一个汇聚了800万网络钓鱼情报的网站 | Phishtank

作者:FancyPig | 发布时间: | 更新时间:

相关阅读

data-postsbox="{"id":2955,"title":"钓鱼的常见手段,如何防范?如何进行溯源、反制?","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":11089,"comment_count":322,"category":"knowledge","is_forum_post":false}">{"id":2955,"title":"钓鱼的常见手段,如何防范?如何进行溯源、反制?","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":11089,"comment_count":322,"category":"knowledge","is_forum_post":false}
data-postsbox="{"id":10346,"title":"黑客是如何搭建钓鱼页面并快速上线的?可以获取用户的账户信息?","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":3506,"comment_count":6,"category":"knowledge","is_forum_post":false}">{"id":10346,"title":"黑客是如何搭建钓鱼页面并快速上线的?可以获取用户的账户信息?","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":3506,"comment_count":6,"category":"knowledge","is_forum_post":false}
data-postsbox="{"id":20835,"title":"99%的人都不知道的钓鱼🎣小技巧,别人一般不会告诉你","author":"Xiaonuo","author_id":14670,"cover_image":"","cover_video":"","views":5389,"comment_count":355,"category":"knowledge","is_forum_post":false}">{"id":20835,"title":"99%的人都不知道的钓鱼🎣小技巧,别人一般不会告诉你","author":"Xiaonuo","author_id":14670,"cover_image":"","cover_video":"","views":5389,"comment_count":355,"category":"knowledge","is_forum_post":false}
data-postsbox="{"id":22318,"title":"网络钓鱼无需密码也可以登录接管账户?XSS攻击介绍","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":3227,"comment_count":5,"category":"knowledge","is_forum_post":false}">{"id":22318,"title":"网络钓鱼无需密码也可以登录接管账户?XSS攻击介绍","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":3227,"comment_count":5,"category":"knowledge","is_forum_post":false}
data-postsbox="{"id":22694,"title":"一款设计美观、功能强大的钓鱼工具——SoicalFish","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":6667,"comment_count":321,"category":"knowledge","is_forum_post":false}">{"id":22694,"title":"一款设计美观、功能强大的钓鱼工具——SoicalFish","author":"FancyPig","author_id":1,"cover_image":"","cover_video":"","views":6667,"comment_count":321,"category":"knowledge","is_forum_post":false}
data-postsbox="{"id":24368,"title":"存在后门的Tor疑似在Youtube上被恶意传播?新的Chrome应用钓鱼技巧?","author":"FancyPig","author_id":1,"cover_image":"https://static.pigsec.cn/wp-content/uploads/2022/10/20221008080453397.png","cover_video":"","views":2583,"comment_count":4,"category":"knowledge","is_forum_post":false}">{"id":24368,"title":"存在后门的Tor疑似在Youtube上被恶意传播?新的Chrome应用钓鱼技巧?","author":"FancyPig","author_id":1,"cover_image":"https://static.pigsec.cn/wp-content/uploads/2022/10/20221008080453397.png","cover_video":"","views":2583,"comment_count":4,"category":"knowledge","is_forum_post":false}

视频讲解

本期视频我们将带大家来一起查看一个名为Phishtank的网站,上面记录了从2006年到现在的全部钓鱼网站情报,可以说是非常丰富,并且你还可以根据品牌名称,搜索仿冒该品牌的钓鱼网站。当你不确认你访问的网站是否为钓鱼网站时,也可以尝试去上面进行搜索。当然,除了查看、记录的功能,它还提供了免费的API接口供安全研究人员下载相关数据,进行深层次的分析、研究!

标签:网络钓鱼是什么意思?, 网络钓鱼常用的手段有, 网络钓鱼攻击方法和手段包括, phishtank 网络黑名单, phishtank, phishtank怎么读, 网络钓鱼属于什么攻击形式, 网络钓鱼使用的最主要的欺骗技术是什么, 网络钓鱼的最终目的, 网络钓鱼攻击属于什么欺骗, 网络钓鱼攻击有哪几种形式, 什么是网络钓鱼攻击, 网络钓鱼属于什么, 鱼叉式网络钓鱼攻击