Submission + - Phishing is possible using Data URI (klevjers.com)
hennikl writes: "Historically, phishing web pages have been hosted by web servers that are either compromised or owned by the attacker. This paper introduces a new
approach to creating working phishing web pages without the direct need of a host. The contents of the phishing web page is simply contained its own
URI (link). We present the appropriate steps to do this, and show a working example of such a phishing page."
approach to creating working phishing web pages without the direct need of a host. The contents of the phishing web page is simply contained its own
URI (link). We present the appropriate steps to do this, and show a working example of such a phishing page."