Professional Documents
Culture Documents
A ,
, Jabalpur (MP)
The first step of web jacking attack method is to create a fake page of
victim website for example www.anywebsite.com/login.php.
The second step is to host it either on your local computer or shared
hosting.
The third step is to send the link of a fake page to the victim.
The fourth step victim will open the link and enter their details and
submit.
• Last step, you will get all the details submitted by victim.
Online frauds :- There are many genuine websites who
offers online auction over internet. Taking the advantage of the
reputation of these websites, some of the cyber criminals lure
the customers to online auction fraud schemes which often lead
to either overpayment of the product or the item is never
delivered once the payment is made.
Pornography offence :- It is an act of possessing image
or video of a minor (under 18), engaged in sexual
conduct. The internet is being highly used by its abusers
to reach and abuse children sexually, worldwide.
Software piracy :- This the “The Biggest” challenge area.
Software piracy is “theft of software through the illegal copying
of genuine programs or the fake program and distribution of
products intended to pass for the original”.
Disadvantage of software piracy
The software, if pirated, may potentially contain hard-drive
infection virus.
There is no technical support in the case of software failure.
There is no warranty protection
There is no legal right to use the product
According to the fourth annual BSA (Business Software Alliance )
and IDC global Software Piracy study, in Asia pacific 55% of
software installed are illegal.
• Email bombs :- An email bomb or "mail bomb" is a
malicious act in which a large number of email
messages are sent to a single email address in a short
period of time. The purpose of an email bomb is
typically to overflow a user's inbox. In some cases, it will
also make the mail server unresponsive.
• Email bombing is often done from a single system in
which one user sends hundreds or thousands of
messages to another user. In order to send the
messages quickly, the email bomber may use a script to
automate the process. By sending emails with a script,
it is possible to send several thousand messages per
minute.
If performed successfully, an email bomb will leave the recipient with a
pile of email messages in his or her inbox. It may also max out the
recipient’s email quota, preventing the user from receiving new email
messages. The result is a frustrating situation where the user has to
manually delete the messages. If the recipient’s email client or webmail
system does not allow the user to select all the unwanted messages at
once, this process can take a long time to complete.