Looking from Right to Left: RTLO attacks Revisited

Project Background & Description


In recent times, there have been many scams and many people have fallen prey to phishing attacks. Hence, there is a need to educate people and equip them with the knowledge on how to detect and defend themselves against such attacks and more.

Our project on Right-to-Left Override (RTLO) showcases our research into this relatively underground concept and demonstrates how attackers can use such a simple method to conduct malicious attacks. It also includes defensive takeaways that people can follow to protect themselves from RTLO and phishing attacks.

Key Benefits


Raises RTLO Awareness

How RTLO Is Used To Attack

Educates People On RTLO Attack

Educates People On RTLO Defend

Key Technologies Used


Internet

Computers

PowerShell

Python

Students


ISAAC ETHAN CHUA, CHONG KAI JIE


Supervisor


Sayed Hamzah Alhabshe (Mr)