GearriceGearrice
  • Tech World
  • Smart Home
  • Mobile Zone
  • 5G
  • Alexa
  • Amazon
  • AMD
  • Android
  • Apple
  • AirPods
  • AirTag
  • Apple Studio
  • Apple TV
  • Apple Watch
  • HomePod
  • iOS
  • iOS 15.4
  • iPad
  • iPhone
  • Mac
  • iMac
  • MacBook
  • Apps
  • Asus
  • Bitcoin
  • Cars
  • ChatGPT
  • Computer
  • Keyboard
  • Contact us
  • Disney
  • Display
  • Electric
  • Elon Musk
  • Gaming
  • Google
  • Chromecast
  • Google Maps
  • HBO
  • How to
  • Huawei
  • HONOR
  • Instagram
  • Intel
  • Internet
  • iQOO
  • Laptop
  • Lenovo
  • LG
  • Meta
  • Facebook
  • Galaxy
  • Metaverse
  • Microsoft
  • Windows
  • Motorola
  • Movies
  • Movistar
  • MWC Barcelona 2022
  • Netflix
  • News
  • Nintendo
  • Nokia
  • Nvidia
  • OPPO
  • OnePlus
  • Realme
  • Orange
  • Oscars
  • Philips
  • PlayStation
  • Pokémon
  • Qualcomm
  • Snapdragon
  • Samsung
  • Solar
  • Sony
  • SpaceX
  • Spotify
  • Tablet
  • Tesla
  • TikTok
  • Tips and Tricks
  • Today
  • Twitch
  • Twitter
  • Vivo
  • VPN
  • WhatsApp
  • Write For Us
  • MIUI
  • POCO
  • Redmi
  • Mouse
  • OLED
  • Prime
  • Scooter
  • Xbox
  • Xiaomi
  • YouTube
Facebook Twitter Instagram
Facebook Twitter Instagram Pinterest
Gearrice Gearrice
Subscribe
  • Tech World
  • Best Deals
  • Gaming
  • Mobile Zone
    • Android
    • Apple
  • Smart Home
GearriceGearrice
Home»Tech World»Knowing what parts make up a web address will prevent you from falling for this new scam

Knowing what parts make up a web address will prevent you from falling for this new scam

By Adam Straker21/05/20235 Mins Read
Share
Facebook Twitter LinkedIn Pinterest

Let’s start the article with a little experiment. Take a look at the following two URLs, and answer, what domain do they point to?


If you’ve thought ‘Easy, bbc.com‘, you’re half right: the first URL leads to that domain… the second? not even remotely. If you’re confused, it’s because, despite the fact that Internet users spend all day clicking on URLs, we actually know little about them.

‘Sgroogled.com’: when MICROSOFT launched ANTI-GOOGLE ads

Contents hide
1 The trick of the at
2 Anatomy of a URL
3 “But there are no domains with file extensions!” (If they do it)
4 “Hey, “https://www.genbeta.com/” can’t be used in usernames!” (It’s true, you can’t, but…)

The trick of the at

The point is that, in reality, everything everything between ‘https://’ and the at symbol is being ignored by the browser. Originally, web domains could have a structure similar to e-mails, indicating a ‘username’ before the ‘@’.

In case of using it, we were telling the website that will log in with that username. In fact, we could use the following structure to include the password in the URL as well:

http:// user:pass@website.com

Why it's important to wait if you get a suspicious link: 1 in 3 phishing websites disappear within their first 24 hours.

However, nowadays modern browsers, for security, prevent their users from being able to authenticate accidentally with a single click on websites, so they ignore everything we enter before the at sign and just direct the user to the part of the URL that is to the right of it.

Anatomy of a URL

By now you may have seen a couple of possible failures in the example we put at the beginning of the article. We will address them later, now we are going to review all the parts that a URL can be made up of:

Url Parts

Graphic based on original extracted from the paper ‘Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations’

  • Protocol: Tells the browser how to connect to the server. Is not the same “http://” than your safe version (“https://“) —although both connect to web pages—, or that “mailto://” (for email addresses), “ftp://“, “gopher://“, etc. Mandatory use, although browsers do not always show it anymore.
  • Login information: As explained above, we can indicate only the username or also include the password. Optional use and less and less frequent.
  • Domain: It is the axis around which a URL revolves, it tells the browser which machine on the Internet to connect to (with the help of DNS). Must usage. In some cases it may appear divided by a period, indicating a ‘subdomain’ (1st course.colegio.es).
  • Port: Each protocol has a port or ports bound by default, but in some cases we may want to tell the browser to connect, for example, to a secondary web server installed on the same machine as another: in these cases, it is usual to resort to specifying a different port. Optional use.
  • Route: When we do not want to access the main page, but a subdirectory of a website. Optional use, but very frequent.
  • Parameter: Also known as ‘query’, we describe its many uses in detail here.
  • Fragment: To tell the browser not to display the desired page from the beginning, but to locate it at a specific point on that page.

Do not trust that e-mail even if you know the sender: it can be faked... but with this trick you can clear up your doubts

“But there are no domains with file extensions!” (If they do it)

Going back to the example we gave at the beginning, you can already deduce that, unlike the first mentioned URL, the second one does not lead us to a ZIP file on the BBC server, but —remember what we said about the use of ‘@ ‘— to the domain ‘informeonu23.zip’.

If you are thinking that ‘.zip’ are not valid domain extensions, you are out of date. And it is that this same month Google has launched 8 new domain extensions:

  • .dad
  • .phd
  • .prof
  • .esq
  • .foo
  • .zip
  • .mov
  • .nexus

As you can see, the extensions .zip (from compressed files) and .mov (from movies) they are there. And before that there were .sh (country domain for Saint Helena, matching the Bash scripts), .pl (country domain for Poland, matching the Perl files) and .rs (country domain for Serbia, matching the Rust files).

Imagine that a cybercriminal had contracted the .zip domain in the example and that users, when accessing it from a malicious link like that, actually downloaded a ZIP file that obviously has nothing to do with the BBC: could be a source of malware.

And now imagine if it happened same… but using an official GitHub repository before the ‘@’.

What is really behind .xyz, the domains that want to be the .com of the future and succeed among scammers and web3

“Hey, “https://www.genbeta.com/” can’t be used in usernames!” (It’s true, you can’t, but…)

If the “https://www.genbeta.com/” that we use to form URLs could not be included in usernames (just as they cannot be included in file names for the same reasons), the example of a malicious URL that we put in would not be valid, since an error would be thrown. Does it mean you’ve read all this for nothing?

No. Because if well we cannot use /, yes we can use (and, in fact, it is what we have used) the symbol ∕ . Virtually indistinguishable, right? They are the traps of the ASCII symbols, what can we do?

That is why we must be very careful with this potential scam, which has not yet been detected being used by cyber-scammers, but which we will certainly begin to see shortlynow that anyone can register the new .ZIP domains.

Via | Bobbyr on Medium

Image | Daniel on Pixabay + Miguel Á. Padriñán on Pixabay

In Genbeta | Web hosting: what are they and how many types exist

Related Posts

New 15″ MacBook Air, Mac Studio and Mac Pro!

Volvo takes inspiration from IKEA for the design of its new electric SUV

This high-end smartwatch with GPS hits rock bottom on Amazon and sweeps sales

Add A Comment

Leave A Reply Cancel Reply

Gaming

Unveiling the Secrets of Online Casino Games: Tips and Strategies for Maximizing Your Winnings

By gearrice06/06/20230

New 15″ MacBook Air, Mac Studio and Mac Pro!

06/06/2023

Volvo takes inspiration from IKEA for the design of its new electric SUV

06/06/2023

This high-end smartwatch with GPS hits rock bottom on Amazon and sweeps sales

06/06/2023

The Police warn of a function of your car that you should never trust

06/06/2023
Gearrice
Facebook Twitter Instagram Pinterest
  • Privacy Policy
  • Terms and Conditions
  • Write For Us
© 2023 Gearrice.

Type above and press Enter to search. Press Esc to cancel.