What is phishing? How to Attack in Your System.

Phishing scams you with the links to steal your important information. It might be an e-mail that looks like it was sent by a bank or a link that appears to force you to sign into your account again. In this case, the sender will gain access to your accounts and important information by directing you to a website or link and sharing your account details.
Phishing is one of the best way of stealing username and password from people We can create a real page for any login page during this attack.
Phishing Attack Example:
  • Go to Facebook website Log-in, register or find out more
  • right click on the page and select the source page 
  •  copy the code to your notepad 
  •  change the GET & POST method actions in the copied code 
  •  write your hosting address in methods 
  •  get free web hosting account 
  •  when the user tries to login to the username and password page of your account and the user goes to the original Facebook page to get some Html tricks.
  • only for reading/example don't try this trick this is illegal activity.
This trick to your account information access scammers. so carefully check all website link and use its. 

Amazon Phishing Web Site 

What is phishing attack?

Phishing is a type of social engineering attack that is often used to steal user data, including login credentials and credit card numbers. It happens if an attacker masks a victim by opening an email, immediate message or a text message as a trustworthy entity. The recipient is then tricked into clicking a malicious link, which can lead to malware installation, system freezing as part of a ransomware attack, or revealing sensitive information.
Phishing Scam
The results of an attack may be devastating. This includes unauthorized buying, money - robbery or theft for individuals.

Types of Phishing Attacks:

Some Phishing Technic use Attacker's.
  • Deceptive phishing: A disappointing email message is today the most common method of broadcasting. Messages about the need to verify account information, system failure requiring users to re-enter their information, fictitious account charges, undesirable account changes, new free services requiring quick action, and many other scams are broadcast to a wide group of recipients with the hope that the unwary will respond by clicking a link to or signing onto a bogus site where their confidential information can be collected
  • Phishing based on Malware:This includes scams that include malicious software running on users ' PCs. Malware can be introduced as an e - mail attachment, as a Website downloadable file, or through the use of known security vulnerabilities.
  • Keyloggers & Screenloggers: They are malware that track keyboard input and send the pertinent data via the internet to the hacker.
  • Session Hijacking :This attack will monitor users ' activities until they sign up and establish their true credentials in a target account or transaction. It will be a problem. In this stage the malicious software takes over and without user knowledge can take unauthorized steps, for example transfer of funds.
  • Trojans of the Web :When users try to login, they pop up invisibly. Locally they collect the identity of the user and send it to the Hacker.
  • System Reconfiguration : Attacks change user's PC settings for malicious purposes.
  • Phishing based on DNS (' Pharming ') :This is the term used to change the file or DNS files on host sites. Hackers manipulate host files or the domain name system to return bugger addresses for requests for URLs or name services and then direct communicating with the company to a false site.
  • Content - Injection Phishing : It describes the situation in which hackers replace a portion of their content with false content to mislead or mislead the user to give confidence to the hacker.
  • Man-in-the-Middle Phishing :Hackers themselves place the user between the legitimate website and system in these attacks. They record the entry but continue to pass the information so that it does not affect user transactions.
  • Search engine phishing : Phishers create websites with attractive offers that are legally indexed with search engines. The website is normally searched for products or services by users, and their information is fooled.

Phishing Prevention Best Practices:

  1. Know how to identify Phishing Scams Mail: The email you are receiving may seem legitimate because there is to have a true image of the company, but it is best to research your company before you believe anything in it.
  2. The Mail source is here: If you have mail from any financial institution like the bank, make sure you are never asked to send any confidential information like passwords or account details. Instead of responding to the questions it is best to call the bank, to know if they sent the mail from the number you have. 
  3. Never click on the links in an E-mail: never click on the links in an email because they might be a fake link to a website that might be harmful. It is better to type your own web address rather than clicking on it.
  4. Website is secure: it is best to check whether the website is secure enough to trust before entering any data on the website. The easy way is to see whether or not the URL is locked by the green pad.
  5. Phishing is not only restricted to online banks: phishing attacks are usually perpetrated to obtain bank details, but not limited to that. Some of these cyber criminals are also on their listed on other popular websites like Facebook, PayPal, eBay and Amazón.
  6. Update your computer security: Do not compromise the security steps. Always update your computer's security software since they are very useful to block frequent attacks of this kind.
  7. Gradually monitor your account: it is best to continue to check your bank accounts from time to time so that you can know that your transaction is the one you made or not.
  8. Phishing attacks can be carried out in any language: Phishing emails are not supplied to your email box in a language called "English," but can be sent in various languages. Be careful, if you find any mail in the language you don't know or never visited that language's website. 
  9. Trust the Good Instinct: If you have any doubts about this mail, it will mostly be.
  10. Keep yourself up to date: several blogs and articles are writte daily, and it is best for you, through any blog, news or social media platforms such as Facebook or Twitter, to be updated with the latest attacks and scambers on the market.

Phishing Related blogs:

1 comment:

Anonymous said...

Phishing technique info provide.....Gud Article