Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
www.studymafia.org
Submitted To: Submitted By:
www.studymafia.org www.studymafia.org
Seminar
On
Phishing
 Introduction
 Phishing Techniques
 Phishing Examples
 Types of Phishing
 Causes of Phishing
 Anti Phishing
 Effect...
 Phishing is the act of attempting to acquire
information such as username, password and
credit card details as a trustwo...
 LINK MANIPULATION
 FILTER EVASION
 WEBSITE FORGERY
 PHONE PHISHING
 In this example, targeted at South Trust Bank users, the
phisher has used an image to make it harder for anti-phishing
f...
 Deceptive - Sending a deceptive email, in bulk, with a “call
to action” that demands the recipient click on a link.
 Ma...
 DNS-Based - Phishing that interferes with the integrity of
the lookup process for a domain name. Forms of DNS-based
phis...
 Content-Injection – Inserting malicious content into legitimate site.
Three primary types of content-injection phishing:...
 Misleading e-mails
 No check of source address
 Vulnerability in browsers
 No strong authentication at websites of ba...
A. Social responses
B. Technical approaches
• 1. Helping to identify legitimate websites.
• 2. Browsers alerting users t...
 Internet fraud
 Identity theft
 Financial loss to the original institutions
 Difficulties in Law Enforcement Investig...
 Preventing a phishing attack before it begins
 Detecting a phishing attack
 Preventing the delivery of phishing messag...
 No single technology will completely stop phishing.
 However, a combination of good organization and
practice, proper a...
www.google.com
www.wikipedia.com
www.studymafia.org
Thanks
Phishing ppt
Upcoming SlideShare
Loading in …5
×

Phishing ppt

24,963 views

Published on

seminar report

Published in: Science
  • I am suffering form worst financial positions i have no money to pay rent or utility bills, My friend told me about this website for some money. I start broken hart but i was surprised to see the results. Now within a month i am making $125 per hour. I recommend all of you who want to make hand some earning to join the link... ●●● http://t.cn/AisJWYf4
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Dating direct: ♥♥♥ http://bit.ly/2Qu6Caa ♥♥♥
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Follow the link, new dating source: ❤❤❤ http://bit.ly/2Qu6Caa ❤❤❤
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Businesses pay you up to $25 per hour to be on Twitter? ●●● http://ishbv.com/socialpaid/pdf
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Paid To Write? Earn up to $200/day on with simple writing jobs.  http://t.cn/AieXS62G
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here

Phishing ppt

  1. 1. www.studymafia.org Submitted To: Submitted By: www.studymafia.org www.studymafia.org Seminar On Phishing
  2. 2.  Introduction  Phishing Techniques  Phishing Examples  Types of Phishing  Causes of Phishing  Anti Phishing  Effects of Phishing  Defend against Phishing Attacks  Conclusion  Reference
  3. 3.  Phishing is the act of attempting to acquire information such as username, password and credit card details as a trustworthy entity in an electronic communication.  Communications purporting to be from popular social web sites ,auction sites, online payment process or IT administrators are commonly used to lure the unsuspecting public .Phishing emails may contain links to websites that are infected with malware.
  4. 4.  LINK MANIPULATION  FILTER EVASION  WEBSITE FORGERY  PHONE PHISHING
  5. 5.  In this example, targeted at South Trust Bank users, the phisher has used an image to make it harder for anti-phishing filters to detect by scanning for text commonly used in phishing emails.
  6. 6.  Deceptive - Sending a deceptive email, in bulk, with a “call to action” that demands the recipient click on a link.  Malware-Based - Running malicious software on the user’s machine. Various forms of malware-based phishing are:  Key Loggers & Screen Loggers  Session Hijackers  Web Trojans  Data Theft
  7. 7.  DNS-Based - Phishing that interferes with the integrity of the lookup process for a domain name. Forms of DNS-based phishing are:  Hosts file poisoning  Polluting user’s DNS cache  Proxy server compromise  Man-in-the-Middle Phishing - Phisher positions himself between the user and the legitimate site.
  8. 8.  Content-Injection – Inserting malicious content into legitimate site. Three primary types of content-injection phishing:  Hackers can compromise a server through a security vulnerability and replace or augment the legitimate content with malicious content.  Malicious content can be inserted into a site through a cross-site scripting vulnerability. Malicious actions can be performed on a site through a SQL injection vulnerability.
  9. 9.  Misleading e-mails  No check of source address  Vulnerability in browsers  No strong authentication at websites of banks and financial institutions  Limited use of digital signatures  Non-availability of secure desktop tools  Lack of user awareness  Vulnerability in applications
  10. 10. A. Social responses B. Technical approaches • 1. Helping to identify legitimate websites. • 2. Browsers alerting users to fraudulent websites. • 3. Eliminating Phishing mail. • 4. Monitoring and takedown. C. Legal approaches
  11. 11.  Internet fraud  Identity theft  Financial loss to the original institutions  Difficulties in Law Enforcement Investigations  Erosion of Public Trust in the Internet.
  12. 12.  Preventing a phishing attack before it begins  Detecting a phishing attack  Preventing the delivery of phishing messages  Preventing deception in phishing messages and sites  Counter measures  Interfering with the use of compromised information
  13. 13.  No single technology will completely stop phishing.  However, a combination of good organization and practice, proper application of current technologies, and improvements in security technology has the potential to drastically reduce the prevalence of phishing and the losses suffered from it.
  14. 14. www.google.com www.wikipedia.com www.studymafia.org
  15. 15. Thanks

×