Upload
sakshi-singh
View
26
Download
0
Embed Size (px)
Citation preview
EMAIL ETHICAL HACKING
Presented By:
Name: Sakshi Singh
Class: BCA II (M)
Enrolment No. : 02990302014
Outline Hacking Ethical Hacking Hacker vs Ethical Hacker Email Hacking Ways of Hacking Email
• Phishing• Keylogging• Trojan/Backdoors• Session Hijacking
Drawbacks of Ethical Email Hacking Security and Counter Measures Conclusion References Queries
Hacking
Computer hacking is when someone modifies computer hardware or software in a way that alters the creator's original intention
Examine something very minutely The rapid crafting of new program or the making of changes to existing, usually complicated software
Hacker: The person who hacks Cracking: To intrude in and destroying system. Cracker : System intruder/ destroyer
Ethical Hacking
Ethical Hacking is testing the resources for a good cause and for the betterment of technology.
Technically Ethical Hacking means penetration testing which is focused on Securing and Protecting IT Systems.
It is Legal, Permission is obtained from the target
Ethical hackers possesses same skills, mindset and tools of a hacker but the attacks are done in a non-destructive manner
Hacker vs Ethical Hacker
Hacker
• Access computer system or network without authorization
• Breaks the law
Ethical Hacker
• Performs most of the same activities but with owner’s permission
• Employed by companies to perform Penetration Tests
Email Ethical Hacking
Email ethical hacking means hacking someone’s email id with his permission.
It is Legal, Permission is obtained from the target Ethical hackers possesses same skills, mindset and
tools of a hacker but the attacks are done in a non-destructive manner
Other names of ethical hacking are• Aspentration testing
• Intrusion testing
• Red teaming
Ways of Hacking an Email
There are numerous way an Email can be hacked
Phishing
Keylogging
Trojan/Backdoors
Session Hijacking and many more……….
Phishing The first and very basic way of hacking an email account is Phishing. Phishing
is basically creating fake web pages to steal victim’s important information like email, passwords, phone no etc.
Drawback :
• Users nowadays are aware of these type of attacks and one cant be easily tricked using this attack . You need some social engineering to trick someone.
Prevention :
• Always check the url before signing in . This is the most useful and effective way one can use to prevent himself from phishing .
• Other way is to use some good Antivirus software which warns you whenever you visit a harmful site.
• Even if somehow you entered your credentials in a phisher, Immediately Change your password .
Keylogging
This is really good way of Hacking an Email account. In this type of attack Hacker simply sends an infected file having keylogger in it to victim. If the victim executes that file on his pc , whatever he types will be mailed/uploaded to Hacker’s server. The advantage of this attack is that the victim won’t know that Hacker is getting every Bit of data he is typing. Another big advantage is that Hacker will get passwords of all the accounts used on that PC.
Drawback :
• Keyloggers are often detected by good antivirus. Hacker must find a way to save it from antivirus.
Prevention :
• Execute the file only if you trust the sender.
• Use good antivirus and update it regularly .
Trojan/Backdoors This is a advanced level topic. It consists of a server and a client.
In this type of attack the attacker sends the infected server to the victim. After execution the infected server i.e. Trojan on the victim’s PC opens a backdoor and now the Hacker can do whatever he wants with the victim’s PC.
Drawback :
• Trojans are often detected by good antivirus . Hacker must find a way to save it from antivirus.
Prevention :
• Execute the file only if you trust the sender.
• Use good antivirus and update it regularly .
Session Hijacking
It consists of stealing session cookies. In this type of attack an attacker can steal victim ‘s session cookies and can login as the victim . Another way of stealing cookies is sniffing on the lan network using some softwares like Cain and able, wireshark ,etc.
DRAWBACK :
• If user is logged out then attacker is also logged out and the session is lost.
Prevention :
• Never open untrusted links.
Hacking Prone Areas
Hacking Prone areas around the world
Hacking Growth RateGraph shows that it is increasing day by day
Drawbacks of Ethical Email Hacking
The ethical hacker using the knowledge they gain to do malicious hacking activities.
The possibility that the ethical hacker will send and/or place malicious code, viruses, malware and other destructive and harmful things on your email id.
Allowing the personal details to be seen.
Security and Counter Measures
Use of anti-viruses. Proper logout after use of mail id. Manual opening browser Don't open spam. Password protected admin account. Don’t open untrusted links Hire an ethical hacker only if he has certification of that
Conclusion Ethical email hacking is not a crime it is hacking with
user’s permission. Email can be hacked in many ways commonly used is
keylogging. Keep your password protected. Your password should be with combination of
characters, digits, special symbols. Do not respond to spam email. Don’t blindly trust any hacker whether he is ethical
hacker or not We should not disclose our password to any untrusted
person
References http://en.wikipedia.org/wiki/Email_hacking http://www.gohacking.com/hack-email-account-
password http://www.hackersonlineclub.com/email-hacking http://howtohack.in/basics-of-ethical-hacking-training-
how-to-hack-an-email-account/ www.google.co.in www.wikipedia.org/wiki/Hacker www.wikipedia.org/wiki/Hacking