Basic of phishing Part 1, in this video we are going to see the basics of phishing attacks
Phishing is a form of online fraud in which perpetrators impersonate trusted entities, such as banks, corporations, or government bodies, to deceive individuals into disclosing sensitive information, including passwords, credit card details, or account information. This deception typically occurs through emails, text messages, counterfeit websites, or phone calls that appear legitimate but are intended to harvest your data. For instance, you may receive an email that seems to originate from your bank, requesting you to 'confirm your account' by clicking a link. However, this link directs you to a fraudulent website designed to capture your login credentials.
All types of phishing techniques are listed
We will upload all the techniques' practical videos soon, one by one
1. Email Phishing (Classic Phishing)
Method: Fake emails posing as trusted entities (banks, companies, etc.).
Goal: Trick you into clicking malicious links or opening attachments.
2. Spear Phishing
Method: Targeted phishing at specific individuals or organizations.
Goal: Uses personal information to make the message more convincing.
3. Whaling
Method: Targeting high-profile executives (CEOs, CFOs).
Goal: Steal sensitive company data or authorize large money transfers.
4. Vishing (Voice Phishing)
Method: Phone calls pretending to be from banks, tech support, etc.
Goal: Get you to give up credentials or transfer money.
5. Smishing (SMS Phishing)
Method: Phishing via text messages with malicious links or scare tactics.
Goal: Trick victims into clicking harmful URLs or giving up info.
6. Pharming
Method: Redirecting victims from legitimate websites to fake ones using DNS poisoning.
Goal: Steal login credentials or credit card details.
7. Clone Phishing
Method: A legitimate email is copied, and malicious links are inserted.
Goal: Fool users who already trust the original message.
8. Man-in-the-Middle (MitM) Phishing
Method: Intercepting communications between the user and a website.
Goal: Capture login information or inject malicious content.
9. Business Email Compromise (BEC)
Method: Hack or spoof a company executive’s email to request wire transfers or data.
Goal: Steal money or confidential info from businesses.
10. Evil Twin (Wi-Fi Phishing)
Method: Setting up fake Wi-Fi hotspots that look legitimate.
Goal: Steal credentials when users log in through the fake network.
Practical : Phishing Part 1
Commands
$ git clone --depth=1 https://github.com/htr-tech/zphisher.git
$ cd zphisher
$ bash zphisher.sh
0 Comments