How do you find the targets of hackers? Before you regret

Parse Tree Validation Phishing technique is the key technique in Cyber Security for detecting the targets of hackers.

In the parser phase, parsing starts from the root node and follows the Depth-First Search (DFS) algorithm to check whether any child node has the same value as the root node.

How to find legitimate or Phishing website?

Targets of Hackers

Based on the repetition of the root node, the probability of occurrence of the root node is calculated for the phishing and legitimate website.

To calculate the probability value, first, there is a need to calculate the total number of nodes in a tree. 

If the number of repetitions of the root node is greater than half of the total number of nodes, the probability of legitimacy is high.

If the number of repetitions of the root node is equal to the half of the number of nodes, then the probability of the legitimacy is medium. 

Otherwise, If the number of repetitions of the root node is less than that, the probability of phishing is high, and that particular website will be suspected as a phishing one.

Legitimate Website – Targets of Hackers

The tree constructed for the legitimate website is shown in the picture. is the root node, and the next levels are the top ten results related to 

In this example, the total number of nodes is 56, and the root node is repeated 28 times. 

So the probability of the occurrence of repeating the root node for the legitimate website is high. Hence, it is concluded that is a legitimate website.

Phishing Website Sample

Phishing Website

The next website considered is The tree construction for the is shown in the picture.

Here the total number of nodes is 54. But the root node has not repeated anywhere in the inner hyperlinks. So, the probability of the phishing website is high.

Phishing Website Sample1

Moreover, the original website occurred three times. The checks with the whitelist and is available in the whitelist. So is the phishing target of  

Discovery of targets of hackers

The advantage of the tree construction method is not only to detect the phishing website but also to detect the targets of hackers. Thus, to find the hackers target, some steps have been followed.


Each node will be matched with the Whitelist; if any node matched with the whitelist node then that node will be the phishing target website.


The second step is, to check if any of the child nodes doesn’t have the value of root node, but most of the child nodes will point to one particular node and that is the phishing target. 

For example, for, no child node has the value, but most of the nodes will have the value 

Hence, the phishing target of is


If any of the above two steps have been matched, then the text matching has to be done between the phishing target and the root node; i.e the phishing site. 

In the above example, the matching is between the and 

Text matching in the discovery of phishing target

A phishing webpage usually uses similar or even the same text content to its target page in order to cheat the visitors. 

If the text on a suspicious webpage is very similar to that on an associated well-known webpage, but the domain name of these two webpages is different, it is a phishing webpage.

URLURL typeStatus
gmail.comLegitimateAllowed URLNot Allowed
paypai.comPhishing URLNot Allowed phishing hyper linkNot Allowed IP in hyper linkNot Allowed
Facebook-cgi.comPhishing StringNot Allowed URL in the  URL pathNot Allowed the link into some other websiteNot Allowed
onlineindianbank.netPhishing look like a legitimate NotAllowed

Here you can see some of the sample phishing data,

Final Words,

Here, we have discussed the parse tree validation for finding the phishing or legitimate website. It is also helpful for finding the targets of hackers. Hence, here we can easily say that Hackers are trying to phish which website.

Here’s a few links of favorite resources on this topic..