3. The below given presentation is only for
educational purpose & not for any
wrong use . Please do not try this at
home !!
4. Hacking refers to the
re-configuring or re-
programming of a
system to function in
ways not facilitated
by the owner,
administrator, or
designer.
5. 1) Inside Jobs
2)Rogue Access Points
3)Back Doors
4)Viruses and Worms
5)Trojan Horses
6)Denial of Service
7)Anarchists, Crackers, and Kiddies
8)Sniffing and Spoofing
9)Phishing/Account Hacking
6. In the field of computer
security, phishing is the
criminally fraudulent
process of attempting to
acquire sensitive
information such as
usernames, passwords
and credit card details
by masquerading as a
trustworthy entity in an
electronic
communication.
7. How is it Exactly Done ?
A thing a Hacker Needs-
A Software known as Super Phisher.
8. A Free Web Hosting site for uploading the fake website.
110mb.com
23. That’s it the
hacker has the
email id &
Password & he
is totally in
control of the
account!!
24. This Process can be done with any
networking site .
But these types of links cannot be sent
through Facebook.
This is what happens when you try to
send this phishing link.