email hacking(06 cse 036)
TRANSCRIPT
8/6/2019 Email Hacking(06 Cse 036)
http://slidepdf.com/reader/full/email-hacking06-cse-036 1/22
Email Hacking
Subbmitted By:-Inder Setia
8/6/2019 Email Hacking(06 Cse 036)
http://slidepdf.com/reader/full/email-hacking06-cse-036 2/22
Hacking - Definition� The Art of exploring various security
breaches is termed as Hacking .
�It¶s an anti-society activity.
�It says, there always exists more than
one way to solve the problem.
�The terms Hacker and Hacking are being
misinterpreted and misunderstood withnegative sidelines
8/6/2019 Email Hacking(06 Cse 036)
http://slidepdf.com/reader/full/email-hacking06-cse-036 3/22
Facts Of Hacking
�³The one who can hack it, can onlysecure it´
�³If you want to catch criminal then you¶llhave to think like criminal´
�³The Best Way To Secure Yourself Is ToHack yourself´
8/6/2019 Email Hacking(06 Cse 036)
http://slidepdf.com/reader/full/email-hacking06-cse-036 4/22
Hackers ± Who are they?� Hackers are I ntelligent Computer Professionals.
�Motive/Intent ±
ØTo gain in-depth knowledge of a system, what¶shappening at the backend, behind the screen.
ØTo find possible security vulnerabilities in asystem.
ØThey create security awareness by sharingknowledge. It¶s a team work.
8/6/2019 Email Hacking(06 Cse 036)
http://slidepdf.com/reader/full/email-hacking06-cse-036 5/22
Communities of Hackers
� Hackers
� Crackers
� Phreaks
� Script Kiddies
8/6/2019 Email Hacking(06 Cse 036)
http://slidepdf.com/reader/full/email-hacking06-cse-036 6/22
Hats Off?�White Hat Hackers ± They use their
Knowledge and skill set for good,
constructive intents. They find out newsecurity loopholes and their solutions.
� Black Hat Hacker- They use their knowledge and skill set for illegal
activities, destructive intents
8/6/2019 Email Hacking(06 Cse 036)
http://slidepdf.com/reader/full/email-hacking06-cse-036 7/22
Email Hacking� Password Cracking
� Social Engineering
� Phishing
� Key Logging
� Cookie Stealing
8/6/2019 Email Hacking(06 Cse 036)
http://slidepdf.com/reader/full/email-hacking06-cse-036 8/22
Password Cracking� Guessing :-Passwords can sometimes be guessed by humans with knowledge of
the user's personal information. Examples of guessable passwords include:
* the words "password", "passcode", "admin" and their derivatives
* a row of letters from the qwerty keyboard -- qwerty itself, asdf, or qwertyuiop)
* the user's name or login name
* the name of their significant other, a friend, relative or pet
* a swear word
� Dictionary :- Examples of insecure choices include the above list, plus single
words found in dictionaries, given and family names, any too short password
� Brute force attacks:-A last resort is to try every possiblepassword, known as a brute force attack. In theory, if there is no limit to thenumber of attempts, a brute force attack will always be successful since therules for acceptable passwords must be publicly known;
8/6/2019 Email Hacking(06 Cse 036)
http://slidepdf.com/reader/full/email-hacking06-cse-036 9/22
BruteF
orce Attack
8/6/2019 Email Hacking(06 Cse 036)
http://slidepdf.com/reader/full/email-hacking06-cse-036 10/22
Social Engineering� Social engineering is the act of
manipulating people into performing actionsor divulging confidential information, rather
than by breaking in or using technicalhacking techniques.
Ex:- Information Gathering Of The User InSocial Way Like To Know The Answer Of
His/Her Security Question.
8/6/2019 Email Hacking(06 Cse 036)
http://slidepdf.com/reader/full/email-hacking06-cse-036 11/22
What Is Phishing?� It Is A Method To Generate A Copy Or AFake Page Which have Look And FeelLike Original One.
� As User Enters His Info. He Is RedirectedTo The Original Server.
�Things Required :-
1. Source Code
2. A Php File
3. A Text File
8/6/2019 Email Hacking(06 Cse 036)
http://slidepdf.com/reader/full/email-hacking06-cse-036 12/22
How fake Page Look Like
8/6/2019 Email Hacking(06 Cse 036)
http://slidepdf.com/reader/full/email-hacking06-cse-036 13/22
PhpF
ile
8/6/2019 Email Hacking(06 Cse 036)
http://slidepdf.com/reader/full/email-hacking06-cse-036 14/22
Phishing Statistics
8/6/2019 Email Hacking(06 Cse 036)
http://slidepdf.com/reader/full/email-hacking06-cse-036 15/22
How An Hacker Do
Phishing Attack� Usually A Link Will Be Send To You That
Will Have Look And Feel Like Original Page
And It MayC
laim To Do Any ImportantThing So That You Enter Your info. Ex:-
8/6/2019 Email Hacking(06 Cse 036)
http://slidepdf.com/reader/full/email-hacking06-cse-036 16/22
Key Logging� Key logger Is A software Or A Tool Which Is Used To Log All Keystrokes Of Any User.
� It Was Originaly Devloped For home Purpose So ThatParents Can See What Their Childrens Do Behind Them.
�This Tool Generates An .exe File Which Is Used To Send
To victim (Person To Be Hacked)�As Victim run That File His All Logs Like Chat log ,
Username And Password, Screenshots Of His ProcessWill Be Sent to Sever Of Hacker.
�We Can configure SMTP , FTP And Even Any Personal
Server With Diff Port No.�A Good key logger Is UD And Also Hav Apply Backspace
Option In It.
8/6/2019 Email Hacking(06 Cse 036)
http://slidepdf.com/reader/full/email-hacking06-cse-036 17/22
Screen Shots
8/6/2019 Email Hacking(06 Cse 036)
http://slidepdf.com/reader/full/email-hacking06-cse-036 18/22
LogF
ile
8/6/2019 Email Hacking(06 Cse 036)
http://slidepdf.com/reader/full/email-hacking06-cse-036 19/22
Cookie Stealing
� Cookies Are Data Sent By Server To client.
These Are Used To Authenticate A User
Uniquely.�Cookies Can Be Stealed By Using Some
Java Script And some Cookie StealingTools Are Also Avilable.
8/6/2019 Email Hacking(06 Cse 036)
http://slidepdf.com/reader/full/email-hacking06-cse-036 20/22
Use Of C
ookies
8/6/2019 Email Hacking(06 Cse 036)
http://slidepdf.com/reader/full/email-hacking06-cse-036 21/22
In this fictional example, an advertisingcompany has placed banners in two Websites. Hosting the banner images on its
servers and using third-party cookies, theadvertising company is able to track thebrowsing of users across these two sites.
8/6/2019 Email Hacking(06 Cse 036)
http://slidepdf.com/reader/full/email-hacking06-cse-036 22/22