You are on page 1of 22

Email Hacking

Subbmitted By:-
Inder Setia
Hacking - Definition
• The Art of exploring various security
breaches is termed as Hacking.
•It’s an anti-society activity.
•It says, there always exists more than
one way to solve the problem.
•The terms Hacker and Hacking are being
misinterpreted and misunderstood with
negative sidelines
Facts Of Hacking
•“The one who can hack it, can only
secure it”
•“If you want to catch criminal then you’ll
have to think like criminal”
•“The Best Way To Secure Yourself Is To
Hack yourself”
Hackers – Who are they?
• Hackers are Intelligent Computer Professionals.
•Motive/Intent –
ØTo gain in-depth knowledge of a system, what’s
happening at the backend, behind the screen.
ØTo find possible security vulnerabilities in a
system.
ØThey create security awareness by sharing
knowledge. It’s a team work.
Communities of Hackers
• Hackers
• Crackers
• Phreaks
• Script Kiddies
Hats Off?
•White Hat Hackers – They use their
Knowledge and skill set for good,
constructive intents. They find out new
security loopholes and their solutions.
• Black Hat Hacker- They use their
knowledge and skill set for illegal
activities, destructive intents
Email Hacking
• Password Cracking
• Social Engineering
• Phishing
• Key Logging
• Cookie Stealing
Password Cracking
• Guessing :-Passwords can sometimes be guessed by humans with knowledge of
the user's personal information. Examples of guessable passwords include:

* the words "password", "passcode", "admin" and their derivatives

* a row of letters from the qwerty keyboard -- qwerty itself, asdf, or qwertyuiop)

* the user's name or login name

* the name of their significant other, a friend, relative or pet

* a swear word

• Dictionary :- Examples of insecure choices include the above list, plus single
words found in dictionaries, given and family names, any too short password

• Brute force attacks:-A last resort is to try every possible


password, known as a brute force attack. In theory, if there is no limit to the
number of attempts, a brute force attack will always be successful since the
rules for acceptable passwords must be publicly known;
Brute Force Attack
Social Engineering
• Social engineering is the act of
manipulating people into performing actions
or divulging confidential information, rather
than by breaking in or using technical
hacking techniques.
Ex:- Information Gathering Of The User In
Social Way Like To Know The Answer Of
His/Her Security Question.
What Is Phishing?
• It Is A Method To Generate A Copy Or A
Fake Page Which have Look And Feel
Like Original One.
• As User Enters His Info. He Is Redirected
To The Original Server.
•Things Required :-
1. Source Code
2. A Php File
3. A Text File
How fake Page Look Like
Php File
Phishing Statistics
How An Hacker Do
Phishing Attack
• Usually A Link Will Be Send To You That
Will Have Look And Feel Like Original Page
And It May Claim To Do Any Important
Thing So That You Enter Your info. Ex:-
Key Logging
• Key logger Is A software Or A Tool Which Is Used To Log
All Keystrokes Of Any User.
• It Was Originaly Devloped For home Purpose So That
Parents Can See What Their Childrens Do Behind Them.
•This Tool Generates An .exe File Which Is Used To Send
To victim (Person To Be Hacked)
•As Victim run That File His All Logs Like Chat log ,
Username And Password, Screenshots Of His Process
Will Be Sent to Sever Of Hacker.
•We Can configure SMTP , FTP And Even Any Personal
Server With Diff Port No.
•A Good key logger Is UD And Also Hav Apply Backspace
Option In It.
Screen Shots
Log File
Cookie Stealing
• Cookies Are Data Sent By Server To client.
These Are Used To Authenticate A User
Uniquely.
•Cookies Can Be Stealed By Using Some
Java Script And some Cookie Stealing
Tools Are Also Avilable.
Use Of Cookies
In this fictional example, an advertising
company has placed banners in two Web
sites. Hosting the banner images on its
servers and using third-party cookies, the
advertising company is able to track the
browsing of users across these two sites.

You might also like