secure from phishing hacking and keylogger

35
Internet Phishing PHISHING ATTACK -Abhishek Hirapara.

Upload: abhishek-hirapara

Post on 12-Apr-2017

340 views

Category:

Internet


3 download

TRANSCRIPT

Page 1: secure from Phishing Hacking and Keylogger

Internet Phishing

PHISHING ATTACK

-Abhishek Hirapara.

Page 2: secure from Phishing Hacking and Keylogger

PhishingIn the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

Page 3: secure from Phishing Hacking and Keylogger

How is it Exactly Done ?A thing a Hacker Needs-A Software known as Super Phisher.

Page 4: secure from Phishing Hacking and Keylogger

My3gb.comA Free Web Hosting site for uploading the fake

website.

Page 5: secure from Phishing Hacking and Keylogger

The Hacker copies the URL (Uniform Resource Locator ) Of a website eg.www.gmail.co.in , www.yahoo.co.in

Page 6: secure from Phishing Hacking and Keylogger

And puts it in the software Url space

Page 7: secure from Phishing Hacking and Keylogger
Page 8: secure from Phishing Hacking and Keylogger

-Once the fake page is build , it appears in the folder where the software is installed, or kept .

Page 9: secure from Phishing Hacking and Keylogger

-The Hacker thus creates a fake account in the free Uploading website.

Page 10: secure from Phishing Hacking and Keylogger

And he uploads the files in the file manager.

Page 11: secure from Phishing Hacking and Keylogger
Page 12: secure from Phishing Hacking and Keylogger
Page 13: secure from Phishing Hacking and Keylogger

Also use URL shortner (ex:- goo.gl , bit.do , ow.ly)

Page 14: secure from Phishing Hacking and Keylogger
Page 15: secure from Phishing Hacking and Keylogger
Page 16: secure from Phishing Hacking and Keylogger

That’s it the hacker has the email id & Password & he is totally in control of the account!!

Page 17: secure from Phishing Hacking and Keylogger

This Process can be done with any networking site .But these types of links cannot be sent through Facebook.This is what happens when you try to send this phishing link.

Page 18: secure from Phishing Hacking and Keylogger
Page 19: secure from Phishing Hacking and Keylogger

Phishtank

Functionality

-Verify a site- Search a

phishing site from existing list

- Add a site into the phishing list

Page 20: secure from Phishing Hacking and Keylogger

How to avoid Phishing• DON’T CLICK THE LINK

– Type the site name in your browser (such as www.paypal.com)• Never send sensitive account information by e-mail

– Account numbers, SSN, passwords• Never give any password out to anyone• Verify any person who contacts you (phone or email).

– If someone calls you on a sensitive topic, thank them, hang up and call them back using a number that you know is correct, like from your credit card or statement.

• Change Your “hosts” file permission to read only

C:\Windows\System32\drivers\etc\hosts

Page 21: secure from Phishing Hacking and Keylogger
Page 22: secure from Phishing Hacking and Keylogger

Key loggers Definition: “A keylogger is something that records

keystrokes made on a computer. It captures every key pressed on the keyboard and stores it down in a file or memory bank that can be viewed by the person performing the monitoring in real-time, or at a later date.” [1]

There are two types of keylogger: hardware keylogger and software keylogger

[1] http://www.keyghost.com/keylogger

Page 23: secure from Phishing Hacking and Keylogger

Hardware key loggersCome in three types: Inline devices that are attached to the keyboard

cable Devices which can be installed inside standard

keyboards Replacement keyboards that contain the key logger

already built-in

Page 24: secure from Phishing Hacking and Keylogger

KeyloggerThe Hardware KeyLogger™ Stand-alone Edition is a tiny hardware device that can be attached in between a keyboard and a computer. It keeps a record of all keystrokes typed on the keyboard. The recording process is totally transparent to the end user. The keystrokes can only be retrieved by an administrator with a proper password.

BEFORE AFTER

Page 25: secure from Phishing Hacking and Keylogger

Hardware KeyLoggerTMKeyboard Edition

The Hardware KeyLogger™ Keyboard Edition looks and behaves exactly like a normal keyborad, but it keeps a record of all keystrokes typed on it. The recording process is totally transparent to the end user. The keystrokes can only be retrieved by an administrator with a proper password.

Page 26: secure from Phishing Hacking and Keylogger

KeyKatcherThe KeyKatcher is a hardware device to log activity as it is performed on the keyboard. The device works with any PS/2 keyboard and is not dependant on the operating system because there is not any software required for the manufacture to product to interact with the hardware.

The KeyKatcher records up to 32,000 bytes (keystrokes) in the 33k model or 64,000 bytes (key strokes) in the 64k model. Even if the device is unplugged from the keyboard it will still remember EVERYTHING and you wont lose a single keystroke.

Page 27: secure from Phishing Hacking and Keylogger

Other approachesThere are other approaches to capturing info about what you are doing.

•Some keyloggers capture screens, rather than keystrokes. •Other keyloggers will secretly turn on video or audio recorders, and transmit what they capture over your internet connection.

Page 28: secure from Phishing Hacking and Keylogger

Software Key Logging• Easy to implement – code is relatively normal.• Hard to install – user can notice the presence of it.It records:• Which applications are run and closed• All keystrokes pressed (keystroke logger)• All content copied to the clipboard• All print activity• Any disk changes• Any Internet connections made, and all websites

visited

Page 29: secure from Phishing Hacking and Keylogger

Problems with installing a Key Logger

• An attacker that connects to the target to

download the keystrokes risks being traced.• A code that sends the information to an email

address risks exposing the attacker.

Page 30: secure from Phishing Hacking and Keylogger

Examples of key loggers• Magic Lantern – developed by the FBI– is installed remotely via email attachment.

• All in One Keylogger Spy Software– sends encrypted logs to desired email– tracks all users activity

Page 31: secure from Phishing Hacking and Keylogger

Examples of key loggers (cont.)

• Wiretap Pro– specializes in Internet monitoring– records chats, emails, web sites visited

• Ardamax Keylogger – monitors user activity in an encrypted way– data is stored as text or web page– used to maintain backups or monitor kids.

Page 32: secure from Phishing Hacking and Keylogger

Defending from a key logger• Have our computer up to date with:– Keep net firewall on– Anti-spywares– Anti-viruses

• Check USB ports and PS/2• Check programs installed• Also we can maintain a practice of using

only the soft keyboard (on screen). However is not completely secure.

Page 33: secure from Phishing Hacking and Keylogger

So better think twice before clicking on a link!!

Page 34: secure from Phishing Hacking and Keylogger

The given presentation is only

for educational purpose & not

for any wrong use .

Page 35: secure from Phishing Hacking and Keylogger

Thank You

For Your

Stay Alert. Be Safe.