dungeon29 commited on
Commit
2a37da2
·
verified ·
1 Parent(s): f1ed773

Upload knowledge_base.txt

Browse files
Files changed (1) hide show
  1. knowledge_base.txt +23 -0
knowledge_base.txt ADDED
@@ -0,0 +1,23 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ # Phishing Knowledge Base
2
+
3
+ ## Common Phishing Indicators
4
+ 1. **Urgency and Threats**: Phishing emails often use urgent language (e.g., "Account Suspended", "Immediate Action Required") to panic users into clicking without thinking.
5
+ 2. **Mismatched URLs**: The visible link text (e.g., "paypal.com") does not match the actual destination URL (e.g., "paypal-secure-login.com").
6
+ 3. **Generic Greetings**: Legitimate organizations usually use your name. Phishing emails often use "Dear Customer" or "Dear User".
7
+ 4. **Request for Personal Information**: Legitimate companies rarely ask for sensitive info (passwords, SSN) via email.
8
+ 5. **Suspicious Domains**: Look for misspellings (e.g., "goog1e.com", "paypaI.com") or unusual TLDs.
9
+
10
+ ## URL Analysis Techniques
11
+ - **Typosquatting**: Attackers register domains that look similar to popular domains (e.g., "faceboook.com").
12
+ - **Subdomain Abuse**: Using long subdomains to hide the actual domain (e.g., "paypal.com.security-check.com" - the real domain is "security-check.com").
13
+ - **URL Shorteners**: Using bit.ly or tinyurl to hide the destination.
14
+
15
+ ## Social Engineering Tactics
16
+ - **Authority**: Impersonating CEOs, IT support, or government agencies.
17
+ - **Scarcity**: "Only 24 hours left to claim your prize".
18
+ - **Curiosity**: "Look at these photos of you".
19
+
20
+ ## Example Cases
21
+ - **PayPal Phishing**: Emails claiming unauthorized transactions, asking to click a link to "dispute" the charge.
22
+ - **Google Docs Phishing**: Fake login pages that look like Google Drive login screens.
23
+ - **Bank Fraud**: SMS messages (Smishing) claiming a bank account is locked.