SlideShare a Scribd company logo
1 of 6
Download to read offline
PHISHING

 Phishing is an attempt of obtaining information from a
user which is meant to be kept secret or can be used at
proper place. phishing results in loosing user from
his/her account details to credit card number and in
some weired cases even identity theft.

The Modules Operandi
 ➔ A e-mail saying we need some details & supposedly

   seems to be genuine.
 ➔ e-mail like you have won a million Rs lottery fill the

   form & collect your money.
 ➔ Fake mail page where you will login & result in

   loosing your passwor d.

some screen-shots:-
i have taken these shots from a spam that i received
today. It is a phishing site of the HDFC bank.

     see if you find any differ
                              ence in the pages




www.atuljha.com
one




www.atuljha.com
two




www.atuljha.com
three




www.atuljha.com
Points to notice:--
if we open and match the real page of HDFC we will find
everything similar except the ADDRESS BAR which i
have encircled.
It is also VeriSign Secured.

                  the original page of HDFC.




www.atuljha.com
well we can clearly see how easy it is to forge or create
a fake page with same content.

-----Protection---
we can protect ourself if we are careful enough before
doing any financial transaction a making sure the
                                  nd
page we are filling our details are the true one.

--software---
Yes we do have one from netcraft.i have not tried it
because i keep my eyes open & believe in myself rather
than the softwares.




www.atuljha.com

More Related Content

Similar to Phishing

Unit8 a1 student_template
Unit8 a1 student_templateUnit8 a1 student_template
Unit8 a1 student_templateDannySD95
 
THE ULTIMATE BLACKHAT CASH MACHINE - make money online
THE ULTIMATE BLACKHAT CASH MACHINE - make money onlineTHE ULTIMATE BLACKHAT CASH MACHINE - make money online
THE ULTIMATE BLACKHAT CASH MACHINE - make money onlineEdward806784
 
Email and web security
Email and web securityEmail and web security
Email and web securityshahhardik27
 
QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...
QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...
QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...QAFest
 
Stripe Integration With MuleSoft
Stripe Integration With MuleSoftStripe Integration With MuleSoft
Stripe Integration With MuleSoftShyamRajPrasad
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldAvishek Datta
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyAnjan Mahanta
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesHuman Resources & Payroll
 
AK FAQ_3DSECURE EN
AK FAQ_3DSECURE ENAK FAQ_3DSECURE EN
AK FAQ_3DSECURE ENTalal Sobh
 
What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfHost It Smart
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraudWebSitePulse
 

Similar to Phishing (20)

Unit8 a1 student_template
Unit8 a1 student_templateUnit8 a1 student_template
Unit8 a1 student_template
 
Amazon & E Bay
Amazon & E BayAmazon & E Bay
Amazon & E Bay
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
THE ULTIMATE BLACKHAT CASH MACHINE - make money online
THE ULTIMATE BLACKHAT CASH MACHINE - make money onlineTHE ULTIMATE BLACKHAT CASH MACHINE - make money online
THE ULTIMATE BLACKHAT CASH MACHINE - make money online
 
Email and web security
Email and web securityEmail and web security
Email and web security
 
QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...
QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...
QA Fest 2015. Per Thorsheim. Lessons learned: When the worlds largest dating ...
 
Web spoofing (1)
Web spoofing (1)Web spoofing (1)
Web spoofing (1)
 
Stripe Integration With MuleSoft
Stripe Integration With MuleSoftStripe Integration With MuleSoft
Stripe Integration With MuleSoft
 
IB Fraud
IB FraudIB Fraud
IB Fraud
 
Phishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark WorldPhishing--The Entire Story of a Dark World
Phishing--The Entire Story of a Dark World
 
Chapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & SafetyChapter 4 E-Safety and Health & Safety
Chapter 4 E-Safety and Health & Safety
 
Train Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security BreachesTrain Employees to Avoid Inadvertent Cyber-Security Breaches
Train Employees to Avoid Inadvertent Cyber-Security Breaches
 
AK FAQ_3DSECURE EN
AK FAQ_3DSECURE ENAK FAQ_3DSECURE EN
AK FAQ_3DSECURE EN
 
Masterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy BasicsMasterclass_ Cybersecurity and Data Privacy Basics
Masterclass_ Cybersecurity and Data Privacy Basics
 
What Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdfWhat Types Of Information ECommerce Sites Need To.pdf
What Types Of Information ECommerce Sites Need To.pdf
 
10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud10 ways to protect your e commerce site from hacking & fraud
10 ways to protect your e commerce site from hacking & fraud
 
BDD - Collaborate like you mean it!
BDD - Collaborate like you mean it!BDD - Collaborate like you mean it!
BDD - Collaborate like you mean it!
 
Small Business Help
Small Business HelpSmall Business Help
Small Business Help
 
Social media
Social mediaSocial media
Social media
 
E commerce
E commerceE commerce
E commerce
 

More from Atul Jha

Hooked by Nir Eyal
Hooked by Nir EyalHooked by Nir Eyal
Hooked by Nir EyalAtul Jha
 
Don't make me think: Steve Krug
Don't make me think: Steve KrugDon't make me think: Steve Krug
Don't make me think: Steve KrugAtul Jha
 
Thumbnail generation using Minio's event notification.
Thumbnail generation using Minio's event notification.Thumbnail generation using Minio's event notification.
Thumbnail generation using Minio's event notification.Atul Jha
 
Minio: Associated projects in Go programming.
Minio: Associated projects in Go programming. Minio: Associated projects in Go programming.
Minio: Associated projects in Go programming. Atul Jha
 
Open Source Cloud alternatives
Open Source Cloud alternativesOpen Source Cloud alternatives
Open Source Cloud alternativesAtul Jha
 
Summary of DockerCon Europe.
Summary of DockerCon Europe. Summary of DockerCon Europe.
Summary of DockerCon Europe. Atul Jha
 
OpenStack Swift production deployments
OpenStack Swift production deploymentsOpenStack Swift production deployments
OpenStack Swift production deploymentsAtul Jha
 
OpenStack Swift on virtualbox
OpenStack Swift on virtualboxOpenStack Swift on virtualbox
OpenStack Swift on virtualboxAtul Jha
 
OpenStack Swift: Panoramic View
OpenStack Swift: Panoramic ViewOpenStack Swift: Panoramic View
OpenStack Swift: Panoramic ViewAtul Jha
 
OpenStack : Linux User Group meetup
OpenStack : Linux User Group meetupOpenStack : Linux User Group meetup
OpenStack : Linux User Group meetupAtul Jha
 
OpenStack: An introduction
OpenStack: An introductionOpenStack: An introduction
OpenStack: An introductionAtul Jha
 
Open Cloud -- Future of Cloud Computing
Open Cloud -- Future of Cloud ComputingOpen Cloud -- Future of Cloud Computing
Open Cloud -- Future of Cloud ComputingAtul Jha
 
Openstack: Open Source software for building public and private cloud.
Openstack: Open Source software for building public and private cloud.Openstack: Open Source software for building public and private cloud.
Openstack: Open Source software for building public and private cloud.Atul Jha
 
Introduction and hacking OpenStack, Pycon India
Introduction and hacking OpenStack,  Pycon IndiaIntroduction and hacking OpenStack,  Pycon India
Introduction and hacking OpenStack, Pycon IndiaAtul Jha
 
Introduction to FOSS, SRM University
Introduction to FOSS, SRM UniversityIntroduction to FOSS, SRM University
Introduction to FOSS, SRM UniversityAtul Jha
 
Foss adoption in Indian Government Enterprise.
Foss adoption in Indian  Government Enterprise.Foss adoption in Indian  Government Enterprise.
Foss adoption in Indian Government Enterprise.Atul Jha
 
Introduction to Subversion
Introduction to SubversionIntroduction to Subversion
Introduction to SubversionAtul Jha
 
Introduction to Selinux
Introduction to SelinuxIntroduction to Selinux
Introduction to SelinuxAtul Jha
 

More from Atul Jha (20)

Hooked by Nir Eyal
Hooked by Nir EyalHooked by Nir Eyal
Hooked by Nir Eyal
 
Don't make me think: Steve Krug
Don't make me think: Steve KrugDon't make me think: Steve Krug
Don't make me think: Steve Krug
 
Thumbnail generation using Minio's event notification.
Thumbnail generation using Minio's event notification.Thumbnail generation using Minio's event notification.
Thumbnail generation using Minio's event notification.
 
Minio: Associated projects in Go programming.
Minio: Associated projects in Go programming. Minio: Associated projects in Go programming.
Minio: Associated projects in Go programming.
 
Open Source Cloud alternatives
Open Source Cloud alternativesOpen Source Cloud alternatives
Open Source Cloud alternatives
 
Summary of DockerCon Europe.
Summary of DockerCon Europe. Summary of DockerCon Europe.
Summary of DockerCon Europe.
 
OpenStack Swift production deployments
OpenStack Swift production deploymentsOpenStack Swift production deployments
OpenStack Swift production deployments
 
OpenStack Swift on virtualbox
OpenStack Swift on virtualboxOpenStack Swift on virtualbox
OpenStack Swift on virtualbox
 
OpenStack Swift: Panoramic View
OpenStack Swift: Panoramic ViewOpenStack Swift: Panoramic View
OpenStack Swift: Panoramic View
 
OpenStack : Linux User Group meetup
OpenStack : Linux User Group meetupOpenStack : Linux User Group meetup
OpenStack : Linux User Group meetup
 
OpenStack: An introduction
OpenStack: An introductionOpenStack: An introduction
OpenStack: An introduction
 
Open Cloud -- Future of Cloud Computing
Open Cloud -- Future of Cloud ComputingOpen Cloud -- Future of Cloud Computing
Open Cloud -- Future of Cloud Computing
 
Openstack: Open Source software for building public and private cloud.
Openstack: Open Source software for building public and private cloud.Openstack: Open Source software for building public and private cloud.
Openstack: Open Source software for building public and private cloud.
 
Introduction and hacking OpenStack, Pycon India
Introduction and hacking OpenStack,  Pycon IndiaIntroduction and hacking OpenStack,  Pycon India
Introduction and hacking OpenStack, Pycon India
 
Introduction to FOSS, SRM University
Introduction to FOSS, SRM UniversityIntroduction to FOSS, SRM University
Introduction to FOSS, SRM University
 
Juju
JujuJuju
Juju
 
Foss adoption in Indian Government Enterprise.
Foss adoption in Indian  Government Enterprise.Foss adoption in Indian  Government Enterprise.
Foss adoption in Indian Government Enterprise.
 
Nepal
Nepal Nepal
Nepal
 
Introduction to Subversion
Introduction to SubversionIntroduction to Subversion
Introduction to Subversion
 
Introduction to Selinux
Introduction to SelinuxIntroduction to Selinux
Introduction to Selinux
 

Recently uploaded

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Phishing

  • 1. PHISHING Phishing is an attempt of obtaining information from a user which is meant to be kept secret or can be used at proper place. phishing results in loosing user from his/her account details to credit card number and in some weired cases even identity theft. The Modules Operandi ➔ A e-mail saying we need some details & supposedly seems to be genuine. ➔ e-mail like you have won a million Rs lottery fill the form & collect your money. ➔ Fake mail page where you will login & result in loosing your passwor d. some screen-shots:- i have taken these shots from a spam that i received today. It is a phishing site of the HDFC bank. see if you find any differ ence in the pages www.atuljha.com
  • 5. Points to notice:-- if we open and match the real page of HDFC we will find everything similar except the ADDRESS BAR which i have encircled. It is also VeriSign Secured. the original page of HDFC. www.atuljha.com
  • 6. well we can clearly see how easy it is to forge or create a fake page with same content. -----Protection--- we can protect ourself if we are careful enough before doing any financial transaction a making sure the nd page we are filling our details are the true one. --software--- Yes we do have one from netcraft.i have not tried it because i keep my eyes open & believe in myself rather than the softwares. www.atuljha.com