<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>钓鱼攻击 on Answer</title>
    <link>https://answer.freetools.me/tags/%E9%92%93%E9%B1%BC%E6%94%BB%E5%87%BB/</link>
    <description>Recent content in 钓鱼攻击 on Answer</description>
    <generator>Hugo -- 0.152.2</generator>
    <language>zh-cn</language>
    <lastBuildDate>Sat, 21 Mar 2026 08:29:54 +0800</lastBuildDate>
    <atom:link href="https://answer.freetools.me/tags/%E9%92%93%E9%B1%BC%E6%94%BB%E5%87%BB/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>为什么一封钓鱼邮件能骗过所有安全检测：从SMTP设计缺陷到现代认证体系的四十年攻防博弈</title>
      <link>https://answer.freetools.me/%E4%B8%BA%E4%BB%80%E4%B9%88%E4%B8%80%E5%B0%81%E9%92%93%E9%B1%BC%E9%82%AE%E4%BB%B6%E8%83%BD%E9%AA%97%E8%BF%87%E6%89%80%E6%9C%89%E5%AE%89%E5%85%A8%E6%A3%80%E6%B5%8B%E4%BB%8Esmtp%E8%AE%BE%E8%AE%A1%E7%BC%BA%E9%99%B7%E5%88%B0%E7%8E%B0%E4%BB%A3%E8%AE%A4%E8%AF%81%E4%BD%93%E7%B3%BB%E7%9A%84%E5%9B%9B%E5%8D%81%E5%B9%B4%E6%94%BB%E9%98%B2%E5%8D%9A%E5%BC%88/</link>
      <pubDate>Sat, 21 Mar 2026 08:29:54 +0800</pubDate>
      <guid>https://answer.freetools.me/%E4%B8%BA%E4%BB%80%E4%B9%88%E4%B8%80%E5%B0%81%E9%92%93%E9%B1%BC%E9%82%AE%E4%BB%B6%E8%83%BD%E9%AA%97%E8%BF%87%E6%89%80%E6%9C%89%E5%AE%89%E5%85%A8%E6%A3%80%E6%B5%8B%E4%BB%8Esmtp%E8%AE%BE%E8%AE%A1%E7%BC%BA%E9%99%B7%E5%88%B0%E7%8E%B0%E4%BB%A3%E8%AE%A4%E8%AF%81%E4%BD%93%E7%B3%BB%E7%9A%84%E5%9B%9B%E5%8D%81%E5%B9%B4%E6%94%BB%E9%98%B2%E5%8D%9A%E5%BC%88/</guid>
      <description>从1981年SMTP协议的&amp;#34;信任假设&amp;#34;出发，深度解析电子邮件安全四十年演进历程。涵盖SPF、DKIM、DMARC、ARC协议的技术原理，SMTP走私攻击、组合攻击等新型威胁，以及PCI DSS 4.0合规要求。揭示为什么即使部署了完整认证体系，钓鱼邮件依然屡禁不止。</description>
    </item>
    <item>
      <title>你的眼睛在撒谎：一个字母如何让整个域名变成钓鱼陷阱</title>
      <link>https://answer.freetools.me/%E4%BD%A0%E7%9A%84%E7%9C%BC%E7%9D%9B%E5%9C%A8%E6%92%92%E8%B0%8E%E4%B8%80%E4%B8%AA%E5%AD%97%E6%AF%8D%E5%A6%82%E4%BD%95%E8%AE%A9%E6%95%B4%E4%B8%AA%E5%9F%9F%E5%90%8D%E5%8F%98%E6%88%90%E9%92%93%E9%B1%BC%E9%99%B7%E9%98%B1/</link>
      <pubDate>Sat, 07 Mar 2026 13:02:38 +0800</pubDate>
      <guid>https://answer.freetools.me/%E4%BD%A0%E7%9A%84%E7%9C%BC%E7%9D%9B%E5%9C%A8%E6%92%92%E8%B0%8E%E4%B8%80%E4%B8%AA%E5%AD%97%E6%AF%8D%E5%A6%82%E4%BD%95%E8%AE%A9%E6%95%B4%E4%B8%AA%E5%9F%9F%E5%90%8D%E5%8F%98%E6%88%90%E9%92%93%E9%B1%BC%E9%99%B7%E9%98%B1/</guid>
      <description>深度解析IDN同形字攻击的技术原理与防御策略。从Unicode字符的视觉欺骗，到Punycode编码机制，再到各大浏览器的防御差异，系统梳理域名安全中最隐蔽的威胁。涵盖UTS #39标准、IDNA2008协议、西里尔字母混淆、零宽字符攻击等核心技术，以及企业品牌保护和用户识别策略。</description>
    </item>
  </channel>
</rss>
