Phishing

  1. Technical Mechanisms and Infrastructure
    1. Message Crafting and Spoofing
      1. Email Header Manipulation
        1. Sender Address Forgery
          1. Display Name Deception
            1. Reply-To Field Manipulation
            2. Domain-Based Deception
              1. Typosquatting Domains
                1. Subdomain Exploitation
                  1. Homograph Attacks (IDN Spoofing)
                    1. Domain Shadowing
                  2. Fraudulent Website Creation
                    1. Website Cloning Techniques
                      1. HTML Source Code Copying
                        1. CSS Styling Replication
                          1. JavaScript Functionality Mimicking
                          2. Visual Deception Methods
                            1. Logo and Branding Theft
                              1. Color Scheme Matching
                                1. Layout Structure Copying
                                  1. Favicon Impersonation
                                  2. False Security Indicators
                                    1. SSL Certificate Abuse
                                      1. HTTPS Protocol Exploitation
                                        1. Security Badge Counterfeiting
                                          1. Trust Seal Forgery
                                        2. Hosting and Infrastructure
                                          1. Bulletproof Hosting Services
                                            1. Fast-Flux Networks
                                              1. Content Delivery Network (CDN) Abuse
                                                1. Cloud Service Exploitation
                                                  1. Compromised Website Utilization
                                                  2. Payload Delivery Mechanisms
                                                    1. Malicious Attachment Types
                                                      1. Weaponized Office Documents
                                                        1. PDF Exploits
                                                          1. Archive File Abuse
                                                            1. Executable File Distribution
                                                            2. Drive-By Download Techniques
                                                              1. Exploit Kit Integration
                                                                1. Browser Vulnerability Exploitation
                                                                  1. Plugin and Extension Abuse
                                                                  2. Fileless Attack Methods
                                                                    1. PowerShell Script Execution
                                                                      1. WMI Command Abuse
                                                                        1. Registry Manipulation