SlideShare a Scribd company logo
1 of 6
Download to read offline
PHISHING

 Phishing is an attempt of obtaining information from a
user which is meant to be kept secret or can be used at
proper place. phishing results in loosing user from
his/her account details to credit card number and in
some weired cases even identity theft.

The Modules Operandi
 ➔ A e-mail saying we need some details & supposedly

   seems to be genuine.
 ➔ e-mail like you have won a million Rs lottery fill the

   form & collect your money.
 ➔ Fake mail page where you will login & result in

   loosing your passwor d.

some screen-shots:-
i have taken these shots from a spam that i received
today. It is a phishing site of the HDFC bank.

     see if you find any differ
                              ence in the pages




www.atuljha.com
one




www.atuljha.com
two




www.atuljha.com
three




www.atuljha.com
Points to notice:--
if we open and match the real page of HDFC we will find
everything similar except the ADDRESS BAR which i
have encircled.
It is also VeriSign Secured.

                  the original page of HDFC.




www.atuljha.com
well we can clearly see how easy it is to forge or create
a fake page with same content.

-----Protection---
we can protect ourself if we are careful enough before
doing any financial transaction a making sure the
                                  nd
page we are filling our details are the true one.

--software---
Yes we do have one from netcraft.i have not tried it
because i keep my eyes open & believe in myself rather
than the softwares.




www.atuljha.com

More Related Content

Similar to Phishing

Unit8 a1 student_template
Unit8 a1 student_templateUnit8 a1 student_template
Unit8 a1 student_template
DannySD95
 
Email and web security
Email and web securityEmail and web security
Email and web security
shahhardik27
 
AK FAQ_3DSECURE EN
AK FAQ_3DSECURE ENAK FAQ_3DSECURE EN
AK FAQ_3DSECURE EN
Talal Sobh
 

Similar to Phishing (20)

Unit8 a1 student_template
Unit8 a1 student_templateUnit8 a1 student_template
Unit8 a1 student_template
 
Amazon & E Bay
Amazon & E BayAmazon & E Bay
Amazon & E Bay
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
THE ULTIMATE BLACKHAT CASH MACHINE - make money online
THE ULTIMATE BLACKHAT CASH MACHINE - make money onlineTHE ULTIMATE BLACKHAT CASH MACHINE - make money online
THE ULTIMATE BLACKHAT CASH MACHINE - make money online
 
Email and web security
Email and web securityEmail and web security
Email and web security
 
QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...
QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...
QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...
 
Web spoofing (1)
Web spoofing (1)Web spoofing (1)
Web spoofing (1)
 
Stripe Integration With MuleSoft
Stripe Integration With MuleSoftStripe Integration With MuleSoft
Stripe Integration With MuleSoft
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & Safety
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security Breaches
 
AK FAQ_3DSECURE EN
AK FAQ_3DSECURE ENAK FAQ_3DSECURE EN
AK FAQ_3DSECURE EN
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
Corporate Ways to Protect Confidential Information.pdf
Corporate Ways to Protect Confidential Information.pdfCorporate Ways to Protect Confidential Information.pdf
Corporate Ways to Protect Confidential Information.pdf
 
What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdf
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud
 
BDD - Collaborate like you mean it!
BDD - Collaborate like you mean it!BDD - Collaborate like you mean it!
BDD - Collaborate like you mean it!
 
Small Business Help
Small Business HelpSmall Business Help
Small Business Help
 
Social media
Social mediaSocial media
Social media
 

More from Atul Jha

OpenStack : Linux User Group meetup
OpenStack : Linux User Group meetupOpenStack : Linux User Group meetup
OpenStack : Linux User Group meetup
Atul Jha
 
OpenStack: An introduction
OpenStack: An introductionOpenStack: An introduction
OpenStack: An introduction
Atul Jha
 
Open Cloud -- Future of Cloud Computing
Open Cloud -- Future of Cloud ComputingOpen Cloud -- Future of Cloud Computing
Open Cloud -- Future of Cloud Computing
Atul Jha
 
Introduction to Selinux
Introduction to SelinuxIntroduction to Selinux
Introduction to Selinux
Atul Jha
 

More from Atul Jha (20)

Hooked by Nir Eyal
Hooked by Nir EyalHooked by Nir Eyal
Hooked by Nir Eyal
 
Don't make me think: Steve Krug
Don't make me think: Steve KrugDon't make me think: Steve Krug
Don't make me think: Steve Krug
 
Thumbnail generation using Minio's event notification.
Thumbnail generation using Minio's event notification.Thumbnail generation using Minio's event notification.
Thumbnail generation using Minio's event notification.
 
Minio: Associated projects in Go programming.
Minio: Associated projects in Go programming. Minio: Associated projects in Go programming.
Minio: Associated projects in Go programming.
 
Open Source Cloud alternatives
Open Source Cloud alternativesOpen Source Cloud alternatives
Open Source Cloud alternatives
 
Summary of DockerCon Europe.
Summary of DockerCon Europe. Summary of DockerCon Europe.
Summary of DockerCon Europe.
 
OpenStack Swift production deployments
OpenStack Swift production deploymentsOpenStack Swift production deployments
OpenStack Swift production deployments
 
OpenStack Swift on virtualbox
OpenStack Swift on virtualboxOpenStack Swift on virtualbox
OpenStack Swift on virtualbox
 
OpenStack Swift: Panoramic View
OpenStack Swift: Panoramic ViewOpenStack Swift: Panoramic View
OpenStack Swift: Panoramic View
 
OpenStack : Linux User Group meetup
OpenStack : Linux User Group meetupOpenStack : Linux User Group meetup
OpenStack : Linux User Group meetup
 
OpenStack: An introduction
OpenStack: An introductionOpenStack: An introduction
OpenStack: An introduction
 
Open Cloud -- Future of Cloud Computing
Open Cloud -- Future of Cloud ComputingOpen Cloud -- Future of Cloud Computing
Open Cloud -- Future of Cloud Computing
 
Openstack: Open Source software for building public and private cloud.
Openstack: Open Source software for building public and private cloud.Openstack: Open Source software for building public and private cloud.
Openstack: Open Source software for building public and private cloud.
 
Introduction and hacking OpenStack, Pycon India
Introduction and hacking OpenStack,  Pycon IndiaIntroduction and hacking OpenStack,  Pycon India
Introduction and hacking OpenStack, Pycon India
 
Introduction to FOSS, SRM University
Introduction to FOSS, SRM UniversityIntroduction to FOSS, SRM University
Introduction to FOSS, SRM University
 
Juju
JujuJuju
Juju
 
Foss adoption in Indian Government Enterprise.
Foss adoption in Indian  Government Enterprise.Foss adoption in Indian  Government Enterprise.
Foss adoption in Indian Government Enterprise.
 
Nepal
Nepal Nepal
Nepal
 
Introduction to Subversion
Introduction to SubversionIntroduction to Subversion
Introduction to Subversion
 
Introduction to Selinux
Introduction to SelinuxIntroduction to Selinux
Introduction to Selinux
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Phishing

  • 1. PHISHING Phishing is an attempt of obtaining information from a user which is meant to be kept secret or can be used at proper place. phishing results in loosing user from his/her account details to credit card number and in some weired cases even identity theft. The Modules Operandi ➔ A e-mail saying we need some details & supposedly seems to be genuine. ➔ e-mail like you have won a million Rs lottery fill the form & collect your money. ➔ Fake mail page where you will login & result in loosing your passwor d. some screen-shots:- i have taken these shots from a spam that i received today. It is a phishing site of the HDFC bank. see if you find any differ ence in the pages www.atuljha.com
  • 5. Points to notice:-- if we open and match the real page of HDFC we will find everything similar except the ADDRESS BAR which i have encircled. It is also VeriSign Secured. the original page of HDFC. www.atuljha.com
  • 6. well we can clearly see how easy it is to forge or create a fake page with same content. -----Protection--- we can protect ourself if we are careful enough before doing any financial transaction a making sure the nd page we are filling our details are the true one. --software--- Yes we do have one from netcraft.i have not tried it because i keep my eyes open & believe in myself rather than the softwares. www.atuljha.com