SlideShare a Scribd company logo
Presented By
Hizbullah
&
Usman Khan
Topic:
Email Hacking Preventions
Presentation Layout
a) What is Hacking?
b) Email Hacking Methods.
c) Preventions of Email Hacking.
a). What is Hacking?
The word “hacker” was used to describe
a great programmer.
 Someone, able to build complex
logics.
 Someone, exploiting weakness of a
system to gain unauthorized access.
 A person who doing hacking as known
as “Hacker”.
b). Email Hacking Methods
1. Phishing Attack
2. Key Logging
3. Brute Forcing
4. Social Engineering
1. Phishing Attack
Phishing attack will direct the user to visit a website where
they are asked to login with your email which is look like the
legitimate website but in reality it is fake.
Phishing scams could be:
 Emails inviting you to join a Social Group, asking you to
Login using your Username and Password.
 Email saying that Your Bank Account is locked and Sign
in to Your Account to Unlock it.
 Emails containing some Information of your Interest and
asking you to Login to Your Account.
 Any Email carrying a Link to Click and asking you to
Login.
2. Key Logger
 With key logger hacking email is more
easy and simple than phishing.
 It is a simple .exe executable file.
 When someone click it, the key logger
auto download.
 And you’ll , on your computer, you
start it, and put in the IP of destination,
and every hour you will receive keys
pressed on his computer.
3. Brute Forcing
 Trying a random approach by attempting different passwords and
hoping that one works.
 Some logic can be applied by trying passwords related to the person’s
name, job title, hobbies, or other similar items.
 Brute force randomly generates passwords and their associated
hashes.
 Tools which perform the Brute force attack are:
1. Aircrack-ng
2. John the Ripper
3. Rainbow Crack
4. Ophcrack
5. Hashcat
c). Preventions of Email Hacking
Prevention Against Phishing
 Read all the Email Carefully and
Check if the Sender is Original.
 Watch the Link Carefully before
Clicking.
 Always check the URL in the
Browser before Signing IN to your
Account.
 Always Login to Your Accounts
after opening the Trusted
Websites, not by Clicking in any
other Website or Email.
Prevention Against Key Logger
1. Encrypt Keystrokes i.e
KeyScrambler, Zemana
AntiLogger etc
2. Use AntiVirus i.e Panda
Cloud AntiVirus, Kaspersky
AntiVirus etc
3. Use Firewall i.e ZoneAlarm
Free Firewall, Comodo Free
Firewall etc
4. Use Password Manager i.e
LastPass etc
5. Update Your Software
Prevention Against Brute Force
 Minimum length of at
least seven characters
 Must include both upper
and lower case characters
 Must include numeric
characters
 Must include punctuation
Conclusion:
 Always configure a Secondary Email Address for
the recovery purpose.
 Properly configure the Security Question and
Answer in the Email Account.
 Do Not Open Emails from strangers.
 Do Not Use any other’s computer to check your
Email.
 Take Care of the Phishing Links.
 Do not reveal your Passwords to your Friends or
Mates.

More Related Content

PPTX
PDF
Email Forensics
PPTX
Email hacking
PPTX
Haking PPT
PPTX
Presentation of Social Engineering - The Art of Human Hacking
PPT
Ethical hacking
PPT
Phishing
PPT
Ip Spoofing
Email Forensics
Email hacking
Haking PPT
Presentation of Social Engineering - The Art of Human Hacking
Ethical hacking
Phishing
Ip Spoofing

What's hot (20)

PPTX
Firewall and its purpose
PPTX
CyberCrimes
PPTX
DoS or DDoS attack
PPTX
Password Cracking
DOCX
Final report ethical hacking
PPTX
PPTX
Brute force-attack presentation
PPTX
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
PPTX
Different types of attacks in internet
PPTX
Social engineering
PPTX
Phishing
PPTX
Cia security model
DOCX
Password Cracking
PPT
Email Headers – Expert Forensic Analysis
PPTX
Firewalls in network security
PPTX
Web Security and SSL - Secure Socket Layer
PPTX
Man in the middle
PPSX
Brute force attack
PDF
Email security & threads
PPT
Phishing
Firewall and its purpose
CyberCrimes
DoS or DDoS attack
Password Cracking
Final report ethical hacking
Brute force-attack presentation
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Different types of attacks in internet
Social engineering
Phishing
Cia security model
Password Cracking
Email Headers – Expert Forensic Analysis
Firewalls in network security
Web Security and SSL - Secure Socket Layer
Man in the middle
Brute force attack
Email security & threads
Phishing

Viewers also liked (10)

PPT
Cross site scripting (xss)
PPTX
Session hijacking
PPT
D:\Technical\Ppt\Sql Injection
PPTX
Session Hijacking ppt
PDF
SQL Injection 101 : It is not just about ' or '1'='1 - Pichaya Morimoto
DOCX
Web-servers & Application Hacking
PPT
Module 8 System Hacking
PPTX
Cross Site Scripting ( XSS)
PPT
Malware
PPTX
Sql Injection attacks and prevention
Cross site scripting (xss)
Session hijacking
D:\Technical\Ppt\Sql Injection
Session Hijacking ppt
SQL Injection 101 : It is not just about ' or '1'='1 - Pichaya Morimoto
Web-servers & Application Hacking
Module 8 System Hacking
Cross Site Scripting ( XSS)
Malware
Sql Injection attacks and prevention

Similar to Preventions of Email Hacking (20)

PDF
Five habits that might be a cyber security risk
PPT
Internet Security
PDF
Are Your Security Aware?
PPTX
Email phishing and countermeasures
PPTX
Security Awareness Training for Onboarding
PDF
Email Hacking
PPTX
PPTX
Spam & Phishing
PDF
Customer information security awareness training
PDF
Be Cyber Smart! (DLH 10/25/2019)
PPTX
Computer / Internet Security WHPL
PDF
Online Security
PPT
A quick guide to secure passwords
PPTX
Cyber security and privacy
PPT
lecture_5.pptSocial Engineering: Attacks and Defenses
ODP
The Net is Dangerous
PPTX
ISSA - Security Awareness 2016-1
DOCX
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
DOCX
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
PPTX
Cybersecurity Awareness Training for Employees.pptx
Five habits that might be a cyber security risk
Internet Security
Are Your Security Aware?
Email phishing and countermeasures
Security Awareness Training for Onboarding
Email Hacking
Spam & Phishing
Customer information security awareness training
Be Cyber Smart! (DLH 10/25/2019)
Computer / Internet Security WHPL
Online Security
A quick guide to secure passwords
Cyber security and privacy
lecture_5.pptSocial Engineering: Attacks and Defenses
The Net is Dangerous
ISSA - Security Awareness 2016-1
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
Best e-Mail Security PracticesUsing Email Safely E-mai.docx
Cybersecurity Awareness Training for Employees.pptx

More from Usman Khan (6)

PPTX
Lecture 3
PPTX
Lecture 1
PDF
Keplers laws
PPT
McCall's Quality Factors
PDF
Software Architecture and Design Introduction
PDF
Ajax
Lecture 3
Lecture 1
Keplers laws
McCall's Quality Factors
Software Architecture and Design Introduction
Ajax

Recently uploaded (20)

PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Approach and Philosophy of On baking technology
PDF
Machine learning based COVID-19 study performance prediction
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
KodekX | Application Modernization Development
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Spectroscopy.pptx food analysis technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Programs and apps: productivity, graphics, security and other tools
Network Security Unit 5.pdf for BCA BBA.
Approach and Philosophy of On baking technology
Machine learning based COVID-19 study performance prediction
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
KodekX | Application Modernization Development
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Spectroscopy.pptx food analysis technology
Chapter 3 Spatial Domain Image Processing.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Digital-Transformation-Roadmap-for-Companies.pptx
Understanding_Digital_Forensics_Presentation.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

Preventions of Email Hacking

  • 3. Presentation Layout a) What is Hacking? b) Email Hacking Methods. c) Preventions of Email Hacking.
  • 4. a). What is Hacking? The word “hacker” was used to describe a great programmer.  Someone, able to build complex logics.  Someone, exploiting weakness of a system to gain unauthorized access.  A person who doing hacking as known as “Hacker”.
  • 5. b). Email Hacking Methods 1. Phishing Attack 2. Key Logging 3. Brute Forcing 4. Social Engineering
  • 6. 1. Phishing Attack Phishing attack will direct the user to visit a website where they are asked to login with your email which is look like the legitimate website but in reality it is fake. Phishing scams could be:  Emails inviting you to join a Social Group, asking you to Login using your Username and Password.  Email saying that Your Bank Account is locked and Sign in to Your Account to Unlock it.  Emails containing some Information of your Interest and asking you to Login to Your Account.  Any Email carrying a Link to Click and asking you to Login.
  • 7. 2. Key Logger  With key logger hacking email is more easy and simple than phishing.  It is a simple .exe executable file.  When someone click it, the key logger auto download.  And you’ll , on your computer, you start it, and put in the IP of destination, and every hour you will receive keys pressed on his computer.
  • 8. 3. Brute Forcing  Trying a random approach by attempting different passwords and hoping that one works.  Some logic can be applied by trying passwords related to the person’s name, job title, hobbies, or other similar items.  Brute force randomly generates passwords and their associated hashes.  Tools which perform the Brute force attack are: 1. Aircrack-ng 2. John the Ripper 3. Rainbow Crack 4. Ophcrack 5. Hashcat
  • 9. c). Preventions of Email Hacking
  • 10. Prevention Against Phishing  Read all the Email Carefully and Check if the Sender is Original.  Watch the Link Carefully before Clicking.  Always check the URL in the Browser before Signing IN to your Account.  Always Login to Your Accounts after opening the Trusted Websites, not by Clicking in any other Website or Email.
  • 11. Prevention Against Key Logger 1. Encrypt Keystrokes i.e KeyScrambler, Zemana AntiLogger etc 2. Use AntiVirus i.e Panda Cloud AntiVirus, Kaspersky AntiVirus etc 3. Use Firewall i.e ZoneAlarm Free Firewall, Comodo Free Firewall etc 4. Use Password Manager i.e LastPass etc 5. Update Your Software
  • 12. Prevention Against Brute Force  Minimum length of at least seven characters  Must include both upper and lower case characters  Must include numeric characters  Must include punctuation
  • 13. Conclusion:  Always configure a Secondary Email Address for the recovery purpose.  Properly configure the Security Question and Answer in the Email Account.  Do Not Open Emails from strangers.  Do Not Use any other’s computer to check your Email.  Take Care of the Phishing Links.  Do not reveal your Passwords to your Friends or Mates.