Ethical Hacking, Computer Tips and Tricks, Android phone Modification, Technology, Etc.

Sunday, November 25, 2018

What is Phishing Method How to hackers used it for hacking

What is Phishing ? 

PhishinG
the art of stealing


According to Wikipedia

Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as trustworthy entity in an electronic communication.

So how do a hacker steal such information from you?

Okay let’s get started.

First a hacker creates a fake login page, which looks like an original page and somehow, convince you to enter your usernames and passwords to it.
By sending fake offers, promises or any other eye catching things.
This can be done by the means of SMS, MMS, On Social Networking Sites.


This is how a fake E-mail Looks Like 





















A Hacker can send you a email with any email id (We will discuss it later)
And when you click this update button above, you will be redirected to the fake Facebook page which is created to steal your information.
This page is designed in such a manner that after stealing your information you will be redirected to the original Facebook page. Smart, right

Let’s see how a fake login page looks like:


Everything is normal in this image. Right ?




















Now look at the rounded area The Address Bar. Its https://faceebook.com an extra “cixx6” which is an ideal way of trapping users. Making a similar looking address.

This is how a basic phishing hack works. It works for all websites and even for bank accounts, when the user is not aware of this kind of hack.

So, Always look for an address bar for your safety.
Phishing is illegal, and by this method many criminal minded peoples are stealing information from common peoples who does not have a proper knowledge of cyber tricks and hacking.

Also Read :- how to use netflix for lifetime for free

I Hope You Understand I am trying to tell You 





No comments:

Post a Comment