SlideShare uma empresa Scribd logo
1 de 48
Baixar para ler offline
Ethical Hacking and
Countermeasures
Version 6




Module XIII
Hacking Email Accounts
News




                                        Source: http://uk.news.yahoo.com/


                                               Copyright © by EC-Council
EC-Council          All Rights Reserved. Reproduction is Strictly Prohibited
Module Objective


             This module will familiarize you with:


             •   Ways of Getting Email Account Information
             •   Vulnerabilities
             •   Tools
             •   Security Techniques
             •   Creating Strong Passwords
             •   Sign-in S l
                 Si i Seal




                                                                                 Copyright © by EC-Council
EC-Council                                            All Rights Reserved. Reproduction is Strictly Prohibited
Module Flow


             Ways of Getting Email
                                       Security Techniques
             Account Information




                Vulnerabilities      Creating Strong Passwords




                     Tools                   Sign-in Seal



                                                                     Copyright © by EC-Council
EC-Council                                All Rights Reserved. Reproduction is Strictly Prohibited
Introduction



                                                  Copyright © by EC-Council
EC-Council             All Rights Reserved. Reproduction is Strictly Prohibited
Introduction

        Hacking
        H ki email accounts has become a serious th t
                il       t h b              i    threat



        Email accounts are the repositories where people store their private
        information or even their business data



        Due to the widespread use of the Internet techniques and tools
        hacker can access the user ID and email password
                                                p




                                                                                Copyright © by EC-Council
EC-Council                                           All Rights Reserved. Reproduction is Strictly Prohibited
Ways for Getting Email Account
             Information


                   Stealing Cookies


                   Social Engineering


                   Password
                   Phishing



                                                                   Copyright © by EC-Council
EC-Council                              All Rights Reserved. Reproduction is Strictly Prohibited
Stealing Cookies


       If a web site uses a cookie, or a browser contains the
       cookie, then every time you visit that website, the
       browser transfers the cookie to that website


       If a user’s cookie is stolen by an attacker, he/she can
       impersonate the user
       i              h


       If the data present in the cookies is not encrypted,
       then after stealing the cookies an attacker can see the
       information which may contain the username and the
       password


                                                                                  Copyright © by EC-Council
EC-Council                                             All Rights Reserved. Reproduction is Strictly Prohibited
Social Engineering

      Social engineering is defined as a “non technical kind of intrusion
                                          non-technical
      that relies heavily on human interaction and often involves
      tricking other people to break normal security procedures.”



      Social engineering hackers persuade a target to provide
      information through a believable trick, rather than infecting a
      computer with malware through a direct attack

      Most of the persons unwittingly give away key information in an
      email or by answering questions over the phone such as names of
      their children, wife, email ID, vehicle number and other sensitive
                    ,     ,         ,
      information.


      Attacker use this information for hacking email accounts


                                                                                             Copyright © by EC-Council
EC-Council                                                        All Rights Reserved. Reproduction is Strictly Prohibited
Password Phishing

        The process of tricking user to disclose user name and password by
        sending f k emails or setting up f k website which mimics sign-in
           di fake        il       i       fake b i      hi h i i    i i
        pages is called phishing


       After gaining Username and password, fraudsters can use personal
       information to:

                     Commit identity theft

                     Charge your credit card

                     Clear your bank account

                     Change the previous password

                                                                               Copyright © by EC-Council
EC-Council                                          All Rights Reserved. Reproduction is Strictly Prohibited
Fraudulent e-mail Messages

       You might receive an e-mail message from
                            e mail
       bank asking for updated information


       The message provides the target user with a
       link to a legitimate site but redirects the
       user to a spoofed one


       That message ask for Login, password, and
       other sensitive information


       Attacker can use this information for
       hacking email accounts

                                                                                Copyright © by EC-Council
EC-Council                                           All Rights Reserved. Reproduction is Strictly Prohibited
News




                       Source: http://www.consumeraffairs.com/


                                               Copyright © by EC-Council
EC-Council          All Rights Reserved. Reproduction is Strictly Prohibited
Vulnerabilities



                                                    Copyright © by EC-Council
EC-Council               All Rights Reserved. Reproduction is Strictly Prohibited
Vulnerabilities: Web Email

      While using web based email service, after clicking a link p
                 g                         ,            g        present in
      the email body, it transfers from URL of the current page (webmail
      URL) to the next page (link present)



      This information is transmitted through third party web servers




      Information can include:


       • Email address
       • Login ID
       • Actual name
                                                                                 Copyright © by EC-Council
EC-Council                                            All Rights Reserved. Reproduction is Strictly Prohibited
Vulnerabilities: Reaper Exploit

        The confidentiality of email can be brought down
        by the micro virus like Reaper Exploit

        Reaper Exploit works in the background and
        sends a copy of reply or forwarded mails to the
        hacker

        This exploit uses the functionality of DHTML in
               p                          y
        Internet Explorer, used by Microsoft outlook

        Email clients who make use of the internet
        explorer as their HTML engine are vulnerable

        Email scripting should be turned off to prevent
                                         off,
        from this attack
                                                                                 Copyright © by EC-Council
EC-Council                                            All Rights Reserved. Reproduction is Strictly Prohibited
Email Hacking Tools


                                                     Copyright © by EC-Council
EC-Council                All Rights Reserved. Reproduction is Strictly Prohibited
Tool: Advanced Stealth Email
                 Redirector

      This program monitors outgoing traffic
      of the target PC's email client and
      intercepts all the messages sent from it


      Intercepted emails are forwarded to a
             p
      pre-specified email address


      Advanced SER does not intercept emails
      sent from web-based email services like
      www.yahoo.com, www.hotmail.com etc


                                                                            Copyright © by EC-Council
EC-Council                                       All Rights Reserved. Reproduction is Strictly Prohibited
Tool: Mail PassView

             Mail PassView is a small password-recovery tool that reveals
             the passwords and other account d il f the f ll i
              h          d    d h            details for h following
             email clients:


             • Outlook Express
             • Microsoft Outlook 2000 (POP3 and SMTP Accounts only)
             • Microsoft Outlook 2002/2003/2007 (POP3, IMAP, HTTP and SMTP
               Accounts))
             • Windows Mail
             • Netscape 6.x/7.x
             • Mozilla Thunderbird
             • Group Mail Free
             • Yahoo! Mail - If the password is saved in Yahoo! Messenger application
             • Hotmail/MSN mail - If the password is saved in MSN Messenger
               application
             • G il - If th password i saved b G il N tifi application, G
               Gmail      the         d is    d by Gmail Notifier   li ti   Googlel
               Desktop, or by Google Talk
                                                                                          Copyright © by EC-Council
EC-Council                                                     All Rights Reserved. Reproduction is Strictly Prohibited
Mail PassView: Screenshot




                                                          Copyright © by EC-Council
EC-Council                     All Rights Reserved. Reproduction is Strictly Prohibited
Tool: Email Password Recovery
                    Master
             Email Password Recovery Master is a p g
                                      y            program
             that displays logins and passwords for email
             accounts stored by:


             •   Eudora
             •   The Bat!
             •   Becky
                 B k
             •   IncrediMail
             •   Gmail Notifier
             •   Group Mail Free
             •   PocoMail
             •   Forte Agent
             •   Mail.Ru Agent
             •   Scribe
                                                                           Copyright © by EC-Council
EC-Council                                      All Rights Reserved. Reproduction is Strictly Prohibited
Email Password Recovery
             Master: Screenshot




                                                         Copyright © by EC-Council
EC-Council                    All Rights Reserved. Reproduction is Strictly Prohibited
Tool: Mail Password

      Mail Password is a universal password recovery tool for POP3 email
      accounts



      It recovers all POP3 email logins and passwords stored on your
      computer by your email software



      Mail Password emulates a POP3 server and the E-mail client returns
      the password



      It supports all email programs, including Outlook, Eudora, The Bat!
      and more
         d

                                                                               Copyright © by EC-Council
EC-Council                                          All Rights Reserved. Reproduction is Strictly Prohibited
Mail Password: Screenshot




                                                          Copyright © by EC-Council
EC-Council                     All Rights Reserved. Reproduction is Strictly Prohibited
Email Finder Pro

       Email Finder Pro extracts business emails from a file or a directory containing
       files


       Fast and simple email address extraction utility




                                                                                     Copyright © by EC-Council
EC-Council                                                All Rights Reserved. Reproduction is Strictly Prohibited
Email Spider Easy

      Email Spider Easy is a targeted bulk email
      marketing software
         k ti     ft


      Quickly d
      Q i kl and automatically search and spider f
                           i ll       h d id from
      search engine to find e-mail addresses


      Integrated with 90 top popular search engines:
      Yahoo, Google, MSN, AOL, and so on


      Fast search speed allows upto 500 email extraction
      thread simultaneously

                                                                                  Copyright © by EC-Council
EC-Council                                             All Rights Reserved. Reproduction is Strictly Prohibited
Email Spider Easy: Screenshot




                  Figure: Email Spider Easy
                                                                         Copyright © by EC-Council
EC-Council                                    All Rights Reserved. Reproduction is Strictly Prohibited
Kernel Hotmail MSN Password
                   Recovery


        Kernel Hotmail & MSN Password Recovery software
        recovers th stored or saved password of th
                 the t d          d        d f the
        Hotmail and MSN Messenger account from your
        computer



        Supports all versions of MSN Messenger
          pp                               g




                                                                            Copyright © by EC-Council
EC-Council                                       All Rights Reserved. Reproduction is Strictly Prohibited
Kernel Hotmail MSN Password
             Recovery: Screenshot




                                                         Copyright © by EC-Council
EC-Council                    All Rights Reserved. Reproduction is Strictly Prohibited
Retrieve Forgotten Yahoo
                    Password
      Retrieve Forgotten Yahoo Password cracks Gmail, Yahoo passwords


      It retrieves encrypted characters hidden behind asterisk****


      It restores hacked pop3 email IDs and passwords



             Features:


             • Decodes the coded user and owner password which provides the
               standard security to prevent PDF files from copying, printing, and
               editing
             • It reveals the Yahoo, Hotmail, Gmail, Indiatimes, Rediffmail, and
               MSN account passwords
                             t        d

                                                                                      Copyright © by EC-Council
EC-Council                                                 All Rights Reserved. Reproduction is Strictly Prohibited
Retrieve Forgotten Yahoo
             Password: Screenshot




                Figure: Retrieve Forgotten Yahoo Password
                                                                                 Copyright © by EC-Council
EC-Council                                            All Rights Reserved. Reproduction is Strictly Prohibited
MegaHackerZ

       MegaHackerZ helps you crack passwords to any email address


       It will help you to get the password you desire, instantly




                                                                                 Copyright © by EC-Council
EC-Council                                            All Rights Reserved. Reproduction is Strictly Prohibited
Hack Passwords

       The Email Password hacking software will get you any Password you
       need
        eed

       It allows to take command and control of any email




                                                                              Copyright © by EC-Council
EC-Council                                         All Rights Reserved. Reproduction is Strictly Prohibited
Securing E il A
             S    i Email Accounts



                                                      Copyright © by EC-Council
EC-Council                 All Rights Reserved. Reproduction is Strictly Prohibited
Creating Strong Passwords
     Best way to protect from hackers is to use the strong password

     A strong password is one which cannot be determined by automated programs



             A strong password contains:


             • Seven to sixteen characters
             • Choose a phrase or combination of words
             • Uses three of the following four types of
               characters:
              •   Uppercase letters (A, B, C)
              •   Lowercase letters (a, b, c)
              •   Numerals (1, 2, 3)
              •   Special characters (` ~ ! @ # $ % ^ & * ( ) _ + - = { } |
                                           (
                  [ ]  : " ; ' < > ? , . /)

                                                                                                  Copyright © by EC-Council
EC-Council                                                             All Rights Reserved. Reproduction is Strictly Prohibited
Creating Strong Passwords:
             Change Password Screenshot




                                                         Copyright © by EC-Council
EC-Council                    All Rights Reserved. Reproduction is Strictly Prohibited
Creating Strong Passwords:
             Trouble Signing In Screenshot




                                                          Copyright © by EC-Council
EC-Council                     All Rights Reserved. Reproduction is Strictly Prohibited
Sign-in Seal

      Sign in
      Sign-in seal protects account from
      phishing



      Sign-in seal is a custom text or image
      set up by the user on the computer


      User needs to create different sign-in
      seal for different browsers and
      computers


      Do not create sign-in seal on networked
                      g
      computer
                                                                           Copyright © by EC-Council
EC-Council                                      All Rights Reserved. Reproduction is Strictly Prohibited
Alternate Email Address

       Alternate email address are prompted at signup


       At the time of password recovery, passwords can be sent to the
                               recovery
       alternate email address




                                                                               Copyright © by EC-Council
EC-Council                                          All Rights Reserved. Reproduction is Strictly Prohibited
Keep Me Signed In/
                   Remember Me

     When you login on any site, there is checkbox like
     "Keep me signed in" or “Remember Me”



     If you select this option, next time it will
     automatically open your account in same computer



     If attacker handles such a system, he will get access
     to the email account



     If you are using a public computer it is
                               computer,
     recommended that you uncheck the checkbox
                                                                                        Copyright © by EC-Council
EC-Council                                                   All Rights Reserved. Reproduction is Strictly Prohibited
Tool: Email Protector

      Email Protector protects password and automatically logs off your email
      account

      Email Protector shows you how to add password protection to your Outlook
      Express email




                              Figure: Email Protector                               Copyright © by EC-Council
EC-Council                                               All Rights Reserved. Reproduction is Strictly Prohibited
Tool: Email Security


        Internet Service Provider (ISP) stores copies of
        all your email messages on its mail servers




        All the information kept on the servers can b
                              p                     be
        easily used against you



        Email Security always breaks email messages
        addressed to a group of people to individual
        messages to ensure y
              g            your as well as respondent’s
                                              p
        security
                                                                                 Copyright © by EC-Council
EC-Council                                            All Rights Reserved. Reproduction is Strictly Prohibited
Email Security: Screenshot




             Figure: Email Security Main Window                              Copyright © by EC-Council
EC-Council                                        All Rights Reserved. Reproduction is Strictly Prohibited
Tool: EmailSanitizer

       EmailSanitizer is a filter between the incoming email server, and your
       computer


       EmailSanitizer Lets you keep track of how much spam is being
       stopped and how many viruses are being destroyed




                                                                               Copyright © by EC-Council
EC-Council                                          All Rights Reserved. Reproduction is Strictly Prohibited
Tool: SuperSecret

        SuperSecret provides secure storage for all of your logins and
        passwords so th t you only h
               d     that       l have one password t remember
                                                      d to        b
        from now on


        Only one password is required to use SuperSecret


        All of your other account and password information is stored
        securely in an encrypted format on your computer and can be
        accessed only with your one and only password
                d l ih                 d l           d




                                                                             Copyright © by EC-Council
EC-Council                                        All Rights Reserved. Reproduction is Strictly Prohibited
SuperSecret: Screenshot




                                                         Copyright © by EC-Council
EC-Council                    All Rights Reserved. Reproduction is Strictly Prohibited
Summary

        Username and password can be revealed if it is stored in cookie and is
        not encrypted


        The confidentiality of email can be brought down by the micro virus
        like Reaper Exploit


        A strong password is one which cannot be determined by automated
        programs




                                                                                Copyright © by EC-Council
EC-Council                                           All Rights Reserved. Reproduction is Strictly Prohibited
Copyright © by EC-Council
EC-Council   All Rights Reserved. Reproduction is Strictly Prohibited
Copyright © by EC-Council
EC-Council   All Rights Reserved. Reproduction is Strictly Prohibited

Mais conteúdo relacionado

Mais procurados

20120329 Cybercrime threats on e-world
20120329 Cybercrime threats on e-world20120329 Cybercrime threats on e-world
20120329 Cybercrime threats on e-worldLuc Beirens
 
IT Security booklet
IT Security bookletIT Security booklet
IT Security bookletiteclearners
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Small Business
 
Computer security
Computer securityComputer security
Computer securityDhani Ahmad
 
Cyber crime in WORLD
Cyber crime in WORLDCyber crime in WORLD
Cyber crime in WORLDAvasyu Gupta
 
TH3 Professional Developper google hacking
TH3 Professional Developper google hackingTH3 Professional Developper google hacking
TH3 Professional Developper google hackingth3prodevelopper
 
Ce hv6 module 48 corporate espionage by insiders
Ce hv6 module 48 corporate espionage by insidersCe hv6 module 48 corporate espionage by insiders
Ce hv6 module 48 corporate espionage by insidersVi Tính Hoàng Nam
 
Don zaal a 11.15 11.45 fccu
Don zaal a 11.15 11.45 fccuDon zaal a 11.15 11.45 fccu
Don zaal a 11.15 11.45 fccuwebwinkelvakdag
 
Information-Security-Lecture-8.pptx
Information-Security-Lecture-8.pptxInformation-Security-Lecture-8.pptx
Information-Security-Lecture-8.pptxanbersattar
 

Mais procurados (11)

2 phishing
2 phishing2 phishing
2 phishing
 
20120329 Cybercrime threats on e-world
20120329 Cybercrime threats on e-world20120329 Cybercrime threats on e-world
20120329 Cybercrime threats on e-world
 
IT Security booklet
IT Security bookletIT Security booklet
IT Security booklet
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
 
Computer security
Computer securityComputer security
Computer security
 
Cyber crime in WORLD
Cyber crime in WORLDCyber crime in WORLD
Cyber crime in WORLD
 
I.T Security Threats
I.T Security ThreatsI.T Security Threats
I.T Security Threats
 
TH3 Professional Developper google hacking
TH3 Professional Developper google hackingTH3 Professional Developper google hacking
TH3 Professional Developper google hacking
 
Ce hv6 module 48 corporate espionage by insiders
Ce hv6 module 48 corporate espionage by insidersCe hv6 module 48 corporate espionage by insiders
Ce hv6 module 48 corporate espionage by insiders
 
Don zaal a 11.15 11.45 fccu
Don zaal a 11.15 11.45 fccuDon zaal a 11.15 11.45 fccu
Don zaal a 11.15 11.45 fccu
 
Information-Security-Lecture-8.pptx
Information-Security-Lecture-8.pptxInformation-Security-Lecture-8.pptx
Information-Security-Lecture-8.pptx
 

Semelhante a TH3 Professional Developper CEH hacking email accounts

TH3 Professional Developper CEH phishing
TH3 Professional Developper CEH phishingTH3 Professional Developper CEH phishing
TH3 Professional Developper CEH phishingth3prodevelopper
 
Ethical Hacking and Cyber Security
Ethical Hacking and Cyber SecurityEthical Hacking and Cyber Security
Ethical Hacking and Cyber SecurityNeeraj Negi
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02mark scott
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacyJIJO CLEETUS
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internetRohan Bharadwaj
 
securityenvironment.pptx
securityenvironment.pptxsecurityenvironment.pptx
securityenvironment.pptxrehamrere
 
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...Intellipaat
 
Ceh v5 module 09 social engineering
Ceh v5 module 09 social engineeringCeh v5 module 09 social engineering
Ceh v5 module 09 social engineeringVi Tính Hoàng Nam
 
Ce hv6 module 45 privacy on the internet
Ce hv6 module 45 privacy on the internetCe hv6 module 45 privacy on the internet
Ce hv6 module 45 privacy on the internetVi Tính Hoàng Nam
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber securityKeshab Nath
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...Ankita Shirke
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHINGsanthuana sg
 
20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threat20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threatLuc Beirens
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Mukesh Chinta
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresIRJET Journal
 

Semelhante a TH3 Professional Developper CEH hacking email accounts (20)

TH3 Professional Developper CEH phishing
TH3 Professional Developper CEH phishingTH3 Professional Developper CEH phishing
TH3 Professional Developper CEH phishing
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ethical Hacking and Cyber Security
Ethical Hacking and Cyber SecurityEthical Hacking and Cyber Security
Ethical Hacking and Cyber Security
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
 
Cyber security and privacy
Cyber security and privacyCyber security and privacy
Cyber security and privacy
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
securityenvironment.pptx
securityenvironment.pptxsecurityenvironment.pptx
securityenvironment.pptx
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
How To Prevent Cyber Attacks | Types of Cyber Attack | What is Cyber Attack |...
 
Ceh v5 module 09 social engineering
Ceh v5 module 09 social engineeringCeh v5 module 09 social engineering
Ceh v5 module 09 social engineering
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ce hv6 module 45 privacy on the internet
Ce hv6 module 45 privacy on the internetCe hv6 module 45 privacy on the internet
Ce hv6 module 45 privacy on the internet
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Web Security
Web SecurityWeb Security
Web Security
 
Cyber Safety and cyber security. Safety measures towards computer networks a...
Cyber Safety  and cyber security. Safety measures towards computer networks a...Cyber Safety  and cyber security. Safety measures towards computer networks a...
Cyber Safety and cyber security. Safety measures towards computer networks a...
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
 
20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threat20120208 Strategical approach to tacle cybercrime & the botnet threat
20120208 Strategical approach to tacle cybercrime & the botnet threat
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Phishing: Analysis and Countermeasures
Phishing: Analysis and CountermeasuresPhishing: Analysis and Countermeasures
Phishing: Analysis and Countermeasures
 

Último

Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 

Último (20)

Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 

TH3 Professional Developper CEH hacking email accounts

  • 1. Ethical Hacking and Countermeasures Version 6 Module XIII Hacking Email Accounts
  • 2. News Source: http://uk.news.yahoo.com/ Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 3. Module Objective This module will familiarize you with: • Ways of Getting Email Account Information • Vulnerabilities • Tools • Security Techniques • Creating Strong Passwords • Sign-in S l Si i Seal Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 4. Module Flow Ways of Getting Email Security Techniques Account Information Vulnerabilities Creating Strong Passwords Tools Sign-in Seal Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 5. Introduction Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 6. Introduction Hacking H ki email accounts has become a serious th t il t h b i threat Email accounts are the repositories where people store their private information or even their business data Due to the widespread use of the Internet techniques and tools hacker can access the user ID and email password p Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 7. Ways for Getting Email Account Information Stealing Cookies Social Engineering Password Phishing Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 8. Stealing Cookies If a web site uses a cookie, or a browser contains the cookie, then every time you visit that website, the browser transfers the cookie to that website If a user’s cookie is stolen by an attacker, he/she can impersonate the user i h If the data present in the cookies is not encrypted, then after stealing the cookies an attacker can see the information which may contain the username and the password Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 9. Social Engineering Social engineering is defined as a “non technical kind of intrusion non-technical that relies heavily on human interaction and often involves tricking other people to break normal security procedures.” Social engineering hackers persuade a target to provide information through a believable trick, rather than infecting a computer with malware through a direct attack Most of the persons unwittingly give away key information in an email or by answering questions over the phone such as names of their children, wife, email ID, vehicle number and other sensitive , , , information. Attacker use this information for hacking email accounts Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 10. Password Phishing The process of tricking user to disclose user name and password by sending f k emails or setting up f k website which mimics sign-in di fake il i fake b i hi h i i i i pages is called phishing After gaining Username and password, fraudsters can use personal information to: Commit identity theft Charge your credit card Clear your bank account Change the previous password Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 11. Fraudulent e-mail Messages You might receive an e-mail message from e mail bank asking for updated information The message provides the target user with a link to a legitimate site but redirects the user to a spoofed one That message ask for Login, password, and other sensitive information Attacker can use this information for hacking email accounts Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 12. News Source: http://www.consumeraffairs.com/ Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 13. Vulnerabilities Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 14. Vulnerabilities: Web Email While using web based email service, after clicking a link p g , g present in the email body, it transfers from URL of the current page (webmail URL) to the next page (link present) This information is transmitted through third party web servers Information can include: • Email address • Login ID • Actual name Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 15. Vulnerabilities: Reaper Exploit The confidentiality of email can be brought down by the micro virus like Reaper Exploit Reaper Exploit works in the background and sends a copy of reply or forwarded mails to the hacker This exploit uses the functionality of DHTML in p y Internet Explorer, used by Microsoft outlook Email clients who make use of the internet explorer as their HTML engine are vulnerable Email scripting should be turned off to prevent off, from this attack Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 16. Email Hacking Tools Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 17. Tool: Advanced Stealth Email Redirector This program monitors outgoing traffic of the target PC's email client and intercepts all the messages sent from it Intercepted emails are forwarded to a p pre-specified email address Advanced SER does not intercept emails sent from web-based email services like www.yahoo.com, www.hotmail.com etc Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 18. Tool: Mail PassView Mail PassView is a small password-recovery tool that reveals the passwords and other account d il f the f ll i h d d h details for h following email clients: • Outlook Express • Microsoft Outlook 2000 (POP3 and SMTP Accounts only) • Microsoft Outlook 2002/2003/2007 (POP3, IMAP, HTTP and SMTP Accounts)) • Windows Mail • Netscape 6.x/7.x • Mozilla Thunderbird • Group Mail Free • Yahoo! Mail - If the password is saved in Yahoo! Messenger application • Hotmail/MSN mail - If the password is saved in MSN Messenger application • G il - If th password i saved b G il N tifi application, G Gmail the d is d by Gmail Notifier li ti Googlel Desktop, or by Google Talk Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 19. Mail PassView: Screenshot Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 20. Tool: Email Password Recovery Master Email Password Recovery Master is a p g y program that displays logins and passwords for email accounts stored by: • Eudora • The Bat! • Becky B k • IncrediMail • Gmail Notifier • Group Mail Free • PocoMail • Forte Agent • Mail.Ru Agent • Scribe Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 21. Email Password Recovery Master: Screenshot Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 22. Tool: Mail Password Mail Password is a universal password recovery tool for POP3 email accounts It recovers all POP3 email logins and passwords stored on your computer by your email software Mail Password emulates a POP3 server and the E-mail client returns the password It supports all email programs, including Outlook, Eudora, The Bat! and more d Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 23. Mail Password: Screenshot Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 24. Email Finder Pro Email Finder Pro extracts business emails from a file or a directory containing files Fast and simple email address extraction utility Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 25. Email Spider Easy Email Spider Easy is a targeted bulk email marketing software k ti ft Quickly d Q i kl and automatically search and spider f i ll h d id from search engine to find e-mail addresses Integrated with 90 top popular search engines: Yahoo, Google, MSN, AOL, and so on Fast search speed allows upto 500 email extraction thread simultaneously Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 26. Email Spider Easy: Screenshot Figure: Email Spider Easy Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 27. Kernel Hotmail MSN Password Recovery Kernel Hotmail & MSN Password Recovery software recovers th stored or saved password of th the t d d d f the Hotmail and MSN Messenger account from your computer Supports all versions of MSN Messenger pp g Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 28. Kernel Hotmail MSN Password Recovery: Screenshot Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 29. Retrieve Forgotten Yahoo Password Retrieve Forgotten Yahoo Password cracks Gmail, Yahoo passwords It retrieves encrypted characters hidden behind asterisk**** It restores hacked pop3 email IDs and passwords Features: • Decodes the coded user and owner password which provides the standard security to prevent PDF files from copying, printing, and editing • It reveals the Yahoo, Hotmail, Gmail, Indiatimes, Rediffmail, and MSN account passwords t d Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 30. Retrieve Forgotten Yahoo Password: Screenshot Figure: Retrieve Forgotten Yahoo Password Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 31. MegaHackerZ MegaHackerZ helps you crack passwords to any email address It will help you to get the password you desire, instantly Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 32. Hack Passwords The Email Password hacking software will get you any Password you need eed It allows to take command and control of any email Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 33. Securing E il A S i Email Accounts Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 34. Creating Strong Passwords Best way to protect from hackers is to use the strong password A strong password is one which cannot be determined by automated programs A strong password contains: • Seven to sixteen characters • Choose a phrase or combination of words • Uses three of the following four types of characters: • Uppercase letters (A, B, C) • Lowercase letters (a, b, c) • Numerals (1, 2, 3) • Special characters (` ~ ! @ # $ % ^ & * ( ) _ + - = { } | ( [ ] : " ; ' < > ? , . /) Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 35. Creating Strong Passwords: Change Password Screenshot Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 36. Creating Strong Passwords: Trouble Signing In Screenshot Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 37. Sign-in Seal Sign in Sign-in seal protects account from phishing Sign-in seal is a custom text or image set up by the user on the computer User needs to create different sign-in seal for different browsers and computers Do not create sign-in seal on networked g computer Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 38. Alternate Email Address Alternate email address are prompted at signup At the time of password recovery, passwords can be sent to the recovery alternate email address Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 39. Keep Me Signed In/ Remember Me When you login on any site, there is checkbox like "Keep me signed in" or “Remember Me” If you select this option, next time it will automatically open your account in same computer If attacker handles such a system, he will get access to the email account If you are using a public computer it is computer, recommended that you uncheck the checkbox Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 40. Tool: Email Protector Email Protector protects password and automatically logs off your email account Email Protector shows you how to add password protection to your Outlook Express email Figure: Email Protector Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 41. Tool: Email Security Internet Service Provider (ISP) stores copies of all your email messages on its mail servers All the information kept on the servers can b p be easily used against you Email Security always breaks email messages addressed to a group of people to individual messages to ensure y g your as well as respondent’s p security Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 42. Email Security: Screenshot Figure: Email Security Main Window Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 43. Tool: EmailSanitizer EmailSanitizer is a filter between the incoming email server, and your computer EmailSanitizer Lets you keep track of how much spam is being stopped and how many viruses are being destroyed Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 44. Tool: SuperSecret SuperSecret provides secure storage for all of your logins and passwords so th t you only h d that l have one password t remember d to b from now on Only one password is required to use SuperSecret All of your other account and password information is stored securely in an encrypted format on your computer and can be accessed only with your one and only password d l ih d l d Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 45. SuperSecret: Screenshot Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 46. Summary Username and password can be revealed if it is stored in cookie and is not encrypted The confidentiality of email can be brought down by the micro virus like Reaper Exploit A strong password is one which cannot be determined by automated programs Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 47. Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 48. Copyright © by EC-Council EC-Council All Rights Reserved. Reproduction is Strictly Prohibited