Top Banner
PHISHING TECHNIQUES
35

Phishing techniques

Dec 05, 2014

Download

Technology

Sushil Kumar

Details about type of hacking & precautions .
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Phishing techniques

PHISHING TECHNIQU

ES

Page 2: Phishing techniques
Page 3: Phishing techniques

Phishing is the method used to steal personal information through spamming or other deceptive means. There are a number of different phishing techniques used to obtain personal information from users. As technology becomes more advanced, the phishing techniques being used are also more advanced. To prevent Internet phishing, users should have knowledge of various types of phishing techniques and they should also be aware of anti-phishing techniques to protect themselves from getting phished. Let’s look at some of these phishing techniques.

 

Page 4: Phishing techniques

E-mail/Spam

Congratulations!!!!! You won 75000$ in Google lottery!!!!

Page 5: Phishing techniques

Phishers may send the same email to millions of users, requesting them to fill in personal details. These details will be used by the Phishers for their illegal activities. Phishing with email and spam is a very common phishing scam. Most of the messages have an urgent note which requires the user to enter credentials to update account information, change details, and verify accounts. Sometimes, they may be asked to fill out a form to access a new service through a link which is provided in the email.

Page 6: Phishing techniques
Page 7: Phishing techniques

Web Based Delivery

Page 8: Phishing techniques

Web based delivery is one of the most sophisticated phishing techniques. Also known as “man-in-the-middle,” the hacker is located in between the original website and the phishing system. The Phishers traces details during a transaction between the legitimate website and the user. As the user continues to pass information, it is gathered by the Phishers, without the user knowing about it.

Page 9: Phishing techniques
Page 10: Phishing techniques
Page 11: Phishing techniques

Instant Messaging

Page 12: Phishing techniques

Instant messaging is the method in which the user receives a message with a link directing them to a fake phishing website which has the same look and feel as the legitimate website. If the user doesn’t look at the URL, it may be hard to tell the difference between the fake and legitimate websites. Then, the user is asked to provide personal information on the page.

 

Page 13: Phishing techniques
Page 14: Phishing techniques

Trojan Hosts

Page 15: Phishing techniques

Trojan hosts are invisible hackers trying to log into your user account to collect credentials through the local machine. The acquired information is then transmitted to phishers.

Page 16: Phishing techniques
Page 17: Phishing techniques

Link Manipulation

Page 18: Phishing techniques

Link Manipulation is the technique in which the phishers sends a link to a website. When the user clicks on the deceptive link, it opens up the phisher’s website instead of the website mentioned in the link. One of the anti-phishing techniques used to prevent link manipulation is to move the mouse over the link to view the actual address.

Page 19: Phishing techniques

Click on the following link to get a free recharge of Rs 500 OR

Click on the following link get linked on New Facebook :-

https://yuon125.com

Page 20: Phishing techniques

Key Loggers

Page 21: Phishing techniques

Key Loggers refer to the malware used to identify inputs from the keyboard. The information is sent to the hackers who will decipher passwords and other types of information. To prevent key loggers from accessing personal information, secure websites provide options to use mouse click to make entries through the virtual keyboard.

Page 22: Phishing techniques

Figure 1

Page 23: Phishing techniques

Figure 2

Page 24: Phishing techniques

Figure 3

Page 25: Phishing techniques

Figure 4

Page 26: Phishing techniques

Session Hacking

Page 27: Phishing techniques

In session hacking, the phishers exploits the web session control mechanism to steal information from the user. In a simple session hacking procedure known as session sniffing, the phishers can use a sniffer to intercept relevant information so that he or she can access the Web server illegally.

Page 28: Phishing techniques
Page 29: Phishing techniques

Phishing through Search Engines

Page 30: Phishing techniques

Some phishing scams involve search engines where the user is directed to products sites which may offer low cost products or services. When the user tries to buy the product by entering the credit card details, it’s collected by the phishing site. There are many fake bank websites offering credit cards or loans to users at a low rate but they are actually phishing sites.

Page 31: Phishing techniques

Phone Phishing

In phone phishing, the phishers makes phone calls to the user and asks the user to dial a number. The purpose is to get personal information of the bank account through the phone. Phone phishing is mostly done with a fake caller ID. 

Page 32: Phishing techniques

Malware Phishing

Page 33: Phishing techniques

Phishing scams involving malware require it to be run on the user’s computer. The malware is usually attached to the email sent to the user by the phishers. Once you click on the link, the malware will start functioning. Sometimes, the malware may also be attached to downloadable files. Phishers take advantage of the vulnerability of web security services to gain sensitive information which is used for fraudulent purposes. This is why it’s always a good idea to learn about the various phishing techniques, including phishing with Trojans and Spyware.

Page 34: Phishing techniques
Page 35: Phishing techniques