Network Security Consulting Agency Since 1989 - Specialized in Unix, Windows, TCP/IP and Internet
Text mode: access to the page content
Hervé Schauer Consultants
You are here: Home > Resources > Lectures > Phishing: social engineering and subterfuges
Go to: HSC Trainings
Version française
o Skills & Expertise
o Consulting
o ISO 27001 services
o Vulnerabilities monitoring
o Audit & Assessment
o Penetration tests
o Vunerability assessment (TSAR)
o Forensics
o Training courses
o E-learning
o Agenda
o Past events
o Tutorials
o Thematic index
o Tips
o Lectures
o Courses
o Articles
o Tools (download)
o Vulnerability watch
o Hervé Schauer
o Team
o Job opportunities
o Credentials
o History
o Partnerships
o Associations
   Press and
o HSC Newsletter
o Press review
o Press releases
o Publications
o How to reach us
o Specific inquiries
o Directions to our office
o Hotels near our office
|>|Phishing: social engineering and subterfuges  
> Access to the content HTML Beginning of the presentation
PDF PDF version [2.5 MB]
AdobeFlash Adobe Flash version  
> Description Phishing: social engineering and tricks  
> Context & Dates Talk presented during the Convention Sécurité Management 2005, on 15 June 2005.
> Author Thomas Seyrat 
> Type [ French - HTML ]  
> Abstract &
Table of content
Phishing : principe
Un exemple : le courrier initial
Suite de l'exemple eBay : le site appât
Les cibles du phishing
Les techniques du phishing
Subterfuges graphiques
Exemple (14/01/2005)
Autres techniques de phishing
Cross Site et phishing
Exemple plus proche encore ...
> Related documents [Presentation]  Phishing: Social Engineering and tricks [5 April 2005 - French]
[Presentation]  Cross Site Scripting and Phishing [1 April 2005 - French]
> Copyright © 2005, Hervé Schauer Consultants, all rights reserved.


Last modified on 20 June 2005 at 14:28:23 CET - webmaster@hsc.fr
Information on this server - © 1989-2010 Hervé Schauer Consultants