phishing

39
Student Name: Arpit Patel (Enrollment No. 120770107014) Guide: Presentation ( Review) On PHISHING Gujarat Technological University SOCET

Upload: arpit-patel

Post on 14-Jan-2017

211 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Phishing

Student Name: Arpit Patel(Enrollment No. 120770107014)

Guide:

Presentation ( Review)

On

PHISHING

Gujarat Technological

UniversitySOCET

Page 2: Phishing
Page 3: Phishing
Page 4: Phishing
Page 5: Phishing

Contents:

Definition Introduction Type of Phishing Causes of Phishing How to notice Phishing Example of Phishing Prevention Method Conclusion

Page 6: Phishing

Phreaking + Fishing = Phishing- Phreaking = making phone calls for free back in 70’s- Fishing = Use bait to lure the target

Phishing in 1995Target: AOL usersPurpose: getting account passwords for free timeThreat level: lowTechniques: Similar names ( www.ao1.com for www.aol.com ),

social engineering

Phishing in 2001Target: Ebayers and major banksPurpose: getting credit card numbers, accountsThreat level: mediumTechniques: Same in 1995, keylogger

Phishing in 2007Target: Paypal, banks, ebayPurpose: bank accountsThreat level: highTechniques: browser vulnerabilities, link obfuscation

History of Phishing

Page 7: Phishing

Definition

It is the act of tricking someone into giving confidential information (like passwords and credit card information) on a fake web page.

Page 8: Phishing

Introduction

Phishing is way of fraudulenty acquiring sensitive information using social engineering

It tries to trick with official looking message•Credit card•Bank account•Facebook id/pw•Paypal

some phishing emails also contain malicious or unwanted software that can track your activities or slow your computer

It is comparatively different from SPAM

Page 9: Phishing

Origin of Phishing Attacks

Page 10: Phishing
Page 11: Phishing

Phishing

Fraudsters

Build fake site

Send out thousandsOf Phishing E-mailsWith link to fake website

Victims click on links inE-mail believing it is Legitimate. They enter personal information

Fraudsters compile The stolen data and shell itOnline or use it them selves

Page 12: Phishing

How to notice Phishing?

Page 13: Phishing

Artists also use Uniform Resource Locators(URLs) that resemble the name of a well-known company or web-site but are slightly altered by adding, omitting or transposing letters.

For example, the URL www.microsoft.com could appear instead as:

www.micosoft.comwww.mircosoft.comwww.verify-microsoft.com

Page 14: Phishing
Page 15: Phishing
Page 16: Phishing
Page 17: Phishing

“Be alert for spam message”

Don’t open any links in suspicious emails, instant messages, or chat room messages

Page 18: Phishing

“Only communicate personal info. Over secure web site”

Secure website are indicated by a lock on the browser’sstatus bar or the prefix

“Https::// ” instead of “Http://”

Page 19: Phishing

“Never use e-mail to share personal information”

Page 20: Phishing

“Avoid using email on public computers”

Information from an email is temporarily stored on computer’s local disk and can be retrieved by another user if it is not properly deleted

Page 21: Phishing

“Do not click anything in pop-up window”

If your browser has a pop-u blocker , enable it. Do not Copy any website addresses from a pop-up window into your computer.

Page 22: Phishing

“Use security programs to protect your computer” Use a spam filter , Anti-spyware program , Anti-virus program and a firewall. These can be obtained from a software retailer or the internet.

Page 23: Phishing

“Check your credit report and financial statement regularly”

Make sure that no unauthorized transaction have been made and that all item on your credit report are correct.

Page 24: Phishing
Page 25: Phishing

TYPE OF PHISHING

o Deceptive Phishing

o Malware-Based Phishing

o Man in the Middle Phishing

o Search engine Phishing

Page 26: Phishing

Deceptive Phishing Sending a deceptive email, in bulk, with a “call to action that demands the recipient click on a link.

Page 27: Phishing

Malware-Based Phishing

Malware stands for malicious software, Malware is used to generically describe any malicious software regardless of its technical category

Page 28: Phishing

Man in the Middle Phishing

An attack where attacker gets between the Sender and receiver of information

(Session Phishing)

Page 29: Phishing

Search engine Phishing Create web pages for fake

products, get the pages indexed by search engines, and wait for users to enter their confidential information as part of an order, sign-up, or balance transfer.

Page 30: Phishing

Causes of Phishing Misleading e-mails No check of source address Vulnerability in browsers No strong authentication at websites

of banks and financial institutions Limited use of digital signatures Non-availability of secure desktop

tools Lack of user awareness Vulnerability in applications … and more

Page 31: Phishing

Existing System1) Detect and block the phishing websites

in time2) Enhance the secure of the websites3) Block the Phishing e-mails by various

spam filter4) Install online anti-phishing software in

user’s computers

Page 32: Phishing

Proposed System

1. Classification of the hyperlink in the phishing e-mail

2. Link guard algorithm3. Link guard implemented client4. Feasibility study

Page 33: Phishing

How to do Search engine Phishing???

Page 34: Phishing
Page 35: Phishing
Page 36: Phishing
Page 37: Phishing

And then upload this two file to your website….

Page 38: Phishing

Conclusion

Be Alert, Be wary, And

Be Informed ! ! !

Page 39: Phishing

Thank You For Your