0 Members and 1 Guest are viewing this topic.
Historically, phishing web pages have been hosted by web servers that areeither compromised or owned by the attacker. This paper introduces a newapproach to creating working phishing web pages without the direct need ofa host. The contents of the phishing web page is simply contained its ownURI (link). We present the appropriate steps to do this, and show a workingexample of such a phishing page.