menu search

{ Learn4Hack }

Welcome to our blog. Enjoy our Service and Follow Us..

  • ☮ About
  • ✆ Contact
  • ☸ Sitemap
  • ✍ Disclaimer
  • arrow_back
    more_vert
    • ☖ Home
    • ☣ Hacking
    • ⚠ Sucurity
    • ⚡ Tips â„° Tricks
    • ✠ Windows
    • ♲ Android
    • ☪ Tools
    • ☮ Technology
    Admin

    { Learn4Hack }

    keyboard_arrow_down

    Be Quieter Be Smarter

    • Youtube
    • Facebook
    • Twitter
    • home Home
    • ☬ Kali linux
      • Tutorial
      • Tools
      • Methods
    • ☴ Tricks Zone
      • Notepad Tricks
      • VLC tricks
      • CMD tricks
    • ☯ Hacking
      • Android Attacks
      • Dictionary Attacks
      • Pc Attacks
      • Wireless Attacks
      • Website Attacks
    • ⚕ Social Networking
      • Tips n Tricks
      • Methods
    • ☮ About
    • ✆ Contact
    • ✍ Disclaimer
    Home › SECURITY › Social Tips n Tricks › Introduction to Phishing.

    Introduction to Phishing.

    Brajesh Sharma
    watch_later Saturday, August 22, 2015

    The One of the Best Hacker's Technique is Phishing , How They Use ? How it works ? Lets see.....




    Hello Guyz...
    Welcome to Learnforhack.
    This topic is relates to Phishing.
    --------------------------------------------------------------------------------------------------------------------------
    So today we are going to know tht :-

    1. Wht is phishing ?
    2. Wht it works?
    3. How hackers use it for hacking ?
    4. How to prevent to getting hack by phishing ?

    So, now

    Q. Wht is phishing ?

    Ans.  So guyz we all knws about of Fishing and in fishing we use a stick an food eg. Worms for fishing.. now i think u all got tht wht i m trying to tell..
    Exactly , the term phishing is mostly fishing techniques in tht term Fisher knwn as a programmer or hacker,tht stick become a computer or web and most important tht fish become users.....

    Q. Wht it works ?
    Ans.  Phishing techniques used to mostly steal a 
    Password , top secret data , now a days the younger or teenagers including me 😜 are using Facebook , gmail blah blah.. but Facebook will not open in a day thts not possible well wo bat alag h ki net peck na ho ...  lollzz.......
    Well yeah maximum people who knw about phishing use to hack his or her enemies account... 
    So u all going to knw about tht how it works ? 
    So lets see... 


    Phishing technique use for do evil thing.. such A
    To hack a gmail,fb,Twitter (not sure) 
    Evan credit card ,bank account etc..

    Q. How hackers use it ?
    Ans. Well in phishing hackers create a fake website page to steal or hack the data.

    Example :-
    To hack credit card :-
    1st of all  For hacking ur credit card they need a all information about ur card..
    So they will create a Fake website suppose u have sbi credit card   
    The website will 

    www.sbi.co.in or www.onlinesbi.com

    But The hacker will create a website related to this link coze as we all knws tht Google not allows the same name website so they there fake website can be 

    Www.sbi.co.in.in or www.onllinesbi.com

    Well its easy to identified but when they creates it .. it cant be... 
    So when u click on tht fake link it will feel u like tht u are on a main page but its illusion coze only two things works on tht.
    Tht is -
    Enter the username
    Enter the password
    Thn login...

    Thts it u lost....
    Then the next msg will be 
    => 10000 INR withdraw from ur account
    => your account not exist 


    Sometimes they leaves msg..
    => u r hacked  nd blah. Blah..

    Well see the blow image for more information :- 


    So now u get it tht its harmful. Well dnt wary .. "every action has opposite reaction " Newton baba ne kaha tha.. so dnt wary next topic is for ur problem.  
    .

    Q. How to prevent to getting hack by phishing ?
    Ans. 
    Once you have fallen in to the trap of some phishing scam, it may take years to get rid of it. It is always said that prevention is better than cure and this applies to phishing scams too. One of the easiest ways to avoid phishing attacks is to have your anti-virus updates regularly. Also, make sure that you are installing an anti-virus, which has got email scanner and link scanners, which detects the safety of a link before you click over them.

    A good spam control program can also provide protection from phishing. The most difficult part is to detect fake websites and mails from the real ones, as the scammers do not keep any single stones unturned to make them look like real ones.

    Getting all the security settings of your browser turned “On” will also help you to prevent yourself from falling in some phishing scam. Browse safe and be away from the dangers of phishing...
    .
    So thts it for today...
    --------------------------------------------------------------------------------------------------------------------------
    Plz Share Be Secure n Follow us..
    Thank uh...
    Share This :
  • plus_one Google+
  • share Facebook
  • share Twitter
  • share Pinterest
  • Brajesh Sharma
    Brajesh Sharma

    • chevron_left
    • chevron_right

    comment 0 comments:

    more_vert
  • Add Comments
  • More Settings
  • Follow Us

    • 12K+

      Facebook
    • 5K+

      Twitter
    • 4K+ 

      Google+
    • 11K+

      Youtube

    Popular

    • Why "there is no place Like 127.0.0.1" is funny..?
      You May Have Seen a an Wallpaper nd More Place That There Is No Place Like 127.0.0.1 lets see reason behind that... Hey Guyz, Welcome...
    • Make Your Computer Welcome You With Voice
      You Start Your Computer and Your Computer Welcome you With a Voice in Starting so Lets see.. Hey Guyz, Welcome to Learnforha...
    • Hackers are Using Google AdWords Service...
      "How and Why Hackers are using Googles Adwords Service against to Adwords user lets see here..... Hey Guyz, Welcome to Le...
    • Hack Android Mobile With AndroRat
      Hy Guyz, Welcome to Learnforhack, in this post we gonna hack Android mobile remotely by RAT method , -----------------------------------...
    • 6 best file sharing sites to earn upto 20$ per download
      Hy Guyz, Welcome to Learn4Hack in this post we gonna talk about how to Earn  Money by Sharing a file . ---------------------------------...
    • Introduction of Software to Hack Computer and Android Remotely : RAT (Remote Access Trojan )
      Hey Guyz, Welcome to Learnforhack, In this post i am gonna tell you about Remote Access Trojan (RAT) ---------------------------------...
    • What is RSS and Why its Very important for Web . !
      Hy Guyz, Welcome to Learnforhack, in this post i am gonna tell you About RSS nd tht importance. -------------------------------------...
    • CSPLOIT V1.6.6 RC2 APK IS HERE ! [LATEST]
      cSploit   Is The most complete and advanced IT security professional toolkit on Android. This App was actually called  dSploit  but some...
    • 10 Most Notorious Hacking Groups
      So 10 most Powerful Hacking Groups is There , So Dnt Wait Lets See.... Hy Guyz, welcome to learnforhack,   Here are top 10 hac...
    • How to install Kali linux 2.0 Sana Using Live CD Method
      Kali Linux or we can say Backtrack 5 in an useful OS for pentesting methods (hacking ) so lets see.... Hey Guyz , Welcome to Learn...

    Categories

    • CMD Tricks 2
    • HACKING 10
    • Notepad Tricks 2
    • Pc Attacks 3
    • SECURITY 5
    • Social Tips n Tricks 4
    • TRICKS &TIPS 7
    • Tech 6
    • WINDOWS 6

    Contact Form

    Name

    Email *

    Message *

    Translate

    Blog Archive

    • ►  2016 (10)
      • ►  December (4)
      • ►  November (1)
      • ►  October (4)
      • ►  January (1)
    • ▼  2015 (12)
      • ►  October (2)
      • ►  September (3)
      • ▼  August (7)
        • Intoduction of Real Hackers (in hindi)
        • Hack WhatsApp with Simple Method
        • Make a Folder Repliclator Batch Virus
        • Introduction to Phishing.
        • Learn To Hide Files Behind The Images
        • Create A Undeletable And Unrenamable Folders
        • Sandisks World’s First 200Gb microSD Card Arrives

    Visiters

    Followers

    My Blogs

    • Learn4Hack
    • Learn4java

    © 2016 { Learn4Hack } - All Rights Reserved
    Powered by Learn4Hack and Brajesh Sharma

  • ☮ About
  • ✆ Contact
  • ☸ Sitemap
  • ✍ Disclaimer
  • ☛ Privacy Policy
  • expand_less