/ahis.k.210913.066","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
“Proximity” an All-in-One Automated Phishing Attack Tool with Built in Anonymous Mass Mailer
Phishing is a rapidly rising threat in the cyber world, costing internet users billions of dollars per year. It is an illicit operation that requires the use of a mixture of social engineering and technologies to gather personal information from Internet users. Many cyber-attacks are distributed through mechanisms that leverage end-user vulnerabilities, rendering end-users the weakest link in the security chain. Phishing techniques can be performed in various methods; however, email is the most popular medium. This paper explores why users need to understand phishing and the need for a system that demonstrates how real-world phishing attacks are conducted. The developed system is a Linux Based python tool named “Proximity” an All-in-One Automated Phishing Attack Tool with a built-in Anonymous Mass Mailer.