Thursday, July 30, 2009

Phishing ( cont )


Phishing + Social Engineering


    1. Open site
    2. Save as
    3. Modify login form
    4. Modify action parameter
    5. Create fake action ( store password )
    6. Done

Phishing

In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT Administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Even when using server authentication, it may require tremendous skill to detect that the website is fake. Phishing is an example of social engineering techniques used to fool users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.

Phishing Technique
  • Social engineering
  • Link manipulation
  • Filter evasion
  • Website forgery
  • Phone phishing

For more details, click here

PC Security

Computer security is a branch of technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users.


Computer security

  • Secure operating systems
  • Security architecture
  • Security by design
  • Secure coding

Computer insecurity

  • Vulnerability

Social engineering
Eavesdropping

  • Exploit

Trojan

viruses and worms
Denial of service

  • Payload

Backdoor
Rootkit
Keylogger


Read more at Wikipedia


E-book for PC Security & Maintenance. download

Mount USB into Linux

Step to mount usb
  • mkdir /usb
  • chmod 777 /usb
  • mount -t vfat /dev/sdb1 /usb

Then try to check whether the drive are ready to use or not.
  • cd /usb
  • ls

Unmount the drive
  • umount /usb