Phishing often uses URL Obfuscation techniques to make that link you click on
all that more real. Ed Skoudis compiled a list of techniques often used by
phishers and it is hosted here at the ISC. The page is here and the source code
of the attack techniques here
Copyright © Lexa Software, 1996-2009.