Hey check out this cool PHISHING presentation! Benjamin Ross Lyerly.
A presentation on Phishing
-
Upload
creative-technology -
Category
Technology
-
view
2.557 -
download
2
description
Transcript of A presentation on Phishing
![Page 1: A presentation on Phishing](https://reader036.fdocuments.us/reader036/viewer/2022081413/549319c7b47959474d8b478a/html5/thumbnails/1.jpg)
Project by :-Divyendra PatilAnjaneya ShettyNinad Yadav
![Page 2: A presentation on Phishing](https://reader036.fdocuments.us/reader036/viewer/2022081413/549319c7b47959474d8b478a/html5/thumbnails/2.jpg)
HACKING -A SMART THINKING.
![Page 3: A presentation on Phishing](https://reader036.fdocuments.us/reader036/viewer/2022081413/549319c7b47959474d8b478a/html5/thumbnails/3.jpg)
The below given presentation is only for educational purpose & not for any wrong use . Please do not try this at home !!
![Page 4: A presentation on Phishing](https://reader036.fdocuments.us/reader036/viewer/2022081413/549319c7b47959474d8b478a/html5/thumbnails/4.jpg)
What is Hacking? Hacking refers to the
re-configuring or re-programming of a system to function in ways not facilitated by the owner, administrator, or designer.
![Page 5: A presentation on Phishing](https://reader036.fdocuments.us/reader036/viewer/2022081413/549319c7b47959474d8b478a/html5/thumbnails/5.jpg)
Types Of Hacking .1)Inside Jobs2)Rogue Access Points3)Back Doors 4)Viruses and Worms 5)Trojan Horses 6)Denial of Service7)Anarchists, Crackers, and Kiddies8)Sniffing and Spoofing 9)Phishing/Account Hacking
![Page 6: A presentation on Phishing](https://reader036.fdocuments.us/reader036/viewer/2022081413/549319c7b47959474d8b478a/html5/thumbnails/6.jpg)
PhishingIn the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.
![Page 7: A presentation on Phishing](https://reader036.fdocuments.us/reader036/viewer/2022081413/549319c7b47959474d8b478a/html5/thumbnails/7.jpg)
How is it Exactly Done ?
A thing a Hacker Needs-A Software known as Super Phisher.
![Page 8: A presentation on Phishing](https://reader036.fdocuments.us/reader036/viewer/2022081413/549319c7b47959474d8b478a/html5/thumbnails/8.jpg)
A Free Web Hosting site for uploading the fake website.
110mb.com
![Page 9: A presentation on Phishing](https://reader036.fdocuments.us/reader036/viewer/2022081413/549319c7b47959474d8b478a/html5/thumbnails/9.jpg)
My3gb.com
![Page 10: A presentation on Phishing](https://reader036.fdocuments.us/reader036/viewer/2022081413/549319c7b47959474d8b478a/html5/thumbnails/10.jpg)
The Real Process!!
The Hacker copies the URL (Uniform Resource Locator ) Of a website eg.www.gmail.co.in , www.yahoo.co.in
![Page 11: A presentation on Phishing](https://reader036.fdocuments.us/reader036/viewer/2022081413/549319c7b47959474d8b478a/html5/thumbnails/11.jpg)
![Page 12: A presentation on Phishing](https://reader036.fdocuments.us/reader036/viewer/2022081413/549319c7b47959474d8b478a/html5/thumbnails/12.jpg)
And puts it in the software Url space
![Page 13: A presentation on Phishing](https://reader036.fdocuments.us/reader036/viewer/2022081413/549319c7b47959474d8b478a/html5/thumbnails/13.jpg)
![Page 14: A presentation on Phishing](https://reader036.fdocuments.us/reader036/viewer/2022081413/549319c7b47959474d8b478a/html5/thumbnails/14.jpg)
Once the fake page is build , it appears in the folder where the software is installed, or kept .
![Page 15: A presentation on Phishing](https://reader036.fdocuments.us/reader036/viewer/2022081413/549319c7b47959474d8b478a/html5/thumbnails/15.jpg)
The Hacker thus creates a fake account in the free uploading website.
![Page 16: A presentation on Phishing](https://reader036.fdocuments.us/reader036/viewer/2022081413/549319c7b47959474d8b478a/html5/thumbnails/16.jpg)
And he uploads the files in the file manager.
![Page 17: A presentation on Phishing](https://reader036.fdocuments.us/reader036/viewer/2022081413/549319c7b47959474d8b478a/html5/thumbnails/17.jpg)
![Page 18: A presentation on Phishing](https://reader036.fdocuments.us/reader036/viewer/2022081413/549319c7b47959474d8b478a/html5/thumbnails/18.jpg)
![Page 19: A presentation on Phishing](https://reader036.fdocuments.us/reader036/viewer/2022081413/549319c7b47959474d8b478a/html5/thumbnails/19.jpg)
![Page 20: A presentation on Phishing](https://reader036.fdocuments.us/reader036/viewer/2022081413/549319c7b47959474d8b478a/html5/thumbnails/20.jpg)
![Page 21: A presentation on Phishing](https://reader036.fdocuments.us/reader036/viewer/2022081413/549319c7b47959474d8b478a/html5/thumbnails/21.jpg)
![Page 22: A presentation on Phishing](https://reader036.fdocuments.us/reader036/viewer/2022081413/549319c7b47959474d8b478a/html5/thumbnails/22.jpg)
![Page 23: A presentation on Phishing](https://reader036.fdocuments.us/reader036/viewer/2022081413/549319c7b47959474d8b478a/html5/thumbnails/23.jpg)
That’s it the hacker has the email id & Password & he is totally in control of the account!!
![Page 24: A presentation on Phishing](https://reader036.fdocuments.us/reader036/viewer/2022081413/549319c7b47959474d8b478a/html5/thumbnails/24.jpg)
This Process can be done with any networking site .But these types of links cannot be sent through Facebook.This is what happens when you try to send this phishing link.
![Page 25: A presentation on Phishing](https://reader036.fdocuments.us/reader036/viewer/2022081413/549319c7b47959474d8b478a/html5/thumbnails/25.jpg)
![Page 26: A presentation on Phishing](https://reader036.fdocuments.us/reader036/viewer/2022081413/549319c7b47959474d8b478a/html5/thumbnails/26.jpg)
So better think twice before clicking on a link!!
![Page 27: A presentation on Phishing](https://reader036.fdocuments.us/reader036/viewer/2022081413/549319c7b47959474d8b478a/html5/thumbnails/27.jpg)
Bibliography
Information taken from HackForums.netWikipediaWiki leaks