![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgCOzTQ_1qf4wRPMLGvt-vMbTMTrcrwgue7rA4lPW36vIkUZQ_-tj0-PNb6fV-Q_z4iQIKL7tswIJhVM3FdlsHmSyH7biir70Of4XWo3yHrnpuT5Mqqmi4HqnG9ldFszzYdPr-M4oqFK1o/s400/phishing-mobile-email.jpg)
A few days ago I read an article by Mahesh shoutmeloud how hackers hack passwords. This was a good place for any information that helps to protect itself from ever violated your password. I had to hack a orkut account has been violated by this method.
After reading the article I was interested in writing one of many methods used in piracy. It is phishing. There are many other techniques such as social engineering, stealing cookies, shoulder surfing, and then guess piracy via bruteforce or dictionary attacks, etc. but I am interesed to tell you about phishing , which is very popular in the online world.
What is phishing?
Phishing is the process of stealing confidential information such as usernames, passwords and banking information, which airs the original is kept not.This fraudent or criminal activity, and if proven to be fined or imprisoned, or in some cases be well. You can read more about phishing on Wikipedia.
Cases of phishing
Some cases that how people hacked:
* By mail:
Victims may receive email from a hacker posing as your bank. In this email, you can tell the victim you need to update your account and personal information before it expires, then the attacker has a link. Once the victim clicks the link, it is a website that looks exactly like the real bank page. In fact, it's just a perfect replica, and when it enters the details of your entry is sent by e-mail hackers or store on your web server, with full details provided.
These pirates have knowledge in HTML and PHP. I then have to show you how to do that (but I will not talk about the script used in this process.) But there are great opportunities to get the basic script of phishing and other methods that exist on the web.
Here is a screenshot of what a phishing email is as follows:
Many beginners fall prey to this method. Once you've started using the Internet for the first time, you would have met some brilliant and flashing ads declaring: "Congratulations, You are visitor 999,999 Site. Click here to get your gift. "And when you Click, you would have led to a page that asks for your basic information such as address, telephone and so on ... and the last thing you will be asked for credit card information.
It is also one of the most common beginner, but is not effective because many of them clicked and I have no credit card or more.
How hackers do this:
When they learn that the victim, the chief of a copy of the site so that they are ready for hacking. Tell you how this can be taken as an example Orkut.
A hacker who wants to steal your password, create a fake profile, saying that she's a girl. Once you have registered a hacker can update the profile for a full and more attractive. At the home page, you would paste the URL into your Web page to say favorite video link, etc. Once you click on it, you should take your orkut homepage (which is false) to obtain a login. If you enter information and does not seem to be ready to go home.
What is happening here is that for the first time when you enter a user name and password, send a hacker and then directed to the home page of the site Orkut. Now, you should log in again, because this is the original site.
How:
As I have said that a hacker can make some similar sites, they do using the "Save as webpage" option available in the browser. Then he puts a folder and all pages stored in it. With your knowledge of PHP and HTML, he wrote a scenario and places in the file. The fact that two special files phishing file (such as phish.php) and a text file (list.txt). phish.php The script must have the input characters as the user name and password and transfer it into a file that stores list.txt. It then downloads it to the server that hosts your website.
URLs will be encrypted so that a sudden glance at the address bar is imperceptible. This is where many of them out there on the network is hacked.
Protection methods:
There are other methods of protection, in particular. All you have to do is be careful of what you're doing.
* Emails read fully and check if it's specific bank where you have a linked account.
* When you reach the site to give a second look at the URL bar or address and make sure it is the right choice.
* Do not provide confidential information to persons not reliable and do not provide your email id to unsecured sites. They can sell their e-mail ID for you to get lots and lots of spam.
These are the methods that had to protect myself. If you know other methods please know me and the readers. It is always good to know that the method of piracy in general, as knowledge of the most common forms of piracy can help protect against hackers.