email hacking(06 cse 036)

22
Email Hacking Subbmitted By:- Inder Setia

Upload: manish-yadav

Post on 07-Apr-2018

224 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Email Hacking(06 Cse 036)

8/6/2019 Email Hacking(06 Cse 036)

http://slidepdf.com/reader/full/email-hacking06-cse-036 1/22

Email Hacking

Subbmitted By:-Inder Setia

Page 2: Email Hacking(06 Cse 036)

8/6/2019 Email Hacking(06 Cse 036)

http://slidepdf.com/reader/full/email-hacking06-cse-036 2/22

Hacking - Definition� The Art of exploring various security 

breaches is termed as Hacking .

�It¶s an anti-society activity.

�It says, there always exists more than

one way to solve the problem.

�The terms Hacker and Hacking are being

misinterpreted and misunderstood withnegative sidelines

Page 3: Email Hacking(06 Cse 036)

8/6/2019 Email Hacking(06 Cse 036)

http://slidepdf.com/reader/full/email-hacking06-cse-036 3/22

Facts Of Hacking

�³The one who can hack it, can onlysecure it´

�³If you want to catch criminal then you¶llhave to think like criminal´

�³The Best Way To Secure Yourself Is ToHack yourself´

Page 4: Email Hacking(06 Cse 036)

8/6/2019 Email Hacking(06 Cse 036)

http://slidepdf.com/reader/full/email-hacking06-cse-036 4/22

Hackers ± Who are they?� Hackers are I ntelligent Computer Professionals.

�Motive/Intent ±

ØTo gain in-depth knowledge of a system, what¶shappening at the backend, behind the screen.

ØTo find possible security vulnerabilities in asystem.

ØThey create security awareness by sharingknowledge. It¶s a team work.

Page 5: Email Hacking(06 Cse 036)

8/6/2019 Email Hacking(06 Cse 036)

http://slidepdf.com/reader/full/email-hacking06-cse-036 5/22

Communities of Hackers

� Hackers

� Crackers

� Phreaks

� Script Kiddies

Page 6: Email Hacking(06 Cse 036)

8/6/2019 Email Hacking(06 Cse 036)

http://slidepdf.com/reader/full/email-hacking06-cse-036 6/22

Hats Off?�White Hat Hackers ± They use their 

Knowledge and skill set for good,

constructive intents. They find out newsecurity loopholes and their solutions.

� Black Hat Hacker- They use their knowledge and skill set for illegal

activities, destructive intents

Page 7: Email Hacking(06 Cse 036)

8/6/2019 Email Hacking(06 Cse 036)

http://slidepdf.com/reader/full/email-hacking06-cse-036 7/22

Email Hacking� Password Cracking

� Social Engineering

� Phishing

� Key Logging

� Cookie Stealing

Page 8: Email Hacking(06 Cse 036)

8/6/2019 Email Hacking(06 Cse 036)

http://slidepdf.com/reader/full/email-hacking06-cse-036 8/22

Password Cracking� Guessing :-Passwords can sometimes be guessed by humans with knowledge of 

the user's personal information. Examples of guessable passwords include:

* the words "password", "passcode", "admin" and their derivatives

* a row of letters from the qwerty keyboard -- qwerty itself, asdf, or qwertyuiop)

* the user's name or login name

* the name of their significant other, a friend, relative or pet

* a swear word

� Dictionary :- Examples of insecure choices include the above list, plus single

words found in dictionaries, given and family names, any too short password

� Brute force attacks:-A last resort is to try every possiblepassword, known as a brute force attack. In theory, if there is no limit to thenumber of attempts, a brute force attack will always be successful since therules for acceptable passwords must be publicly known;

Page 9: Email Hacking(06 Cse 036)

8/6/2019 Email Hacking(06 Cse 036)

http://slidepdf.com/reader/full/email-hacking06-cse-036 9/22

BruteF

orce Attack

Page 10: Email Hacking(06 Cse 036)

8/6/2019 Email Hacking(06 Cse 036)

http://slidepdf.com/reader/full/email-hacking06-cse-036 10/22

Social Engineering� Social engineering is the act of 

manipulating people into performing actionsor divulging confidential information, rather 

than by breaking in or using technicalhacking techniques.

Ex:- Information Gathering Of The User InSocial Way Like To Know The Answer Of 

His/Her Security Question.

Page 11: Email Hacking(06 Cse 036)

8/6/2019 Email Hacking(06 Cse 036)

http://slidepdf.com/reader/full/email-hacking06-cse-036 11/22

What Is Phishing?� It Is A Method To Generate A Copy Or AFake Page Which have Look And FeelLike Original One.

� As User Enters His Info. He Is RedirectedTo The Original Server.

�Things Required :-

1. Source Code

2. A Php File

3. A Text File

Page 12: Email Hacking(06 Cse 036)

8/6/2019 Email Hacking(06 Cse 036)

http://slidepdf.com/reader/full/email-hacking06-cse-036 12/22

How fake Page Look Like

Page 13: Email Hacking(06 Cse 036)

8/6/2019 Email Hacking(06 Cse 036)

http://slidepdf.com/reader/full/email-hacking06-cse-036 13/22

PhpF

ile

Page 14: Email Hacking(06 Cse 036)

8/6/2019 Email Hacking(06 Cse 036)

http://slidepdf.com/reader/full/email-hacking06-cse-036 14/22

Phishing Statistics

Page 15: Email Hacking(06 Cse 036)

8/6/2019 Email Hacking(06 Cse 036)

http://slidepdf.com/reader/full/email-hacking06-cse-036 15/22

How An Hacker Do

Phishing Attack� Usually A Link Will Be Send To You That

Will Have Look And Feel Like Original Page

 And It MayC

laim To Do Any ImportantThing So That You Enter Your info. Ex:-

Page 16: Email Hacking(06 Cse 036)

8/6/2019 Email Hacking(06 Cse 036)

http://slidepdf.com/reader/full/email-hacking06-cse-036 16/22

Key Logging� Key logger Is A software Or A Tool Which Is Used To Log All Keystrokes Of Any User.

� It Was Originaly Devloped For home Purpose So ThatParents Can See What Their Childrens Do Behind Them.

�This Tool Generates An .exe File Which Is Used To Send

To victim (Person To Be Hacked)�As Victim run That File His All Logs Like Chat log ,

Username And Password, Screenshots Of His ProcessWill Be Sent to Sever Of Hacker.

�We Can configure SMTP , FTP And Even Any Personal

Server With Diff Port No.�A Good key logger Is UD And Also Hav Apply Backspace

Option In It.

Page 17: Email Hacking(06 Cse 036)

8/6/2019 Email Hacking(06 Cse 036)

http://slidepdf.com/reader/full/email-hacking06-cse-036 17/22

Screen Shots

Page 18: Email Hacking(06 Cse 036)

8/6/2019 Email Hacking(06 Cse 036)

http://slidepdf.com/reader/full/email-hacking06-cse-036 18/22

LogF

ile

Page 19: Email Hacking(06 Cse 036)

8/6/2019 Email Hacking(06 Cse 036)

http://slidepdf.com/reader/full/email-hacking06-cse-036 19/22

Cookie Stealing

� Cookies Are Data Sent By Server To client.

These Are Used To Authenticate A User 

Uniquely.�Cookies Can Be Stealed By Using Some

Java Script And some Cookie StealingTools Are Also Avilable.

Page 20: Email Hacking(06 Cse 036)

8/6/2019 Email Hacking(06 Cse 036)

http://slidepdf.com/reader/full/email-hacking06-cse-036 20/22

Use Of C

ookies

Page 21: Email Hacking(06 Cse 036)

8/6/2019 Email Hacking(06 Cse 036)

http://slidepdf.com/reader/full/email-hacking06-cse-036 21/22

In this fictional example, an advertisingcompany has placed banners in two Websites. Hosting the banner images on its

servers and using third-party cookies, theadvertising company is able to track thebrowsing of users across these two sites.

Page 22: Email Hacking(06 Cse 036)

8/6/2019 Email Hacking(06 Cse 036)

http://slidepdf.com/reader/full/email-hacking06-cse-036 22/22