SlideShare a Scribd company logo
3
Most read
16
Most read
19
Most read
Email Hacking
Email Client Security
Look forward to...
• Introduction
• What is an E-mail?
• Working of an E-mail
• Hacking through E-mail
• Fake E-mail Generation
• Measures to follow
Introduction
• Hackers don't always aim an IT
giant but also the tiny blocks in
the IT environment that is YOU.
• Only way to defend the
organisation is to secure your
email.
• Next you will see what is an e-
mail and some of the ways
through the hackers try to
jeopordize you and your
organisation.
What is an E-mail?
• Electronic mail, commonly
called e-mail, is a method of
exchanging digital messages
across the Internet or other
computer networks.
• An email message consists of
two components, the
message header and the
message body, which is the
email's content
How does an E-mail work?
Malware
• Sometimes attacks come
with malicious links or
attachments.
• They may contain:
VIRUS
WORM
TROJAN
SPYWARE
Spam- PHISHING
• Unwanted bulk commercial messages in your inbox.
PHISHING
• The attempt to trick
individual into responding to
the email, opening files or
disclosing sensitive
information.
SPEAR-PHISHING
Specialized phishing attack
targetting a speific individual or
group.
Social Engineering
• In Social engineering attacks
one method is to spoof the
identity of the user by
masqurading as a trusted
user in attempt to get the
access.
Unintentional Acts
• Authorized users may sometimes send
sensitive data inadvertently.
• Using personal account is a threat.
Fake E-mail Generation
• The attacker can send email
to victim by online fake
mailers such as emkei.com.
• There is wide range of fake
mailers, here for our
tutorial we go with the
emkei fake mailer.
How t o protect from common threats
• Avoid using personal
accounts for transmitting
company data.
• Never send sensitive data
such as usernames and
password in response to any
email.
• Never forget to log off
while using public devices
Continued...
• Avoiding using “BCc” and
use “Cc”.
• Be cautious while using
“Reply All” button.
• Be careful while forwading
emails.
Continued...
• Deleted emails are not
deleted permantently.
• Never click on suspicious links
• Avoid opening suspicious attachments.
• Delete suspicious email before opening.
Continued...
• Recognize Phishing emails.
• Do not Unsubscribe to any
email if not sure you
subscribed to.
• Your friend's email may be
compromised.
Identify fake email
• Fake emails or fake mails are those emails which pretend to
come from a specific email address but are sent from some
fake email senders.
• e.g.
Sender's name: Mark Zuckerberg
Sender's email: mark@facebook.com
Continued...
1. Click on the down arrow
on the right of the “me”
You will see something like
this.
Continued...
• Here you will see some
details about the email. If
the email comes from a
trusted source, you will be
able to see two more fields,
Mailed By and Signed By.
• This method can be applied
only for the emails coming
from big companies like
Google, Facebook, LinkedIn,
Twitter and other
companies.
Continued...
• For small companies who use
their dedicated servers
something more needs to be
done.
• See the header of the
email.
• To see the header of an
email, click on down arrow
at the right side of the
reply icon and click on show
original.
Continued...
• This is header information.
• Search for Received: from in
this page.
• See the domain there.
• Now see the website
emkei.cz and you will know
that the domain belongs to
a fake mail sender website.
Continued...
• See authenication results in the header information.
• Check SPF, DKIM, DMARC status. The status must show
PASS.
Conclusion

More Related Content

PPT
Email Security and Awareness
PPTX
Electronic mail
PPTX
Email Spoofing.pptx
PPTX
Gmail introduction
PPTX
Email Security Awareness
PPT
Electronic mail
PPTX
Email Security and Awareness
Electronic mail
Email Spoofing.pptx
Gmail introduction
Email Security Awareness
Electronic mail

What's hot (20)

PPTX
Preventions of Email Hacking
PPT
PPTX
Phishing ppt
PDF
Social engineering
PPT
Spoofing
PPTX
Different Types of Phishing Attacks
PPTX
Types of attacks
PPTX
PPTX
Password Cracking
PPTX
Phishing ppt
PPT
Cyber Crime and Security
PPTX
Social engineering
PPTX
Social engineering
PPTX
Footprinting and reconnaissance
PPTX
The Dark Web
PPT
Phishing
PPTX
PPTX
What is Phishing and How can you Avoid it?
PPTX
Social engineering presentation
PDF
What is Social Engineering? An illustrated presentation.
Preventions of Email Hacking
Phishing ppt
Social engineering
Spoofing
Different Types of Phishing Attacks
Types of attacks
Password Cracking
Phishing ppt
Cyber Crime and Security
Social engineering
Social engineering
Footprinting and reconnaissance
The Dark Web
Phishing
What is Phishing and How can you Avoid it?
Social engineering presentation
What is Social Engineering? An illustrated presentation.

Similar to Email hacking (20)

PPT
PPT
Email basics
PPTX
Email security netwroking
PDF
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...
PPT
Session 3 Gmail-Account.ppt
PPTX
StayVigilantProtectYourEmailAccount.pptx
PDF
Safe Email Practices
PPT
PPTX
Email security - Netwroking
PPT
cyber security unit-1, r20-JNTUK-USED FOR STUDENTS
PDF
How to Detect Email Fraud
DOCX
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
DOCX
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
PPT
Cyber security and emails presentation refined
PPTX
Spam & Phishing
PPT
gmail-emailSafety.ppt
PPT
gmail-emailSafety.ppt
PPT
Email and web security
PPTX
Tech Training - Session 8
PPTX
Win#8 email tips
Email basics
Email security netwroking
How to Implement DMARC/DKIM/SPF to Stop Email Spoofing/Phishing: The Definiti...
Session 3 Gmail-Account.ppt
StayVigilantProtectYourEmailAccount.pptx
Safe Email Practices
Email security - Netwroking
cyber security unit-1, r20-JNTUK-USED FOR STUDENTS
How to Detect Email Fraud
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
Cyber security and emails presentation refined
Spam & Phishing
gmail-emailSafety.ppt
gmail-emailSafety.ppt
Email and web security
Tech Training - Session 8
Win#8 email tips

Recently uploaded (20)

PPTX
Funds Management Learning Material for Beg
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
PPTX
international classification of diseases ICD-10 review PPT.pptx
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PPTX
Slides PPTX World Game (s) Eco Economic Epochs.pptx
PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
artificial intelligence overview of it and more
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPTX
Module 1 - Cyber Law and Ethics 101.pptx
PDF
The Internet -By the Numbers, Sri Lanka Edition
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PPTX
Introuction about WHO-FIC in ICD-10.pptx
PPTX
Internet___Basics___Styled_ presentation
Funds Management Learning Material for Beg
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
international classification of diseases ICD-10 review PPT.pptx
The New Creative Director: How AI Tools for Social Media Content Creation Are...
Triggering QUIC, presented by Geoff Huston at IETF 123
Decoding a Decade: 10 Years of Applied CTI Discipline
Slides PPTX World Game (s) Eco Economic Epochs.pptx
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
artificial intelligence overview of it and more
Cloud-Scale Log Monitoring _ Datadog.pdf
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
SASE Traffic Flow - ZTNA Connector-1.pdf
Module 1 - Cyber Law and Ethics 101.pptx
The Internet -By the Numbers, Sri Lanka Edition
presentation_pfe-universite-molay-seltan.pptx
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
RPKI Status Update, presented by Makito Lay at IDNOG 10
Introuction about WHO-FIC in ICD-10.pptx
Internet___Basics___Styled_ presentation

Email hacking

  • 2. Look forward to... • Introduction • What is an E-mail? • Working of an E-mail • Hacking through E-mail • Fake E-mail Generation • Measures to follow
  • 3. Introduction • Hackers don't always aim an IT giant but also the tiny blocks in the IT environment that is YOU. • Only way to defend the organisation is to secure your email. • Next you will see what is an e- mail and some of the ways through the hackers try to jeopordize you and your organisation.
  • 4. What is an E-mail? • Electronic mail, commonly called e-mail, is a method of exchanging digital messages across the Internet or other computer networks. • An email message consists of two components, the message header and the message body, which is the email's content
  • 5. How does an E-mail work?
  • 6. Malware • Sometimes attacks come with malicious links or attachments. • They may contain: VIRUS WORM TROJAN SPYWARE
  • 7. Spam- PHISHING • Unwanted bulk commercial messages in your inbox. PHISHING • The attempt to trick individual into responding to the email, opening files or disclosing sensitive information. SPEAR-PHISHING Specialized phishing attack targetting a speific individual or group.
  • 8. Social Engineering • In Social engineering attacks one method is to spoof the identity of the user by masqurading as a trusted user in attempt to get the access.
  • 9. Unintentional Acts • Authorized users may sometimes send sensitive data inadvertently. • Using personal account is a threat.
  • 10. Fake E-mail Generation • The attacker can send email to victim by online fake mailers such as emkei.com. • There is wide range of fake mailers, here for our tutorial we go with the emkei fake mailer.
  • 11. How t o protect from common threats • Avoid using personal accounts for transmitting company data. • Never send sensitive data such as usernames and password in response to any email. • Never forget to log off while using public devices
  • 12. Continued... • Avoiding using “BCc” and use “Cc”. • Be cautious while using “Reply All” button. • Be careful while forwading emails.
  • 13. Continued... • Deleted emails are not deleted permantently. • Never click on suspicious links • Avoid opening suspicious attachments. • Delete suspicious email before opening.
  • 14. Continued... • Recognize Phishing emails. • Do not Unsubscribe to any email if not sure you subscribed to. • Your friend's email may be compromised.
  • 15. Identify fake email • Fake emails or fake mails are those emails which pretend to come from a specific email address but are sent from some fake email senders. • e.g. Sender's name: Mark Zuckerberg Sender's email: mark@facebook.com
  • 16. Continued... 1. Click on the down arrow on the right of the “me” You will see something like this.
  • 17. Continued... • Here you will see some details about the email. If the email comes from a trusted source, you will be able to see two more fields, Mailed By and Signed By. • This method can be applied only for the emails coming from big companies like Google, Facebook, LinkedIn, Twitter and other companies.
  • 18. Continued... • For small companies who use their dedicated servers something more needs to be done. • See the header of the email. • To see the header of an email, click on down arrow at the right side of the reply icon and click on show original.
  • 19. Continued... • This is header information. • Search for Received: from in this page. • See the domain there. • Now see the website emkei.cz and you will know that the domain belongs to a fake mail sender website.
  • 20. Continued... • See authenication results in the header information. • Check SPF, DKIM, DMARC status. The status must show PASS.