SlideShare a Scribd company logo
Phishing techniques
Phishing techniques
is the method used to steal personal
information through spamming or other deceptive
means. There are a number of different phishing
techniques used to obtain personal information
from users. As technology becomes more
advanced, the phishing techniques being used are
also more advanced. To prevent Internet phishing,
users should have knowledge of various types of
phishing techniques and they should also be
aware of anti-phishing techniques to protect
themselves from getting phished. Let’s look at
some of these phishing techniques.
Congratulations!!!!! You won 75000$ in Google lottery!!!!
Phishing techniques
Phishing techniques
Phishing techniques
Phishing techniques
Phishing techniques
Phishing techniques
Phishing techniques
Instant messaging is the method in which the user
receives a message with a link directing them to a fake
phishing website which has the same look and feel as
the legitimate website. If the user doesn’t look at the
URL, it may be hard to tell the difference between the
fake and legitimate websites. Then, the user is asked
to provide personal information on the page.
Phishing techniques
Trojan Hosts
Phishing techniques
Phishing techniques
Phishing techniques
Phishing techniques
Phishing techniques
Phishing techniques
Key Loggers refer to the malware used to identify
inputs from the keyboard. The information is sent to
the hackers who will decipher passwords and other
types of information. To prevent key loggers from
accessing personal information, secure websites
provide options to use mouse click to make entries
through the virtual keyboard.
Figure 1
Figure 2
Figure 3
Figure 4
Phishing techniques
In session hacking, the phishers exploits the web
session control mechanism to steal information from
the user. In a simple session hacking procedure known
as session sniffing, the phishers can use a sniffer to
intercept relevant information so that he or she can
access the Web server illegally.
Phishing techniques
Phishing through
Search Engines
Some phishing scams involve search engines where
the user is directed to products sites which may offer
low cost products or services. When the user tries to
buy the product by entering the credit card details, it’s
collected by the phishing site. There are many fake
bank websites offering credit cards or loans to users at
a low rate but they are actually phishing sites.
In phone phishing, the phishers makes phone calls to
the user and asks the user to dial a number. The
purpose is to get personal information of the bank
account through the phone. Phone phishing is mostly
done with a fake caller ID.
Malware Phishing
Phishing scams involving malware require it to be run on the
user’s computer. The malware is usually attached to the
email sent to the user by the phishers. Once you click on the
link, the malware will start functioning. Sometimes, the
malware may also be attached to downloadable files.
Phishers take advantage of the vulnerability of web security
services to gain sensitive information which is used for
fraudulent purposes. This is why it’s always a good idea to
learn about the various phishing techniques, including
phishing with Trojans and Spyware.
Phishing techniques
Phishing techniques

More Related Content

PPTX
Phising a Threat to Network Security
anjuselina
 
PPTX
Phishing Scams: 8 Helpful Tips to Keep You Safe
CheapSSLsecurity
 
PPTX
Phishing
Sagar Rai
 
PPTX
Email phishing and countermeasures
Jorge Sebastiao
 
PPTX
Phishing Attacks
Jagan Mohan
 
PPTX
Phishing ppt
shindept123
 
PPT
Phishing
anjalika sinha
 
PPT
Phishing: Swiming with the sharks
Nalneesh Gaur
 
Phising a Threat to Network Security
anjuselina
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
CheapSSLsecurity
 
Phishing
Sagar Rai
 
Email phishing and countermeasures
Jorge Sebastiao
 
Phishing Attacks
Jagan Mohan
 
Phishing ppt
shindept123
 
Phishing
anjalika sinha
 
Phishing: Swiming with the sharks
Nalneesh Gaur
 

What's hot (20)

PPTX
Password Attack
Sina Manavi
 
PPTX
Different Types of Phishing Attacks
SysCloud
 
PPTX
Cyber crime
Muhammad Zeeshan Muzaffar
 
PPTX
PPT on Phishing
Pankaj Yadav
 
PPTX
Brute force-attack presentation
Mahmoud Ibra
 
PPTX
Phishing
SaurabhKantSahu1
 
PPTX
Hacking
j naga sai
 
PDF
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
ControlScan, Inc.
 
PPTX
Cyber attack
Manjushree Mashal
 
PPTX
Spoofing Techniques
Raza_Abidi
 
PPTX
Mobile security in Cyber Security
Geo Marian
 
PPTX
Phishing attack seminar presentation
AniketPandit18
 
PPTX
Password Cracking
Sagar Verma
 
PPTX
Phishing Presentation
Nikolaos Georgitsopoulos
 
PPTX
Cyber security system presentation
A.S. Sabuj
 
PPTX
Phishing ppt
Sanjay Kumar
 
PPT
P H I S H I N G
bensonoo
 
PPTX
Phishing attack
Raghav Chhabra
 
PPT
Phishing attacks ppt
Aryan Ragu
 
PPTX
Hyphenet Security Awareness Training
Jen Ruhman
 
Password Attack
Sina Manavi
 
Different Types of Phishing Attacks
SysCloud
 
PPT on Phishing
Pankaj Yadav
 
Brute force-attack presentation
Mahmoud Ibra
 
Hacking
j naga sai
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
ControlScan, Inc.
 
Cyber attack
Manjushree Mashal
 
Spoofing Techniques
Raza_Abidi
 
Mobile security in Cyber Security
Geo Marian
 
Phishing attack seminar presentation
AniketPandit18
 
Password Cracking
Sagar Verma
 
Phishing Presentation
Nikolaos Georgitsopoulos
 
Cyber security system presentation
A.S. Sabuj
 
Phishing ppt
Sanjay Kumar
 
P H I S H I N G
bensonoo
 
Phishing attack
Raghav Chhabra
 
Phishing attacks ppt
Aryan Ragu
 
Hyphenet Security Awareness Training
Jen Ruhman
 
Ad

Viewers also liked (13)

PPTX
PHISHING PROJECT REPORT
vineetkathan
 
PPT
Phishing, Pharming, and the latest potholes on the Information Highway
Kevin Lim
 
PPT
Intro phishing
Sayali Dayama
 
PDF
Email of Doom: New phishing attacks that threaten your clients
Calyptix Security
 
PPTX
Phishing - A modern web attack
Karthik
 
PPTX
Phishing--The Entire Story of a Dark World
Avishek Datta
 
PDF
DefCamp 2013 - Night talks - Hacking, phreaking, carding & social engineering...
DefCamp
 
PPT
Social Engineering | #ARMSec2015
Hovhannes Aghajanyan
 
PDF
Social Engineering, or hacking people
Tudor Damian
 
PPT
Phishing & Pharming
Devendra Yadav
 
PPTX
Phishing technology
Preeti Papneja
 
PPT
Phishing
oitaoming
 
PPTX
A presentation on Phishing
Creative Technology
 
PHISHING PROJECT REPORT
vineetkathan
 
Phishing, Pharming, and the latest potholes on the Information Highway
Kevin Lim
 
Intro phishing
Sayali Dayama
 
Email of Doom: New phishing attacks that threaten your clients
Calyptix Security
 
Phishing - A modern web attack
Karthik
 
Phishing--The Entire Story of a Dark World
Avishek Datta
 
DefCamp 2013 - Night talks - Hacking, phreaking, carding & social engineering...
DefCamp
 
Social Engineering | #ARMSec2015
Hovhannes Aghajanyan
 
Social Engineering, or hacking people
Tudor Damian
 
Phishing & Pharming
Devendra Yadav
 
Phishing technology
Preeti Papneja
 
Phishing
oitaoming
 
A presentation on Phishing
Creative Technology
 
Ad

Similar to Phishing techniques (20)

PPTX
Phishing technique tanish khilani
Tanish Khilani
 
PPT
Strategies to handle Phishing attacks
Sreejith.D. Menon
 
PDF
A Review on Antiphishing Framework
IJAEMSJORNAL
 
PPTX
Phishing attack, with SSL Encryption and HTTPS Working
Sachin Saini
 
PPTX
December 2019 Part 10
seadeloitte
 
PPT
Phishing
Alka Falwaria
 
PPTX
Phishing technology
Preeti Papneja
 
PDF
Study on Phishing Attacks and Antiphishing Tools
IRJET Journal
 
PPTX
Phishing
Archit Mohanty
 
PPTX
Phishing
Claudia Pérez
 
PPTX
Rods and Hooks - The Phishing Trip by Soummya Mukhopadhyay
null - The Open Security Community
 
PDF
Phishing 101 General Course
Aaron Keating
 
PPTX
Phishing technology
Preeti Papneja
 
PDF
Phish Phry- Analysis paper
Joydeep Banerjee
 
PPTX
Chapter-5.pptx
ShreyaKushwaha28
 
PPTX
Phishing
Esraa Yaseen
 
PPTX
phishing.pptx
ReenuMariaBinoy1
 
PPT
Computer 4 ict
guest1daf5af
 
PPT
Internet Phishing El phishing es una forma de ciberdelincuencia en la que los...
i2422282
 
PPTX
Phishing
Ajit Yadav
 
Phishing technique tanish khilani
Tanish Khilani
 
Strategies to handle Phishing attacks
Sreejith.D. Menon
 
A Review on Antiphishing Framework
IJAEMSJORNAL
 
Phishing attack, with SSL Encryption and HTTPS Working
Sachin Saini
 
December 2019 Part 10
seadeloitte
 
Phishing
Alka Falwaria
 
Phishing technology
Preeti Papneja
 
Study on Phishing Attacks and Antiphishing Tools
IRJET Journal
 
Phishing
Archit Mohanty
 
Phishing
Claudia Pérez
 
Rods and Hooks - The Phishing Trip by Soummya Mukhopadhyay
null - The Open Security Community
 
Phishing 101 General Course
Aaron Keating
 
Phishing technology
Preeti Papneja
 
Phish Phry- Analysis paper
Joydeep Banerjee
 
Chapter-5.pptx
ShreyaKushwaha28
 
Phishing
Esraa Yaseen
 
phishing.pptx
ReenuMariaBinoy1
 
Computer 4 ict
guest1daf5af
 
Internet Phishing El phishing es una forma de ciberdelincuencia en la que los...
i2422282
 
Phishing
Ajit Yadav
 

Recently uploaded (20)

PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
PPTX
The Future of AI & Machine Learning.pptx
pritsen4700
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
The Future of Artificial Intelligence (AI)
Mukul
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
SparkLabs Primer on Artificial Intelligence 2025
SparkLabs Group
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
The Future of AI & Machine Learning.pptx
pritsen4700
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 

Phishing techniques

  • 3. is the method used to steal personal information through spamming or other deceptive means. There are a number of different phishing techniques used to obtain personal information from users. As technology becomes more advanced, the phishing techniques being used are also more advanced. To prevent Internet phishing, users should have knowledge of various types of phishing techniques and they should also be aware of anti-phishing techniques to protect themselves from getting phished. Let’s look at some of these phishing techniques.
  • 4. Congratulations!!!!! You won 75000$ in Google lottery!!!!
  • 12. Instant messaging is the method in which the user receives a message with a link directing them to a fake phishing website which has the same look and feel as the legitimate website. If the user doesn’t look at the URL, it may be hard to tell the difference between the fake and legitimate websites. Then, the user is asked to provide personal information on the page.
  • 21. Key Loggers refer to the malware used to identify inputs from the keyboard. The information is sent to the hackers who will decipher passwords and other types of information. To prevent key loggers from accessing personal information, secure websites provide options to use mouse click to make entries through the virtual keyboard.
  • 27. In session hacking, the phishers exploits the web session control mechanism to steal information from the user. In a simple session hacking procedure known as session sniffing, the phishers can use a sniffer to intercept relevant information so that he or she can access the Web server illegally.
  • 30. Some phishing scams involve search engines where the user is directed to products sites which may offer low cost products or services. When the user tries to buy the product by entering the credit card details, it’s collected by the phishing site. There are many fake bank websites offering credit cards or loans to users at a low rate but they are actually phishing sites.
  • 31. In phone phishing, the phishers makes phone calls to the user and asks the user to dial a number. The purpose is to get personal information of the bank account through the phone. Phone phishing is mostly done with a fake caller ID.
  • 33. Phishing scams involving malware require it to be run on the user’s computer. The malware is usually attached to the email sent to the user by the phishers. Once you click on the link, the malware will start functioning. Sometimes, the malware may also be attached to downloadable files. Phishers take advantage of the vulnerability of web security services to gain sensitive information which is used for fraudulent purposes. This is why it’s always a good idea to learn about the various phishing techniques, including phishing with Trojans and Spyware.