21
EMAIL ETHICAL HACKING Presented By: Name: Sakshi Singh Class: BCA II (M) Enrolment No. : 02990302014

CYBER ETHICS

Embed Size (px)

Citation preview

Page 1: CYBER ETHICS

EMAIL ETHICAL HACKING

Presented By:

Name: Sakshi Singh

Class: BCA II (M)

Enrolment No. : 02990302014

Page 2: CYBER ETHICS

Outline Hacking Ethical Hacking Hacker vs Ethical Hacker Email Hacking Ways of Hacking Email

• Phishing• Keylogging• Trojan/Backdoors• Session Hijacking

Drawbacks of Ethical Email Hacking Security and Counter Measures Conclusion References Queries

Page 3: CYBER ETHICS

Hacking

Computer hacking is when someone modifies computer hardware or software in a way that alters the creator's original intention

Examine something very minutely The rapid crafting of new program or the making of changes to existing, usually complicated software

Hacker: The person who hacks Cracking: To intrude in and destroying system. Cracker : System intruder/ destroyer

Page 4: CYBER ETHICS

Ethical Hacking

Ethical Hacking is testing the resources for a good cause and for the betterment of technology.

Technically Ethical Hacking means penetration testing which is focused on Securing and Protecting IT Systems.

It is Legal, Permission is obtained from the target

Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner

Page 5: CYBER ETHICS

Hacker vs Ethical Hacker

Hacker

• Access computer system or network without authorization

• Breaks the law

Ethical Hacker

• Performs most of the same activities but with owner’s permission

• Employed by companies to perform Penetration Tests

Page 6: CYBER ETHICS

Email Ethical Hacking

Email ethical hacking means hacking someone’s email id with his permission.

It is Legal, Permission is obtained from the target Ethical hackers possesses same skills, mindset and

tools of a hacker but the attacks are done in a non-destructive manner

Other names of ethical hacking are• Aspentration testing

• Intrusion testing

• Red teaming

Page 7: CYBER ETHICS

Ways of Hacking an Email

There are numerous way an Email can be hacked

Phishing

Keylogging

Trojan/Backdoors

Session Hijacking and many more……….

Page 8: CYBER ETHICS

Phishing The first and very basic way of hacking an email account is Phishing. Phishing

is basically creating fake web pages to steal victim’s important information like email, passwords, phone no etc.

Drawback :

• Users nowadays are aware of these type of attacks and one cant be easily tricked using this attack . You need some social engineering to trick someone.

Prevention :

• Always check the url before signing in . This is the most useful and effective way one can use to prevent himself from phishing .

• Other way is to use some good Antivirus software which warns you whenever you visit a harmful site.

• Even if somehow you entered your credentials in a phisher, Immediately Change your password .

Page 9: CYBER ETHICS
Page 10: CYBER ETHICS

Keylogging

This is really good way of Hacking an Email account. In this type of attack Hacker simply sends an infected file having keylogger in it to victim. If the victim executes that file on his pc , whatever he types will be mailed/uploaded to Hacker’s server. The advantage of this attack is that the victim won’t know that Hacker is getting every Bit of data he is typing. Another big advantage is that Hacker will get passwords of all the accounts used on that PC.

Drawback :

• Keyloggers are often detected by good antivirus. Hacker must find a way to save it from antivirus.

Prevention :

• Execute the file only if you trust the sender.

• Use good antivirus and update it regularly .

Page 11: CYBER ETHICS
Page 12: CYBER ETHICS

Trojan/Backdoors This is a advanced level topic. It consists of a server and a client.

In this type of attack the attacker sends the infected server to the victim. After execution the infected server i.e. Trojan on the victim’s PC opens a backdoor and now the Hacker can do whatever he wants with the victim’s PC.

Drawback : 

• Trojans are often detected by good antivirus . Hacker must find a way to save it from antivirus.

Prevention :

• Execute the file only if you trust the sender.

• Use good antivirus and update it regularly .

Page 13: CYBER ETHICS

Session Hijacking

It consists of stealing session cookies. In this type of attack an attacker can steal victim ‘s session cookies and can login as the victim . Another way of stealing cookies is sniffing on the lan network using some softwares like Cain and able, wireshark ,etc.

DRAWBACK :

• If user is logged out then attacker is also logged out and the session is lost.

Prevention :

• Never open untrusted links.

Page 14: CYBER ETHICS

Hacking Prone Areas

Hacking Prone areas around the world

Page 15: CYBER ETHICS

Hacking Growth RateGraph shows that it is increasing day by day

Page 16: CYBER ETHICS

Drawbacks of Ethical Email Hacking

The ethical hacker using the knowledge they gain to do malicious hacking activities.

The possibility that the ethical hacker will send and/or place malicious code, viruses, malware and other destructive and harmful things on your email id.

Allowing the personal details to be seen.

Page 17: CYBER ETHICS

Security and Counter Measures

Use of anti-viruses. Proper logout after use of mail id. Manual opening browser Don't open spam. Password protected admin account. Don’t open untrusted links Hire an ethical hacker only if he has certification of that

Page 18: CYBER ETHICS

Conclusion Ethical email hacking is not a crime it is hacking with

user’s permission. Email can be hacked in many ways commonly used is

keylogging. Keep your password protected. Your password should be with combination of

characters, digits, special symbols. Do not respond to spam email. Don’t blindly trust any hacker whether he is ethical

hacker or not We should not disclose our password to any untrusted

person

Page 19: CYBER ETHICS

References http://en.wikipedia.org/wiki/Email_hacking http://www.gohacking.com/hack-email-account-

password http://www.hackersonlineclub.com/email-hacking http://howtohack.in/basics-of-ethical-hacking-training-

how-to-hack-an-email-account/ www.google.co.in www.wikipedia.org/wiki/Hacker www.wikipedia.org/wiki/Hacking

Page 20: CYBER ETHICS
Page 21: CYBER ETHICS