Preventions of Email Hacking

13
Presented By Hizbullah & Usman Khan

Transcript of Preventions of Email Hacking

Page 1: Preventions of Email Hacking

Presented ByHizbullah

&Usman Khan

Page 2: Preventions of Email Hacking

Topic:Email Hacking Preventions

Page 3: Preventions of Email Hacking

Presentation Layouta) What is Hacking?b) Email Hacking Methods.c) Preventions of Email Hacking.

Page 4: Preventions of Email Hacking

a). What is Hacking?The word “hacker” was used to describe a great programmer. Someone, able to build complex

logics. Someone, exploiting weakness of

a system to gain unauthorized access.

A person who doing hacking as known as “Hacker”.

Page 5: Preventions of Email Hacking

b). Email Hacking Methods1. Phishing Attack2. Key Logging3. Brute Forcing4. Social

Engineering

Page 6: Preventions of Email Hacking

1. Phishing AttackPhishing attack will direct the user to visit a website where they are asked to login with your email which is look like the legitimate website but in reality it is fake.Phishing scams could be: Emails inviting you to join a Social Group, asking

you to Login using your Username and Password. Email saying that Your Bank Account is locked and

Sign in to Your Account to Unlock it. Emails containing some Information of your

Interest and asking you to Login to Your Account. Any Email carrying a Link to Click and asking you

to Login.

Page 7: Preventions of Email Hacking

2. Key Logger With key logger hacking email is

more easy and simple than phishing.

It is a simple .exe executable file. When someone click it, the key

logger auto download. And you’ll , on your computer, you

start it, and put in the IP of destination, and every hour you will receive keys pressed on his computer.

Page 8: Preventions of Email Hacking

3. Brute Forcing Trying a random approach by attempting different passwords

and hoping that one works. Some logic can be applied by trying passwords related to the

person’s name, job title, hobbies, or other similar items. Brute force randomly generates passwords and their

associated hashes. Tools which perform the Brute force attack are:

1. Aircrack-ng2. John the Ripper3. Rainbow Crack4. Ophcrack5. Hashcat

Page 9: Preventions of Email Hacking

c). Preventions of Email Hacking

Page 10: Preventions of Email Hacking

Prevention Against Phishing Read all the Email Carefully

and Check if the Sender is Original.

Watch the Link Carefully before Clicking.

Always check the URL in the Browser before Signing IN to your Account.

Always Login to Your Accounts after opening the Trusted Websites, not by Clicking in any other Website or Email.

Page 11: Preventions of Email Hacking

Prevention Against Key Logger1. Encrypt Keystrokes i.e

KeyScrambler, Zemana AntiLogger etc

2. Use AntiVirus i.e Panda Cloud AntiVirus, Kaspersky AntiVirus etc

3. Use Firewall i.e ZoneAlarm Free Firewall, Comodo Free Firewall etc

4. Use Password Manager i.e LastPass etc

5. Update Your Software

Page 12: Preventions of Email Hacking

Prevention Against Brute Force Minimum length of at

least seven characters Must include both

upper and lower case characters

Must include numeric characters

Must include punctuation

Page 13: Preventions of Email Hacking

Conclusion: Always configure a Secondary Email

Address for the recovery purpose. Properly configure the Security Question

and Answer in the Email Account. Do Not Open Emails from strangers. Do Not Use any other’s computer to

check your Email. Take Care of the Phishing Links. Do not reveal your Passwords to your

Friends or Mates.