SlideShare a Scribd company logo
1 of 39
Student Name: Arpit Patel
(Enrollment No. 120770107014)
Guide:
Presentation
( Review)
On
PHISHING
Gujarat Technological
UniversitySOCET
Contents:
 Definition
 Introduction
 Type of Phishing
 Causes of Phishing
 How to notice Phishing
 Example of Phishing
 Prevention Method
 Conclusion
 Phreaking + Fishing = Phishing
- Phreaking = making phone calls for free back in 70’s
- Fishing = Use bait to lure the target
 Phishing in 1995
Target: AOL users
Purpose: getting account passwords for free time
Threat level: low
Techniques: Similar names ( www.ao1.com for www.aol.com ), social
engineering
 Phishing in 2001
Target: Ebayers and major banks
Purpose: getting credit card numbers, accounts
Threat level: medium
Techniques: Same in 1995, keylogger
 Phishing in 2007
Target: Paypal, banks, ebay
Purpose: bank accounts
Threat level: high
Techniques: browser vulnerabilities, link obfuscation
History of Phishing
Definition
 It is the act of tricking someone into giving
confidential information (like passwords and
credit card information) on a fake web page.
Introduction
 Phishing is way of fraudulenty acquiring sensitive
information using social engineering
 It tries to trick with official looking message
•Credit card
•Bank account
•Facebook id/pw
•Paypal
 some phishing emails also contain malicious or
unwanted software that can track your activities o
slow your computer
 It is comparatively different from SPAM
Origin of Phishing Attacks
Phishing
Fraudsters
Build fake
site
Send out thousands
Of Phishing E-mails
With link to fake website
Victims click on links in
E-mail believing it is
Legitimate. They enter
personal information
Fraudsters compile The
stolen data and shell it
Online or use it them selves
How to notice Phishing?
 Artists also use Uniform Resource Locators(URLs)
that resemble the name of a well-known company
or
web-site but are slightly altered by adding, omitting
or transposing letters.
For example, the URL www.microsoft.com could appear
instead as:
www.micosoft.com
www.mircosoft.com
www.verify-microsoft.com
“Be alert for spam message”
Don’t open any links in suspicious emails, instant
messages, or chat room messages
“Only communicate personal info. Over secure web site”
 Secure website are indicated by a lock on the browser’s
status bar or the prefix
“Https::// ” instead of “Http://”
“Never use e-mail to share personal information”
“Avoid using email on public computers”
Information from an email is temporarily stored on
computer’s local disk and can be retrieved by another
user if it is not properly deleted
“Do not click anything in pop-up window”
 If your browser has a pop-u blocker , enable it.
 Do not Copy any website addresses from a pop-up
window into your computer.
“Use security programs to protect your computer”
 Use a spam filter , Anti-spyware program , Anti-virus
program and a firewall. These can be obtained from
a software retailer or the internet.
“Check your credit report and financial statement regularly”
Make sure that no unauthorized transaction have been
made and that all item on your credit report are correct.
TYPE OF PHISHING
o Deceptive Phishing
o Malware-Based Phishing
o Man in the Middle Phishing
o Search engine Phishing
Deceptive Phishing
 Sending a deceptive email, in bulk, with a “call to
action that demands the recipient click on a link.
Malware-Based Phishing
 Malware stands for malicious software,
Malware is used to generically describe any
malicious software regardless of its technical
category
Man in the Middle Phishing
An attack where attacker gets between the
Sender and receiver of information
(Session Phishing)
Search engine Phishing
Create web pages for fake products, get
the pages indexed by search engines,
and wait for users to enter their
confidential information as part of an
order, sign-up, or balance transfer.
Causes of Phishing
 Misleading e-mails
 No check of source address
 Vulnerability in browsers
 No strong authentication at websites of
banks and financial institutions
 Limited use of digital signatures
 Non-availability of secure desktop tools
 Lack of user awareness
 Vulnerability in applications
 … and more
Existing System
1) Detect and block the phishing
websites in time
2) Enhance the secure of the websites
3) Block the Phishing e-mails by
various spam filter
4) Install online anti-phishing software
in user’s computers
Proposed System
1. Classification of the hyperlink in the
phishing e-mail
2. Link guard algorithm
3. Link guard implemented client
4. Feasibility study
How to do Search engine
Phishing???
And then upload this two file to your website…. 
Conclusion
Be Alert,
Be wary,
And
Be Informed ! ! !
Thank You
For Your

More Related Content

What's hot

Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
Aryan Ragu
 
Spoofing
SpoofingSpoofing
Spoofing
Sanjeev
 

What's hot (20)

Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Phishing
PhishingPhishing
Phishing
 
Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015Social Engineering | #ARMSec2015
Social Engineering | #ARMSec2015
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
Social engineering
Social engineering Social engineering
Social engineering
 
Anti phishing presentation
Anti phishing presentationAnti phishing presentation
Anti phishing presentation
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Email hacking
Email hackingEmail hacking
Email hacking
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Spoofing
SpoofingSpoofing
Spoofing
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 
Phising
PhisingPhising
Phising
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 

Viewers also liked (12)

Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
Phishing attacks, Types Of Phishing Attacks, How To Avoid Phishing Attacks
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing Attacks
Phishing AttacksPhishing Attacks
Phishing Attacks
 
Spoofing
SpoofingSpoofing
Spoofing
 
Spoofing
SpoofingSpoofing
Spoofing
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Spoofing Techniques
Spoofing TechniquesSpoofing Techniques
Spoofing Techniques
 
Phishing
PhishingPhishing
Phishing
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
Phishing
PhishingPhishing
Phishing
 
PHISHING PROJECT REPORT
PHISHING PROJECT REPORTPHISHING PROJECT REPORT
PHISHING PROJECT REPORT
 

Similar to Phishing

phishingppt-160209144204.pdf
phishingppt-160209144204.pdfphishingppt-160209144204.pdf
phishingppt-160209144204.pdf
vinayakjadhav94
 
need help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdfneed help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdf
anjandavid
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
Krishma Sandesra
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
mark scott
 

Similar to Phishing (20)

Anti phishing
Anti phishingAnti phishing
Anti phishing
 
phishing-technology-730-J1A0e1Q.pptx
phishing-technology-730-J1A0e1Q.pptxphishing-technology-730-J1A0e1Q.pptx
phishing-technology-730-J1A0e1Q.pptx
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
phishingppt-160209144204.pdf
phishingppt-160209144204.pdfphishingppt-160209144204.pdf
phishingppt-160209144204.pdf
 
Phishing
PhishingPhishing
Phishing
 
Exploring And Investigating New Dimensions In Phishing
Exploring And Investigating New Dimensions In PhishingExploring And Investigating New Dimensions In Phishing
Exploring And Investigating New Dimensions In Phishing
 
Cyber security tips in Banking in Nepal
Cyber security tips in Banking in NepalCyber security tips in Banking in Nepal
Cyber security tips in Banking in Nepal
 
need help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdfneed help with a term paper 8 pages Write a term paper that discusse.pdf
need help with a term paper 8 pages Write a term paper that discusse.pdf
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Study on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing ToolsStudy on Phishing Attacks and Antiphishing Tools
Study on Phishing Attacks and Antiphishing Tools
 
The Battle Against Phishing:Dynamic Security Skins
The Battle Against Phishing:Dynamic Security SkinsThe Battle Against Phishing:Dynamic Security Skins
The Battle Against Phishing:Dynamic Security Skins
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Phishing scams in banking ppt
Phishing scams in banking pptPhishing scams in banking ppt
Phishing scams in banking ppt
 
Security Awareness Training.pptx
Security Awareness Training.pptxSecurity Awareness Training.pptx
Security Awareness Training.pptx
 
Ethical Hacking and Cyber Security
Ethical Hacking and Cyber SecurityEthical Hacking and Cyber Security
Ethical Hacking and Cyber Security
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 
cyber security presentation 1234567.pptx
cyber security presentation 1234567.pptxcyber security presentation 1234567.pptx
cyber security presentation 1234567.pptx
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 

Phishing

  • 1. Student Name: Arpit Patel (Enrollment No. 120770107014) Guide: Presentation ( Review) On PHISHING Gujarat Technological UniversitySOCET
  • 2.
  • 3.
  • 4.
  • 5. Contents:  Definition  Introduction  Type of Phishing  Causes of Phishing  How to notice Phishing  Example of Phishing  Prevention Method  Conclusion
  • 6.  Phreaking + Fishing = Phishing - Phreaking = making phone calls for free back in 70’s - Fishing = Use bait to lure the target  Phishing in 1995 Target: AOL users Purpose: getting account passwords for free time Threat level: low Techniques: Similar names ( www.ao1.com for www.aol.com ), social engineering  Phishing in 2001 Target: Ebayers and major banks Purpose: getting credit card numbers, accounts Threat level: medium Techniques: Same in 1995, keylogger  Phishing in 2007 Target: Paypal, banks, ebay Purpose: bank accounts Threat level: high Techniques: browser vulnerabilities, link obfuscation History of Phishing
  • 7. Definition  It is the act of tricking someone into giving confidential information (like passwords and credit card information) on a fake web page.
  • 8. Introduction  Phishing is way of fraudulenty acquiring sensitive information using social engineering  It tries to trick with official looking message •Credit card •Bank account •Facebook id/pw •Paypal  some phishing emails also contain malicious or unwanted software that can track your activities o slow your computer  It is comparatively different from SPAM
  • 10.
  • 11. Phishing Fraudsters Build fake site Send out thousands Of Phishing E-mails With link to fake website Victims click on links in E-mail believing it is Legitimate. They enter personal information Fraudsters compile The stolen data and shell it Online or use it them selves
  • 12. How to notice Phishing?
  • 13.  Artists also use Uniform Resource Locators(URLs) that resemble the name of a well-known company or web-site but are slightly altered by adding, omitting or transposing letters. For example, the URL www.microsoft.com could appear instead as: www.micosoft.com www.mircosoft.com www.verify-microsoft.com
  • 14.
  • 15.
  • 16.
  • 17. “Be alert for spam message” Don’t open any links in suspicious emails, instant messages, or chat room messages
  • 18. “Only communicate personal info. Over secure web site”  Secure website are indicated by a lock on the browser’s status bar or the prefix “Https::// ” instead of “Http://”
  • 19. “Never use e-mail to share personal information”
  • 20. “Avoid using email on public computers” Information from an email is temporarily stored on computer’s local disk and can be retrieved by another user if it is not properly deleted
  • 21. “Do not click anything in pop-up window”  If your browser has a pop-u blocker , enable it.  Do not Copy any website addresses from a pop-up window into your computer.
  • 22. “Use security programs to protect your computer”  Use a spam filter , Anti-spyware program , Anti-virus program and a firewall. These can be obtained from a software retailer or the internet.
  • 23. “Check your credit report and financial statement regularly” Make sure that no unauthorized transaction have been made and that all item on your credit report are correct.
  • 24.
  • 25. TYPE OF PHISHING o Deceptive Phishing o Malware-Based Phishing o Man in the Middle Phishing o Search engine Phishing
  • 26. Deceptive Phishing  Sending a deceptive email, in bulk, with a “call to action that demands the recipient click on a link.
  • 27. Malware-Based Phishing  Malware stands for malicious software, Malware is used to generically describe any malicious software regardless of its technical category
  • 28. Man in the Middle Phishing An attack where attacker gets between the Sender and receiver of information (Session Phishing)
  • 29. Search engine Phishing Create web pages for fake products, get the pages indexed by search engines, and wait for users to enter their confidential information as part of an order, sign-up, or balance transfer.
  • 30. Causes of Phishing  Misleading e-mails  No check of source address  Vulnerability in browsers  No strong authentication at websites of banks and financial institutions  Limited use of digital signatures  Non-availability of secure desktop tools  Lack of user awareness  Vulnerability in applications  … and more
  • 31. Existing System 1) Detect and block the phishing websites in time 2) Enhance the secure of the websites 3) Block the Phishing e-mails by various spam filter 4) Install online anti-phishing software in user’s computers
  • 32. Proposed System 1. Classification of the hyperlink in the phishing e-mail 2. Link guard algorithm 3. Link guard implemented client 4. Feasibility study
  • 33. How to do Search engine Phishing???
  • 34.
  • 35.
  • 36.
  • 37. And then upload this two file to your website…. 