EMAIL SECURE GUIDELINES


EMAIL SECURE GUIDELINES


Presentation Layout

a) What is Hacking? 

b) Email Hacking Methods. 

c) Preventions of Email Hacking.

a). What is Hacking?

The word “hacker” was used to describe a great programmer. 

Someone, able to build complex logics. 

Someone exploiting the weakness of a system to gain unauthorized access. 

A person who is doing hacking is known as “Hacker”.

 

b). Email Hacking Methods

1.Phishing Attack

2.KeyLogging 

3.Brute Forcing 

4.Social Engineering

1. Phishing Attack

 

Phishing attackS will direct the user to visit a website where they are asked to login with your email which lookS like the legitimate website but in reality it is fake. 

Phishing scams could be:  

  •  Emails inviting you to join a Social Group, asking you to Login using your Username and Password.

  •  Email saying that Your Bank Account is locked and Sign in to Your Account to Unlock it. 

  •  Emails containing some Information of your Interest and asking you to Login to Your Account.  

  •  Any Email carrying a Link to Click and asking you to Login.

 

 

2. KeyLogger

 

  • With keylogger hacking email is more easy and simple than phishing. 

  • It is a simple .exe executable file.

  • When someone clicks it, the key logger auto downloads.  

  • And you’ll , on your computer, start it, and put in the IP of destination, and every hour you will receive keys pressed on his computer.

 

 

3. Brute Forcing


  • Trying a random approach by attempting different passwords and hoping that one works. 

  • Some logic can be applied by trying passwords related to the person’s name, job title, hobbies, or other similar items.

  • Brute force randomly generates passwords and their associated hashes.

 Tools which perform the Brute force attack are: 

  •  Aircrack-ng  

  •  John the Ripper  

  •  Rainbow Crack  

  •  Ophcrack

  •  Hashcat


4.Social Engineering

 

    • Social Engineering is the technique which is used by the hackers to steal the information.

    • They will send the link and they tell us please open this link if you open this link i will get this many followers in my instagram and facebook.

    • In this way they are gonna tell us and when we open or when we sign in to that link then the entire information of our account will go to them.

    • This is the famous technique which is used by the hackers to steal the data of the victims.

     

    c.  Preventions of Email Hacking

    • Read all the Email Carefully and Check if the Sender is Original.

    • Watch the Link Carefully before Clicking.  

    • Always check the URL in the Browser before Signing IN to your Account.

    • Always Login to Your Accounts after opening the Trusted Websites, not by Clicking in any other Website or Email. 

    • Encrypt Keystrokes i.e KeyScrambler, Zemana AntiLogger etc  

    • Use Firewall i.e ZoneAlarm Free Firewall, Comodo Free Firewall etc  

    • Use Password Manager i.e LastPass etc

    • Must include both upper and lower case characters 

    • Minimum length of at least seven character

    • Never ever click on the unknown links which and mails they may affected by the malware or any kind of exploiters which may effect your device and your email.

    • Everyone should sign-in 2 factor authentication to your mails they will help you to keep secure.




    follow us on insta for more updates and if you have any doubts you can ask us.


    @.cho2. : https://www.instagram.com/_.cho2._/?igshid=gycsfe5exb08


    @liferacer333 :https://www.instagram.com/liferacer333/?igshid=52f7yygpe2o1

     



    Reactions

    Post a Comment

    1 Comments