Phishing Techniques

in phishing •  last year 

computer-6107592_1280.png

Let us learn some phishing techniques.

phishing-7487504_640.png

Phishing techniques :

[1] URL Manipulation :

  • URL manipulation is a common technique of disguising a malicious link to make it look like legitimate.
  • This can be done in several ways, such as hiding the URL behind text or using a URL that looks similar to a legitimate one.

[2] Filter Evasion :

  • Filter evasion is a technique used by cybercriminals to avoid email security filters and deliver phishing emails directly to the targets inbox.
  • Attackers use various methods to attack, such as embedding HTML images in phishing emails, using suspicious language or links, and using malicious links in document attachments.

[3] Website Forgery :

  • Website forgery is a technique used by cybercriminals to create a fake website that looks like a legitimate one to trick users into revealing sensitive information such as passwords, credit card numbers, or other personal information.
  • There are two common categories of website forgery, they are cross-site scripting and website spoofing.

[4] Flash Phishing :

  • Flash phishing is a type of phishing attack that uses fake domain names to launch attacks.
    Attackers register different domain names targeted to specific organizations and then launch a fake website using the registered domain.
  • They then send the phishing message with a link to the victims through different ways such as email, SMS, or messages.

[5] Social Phishing :

  • Social phishing is a type of phishing attack that uses social engineering techniques to trick people into revealing sensitive information such as passwords, credit card numbers, or other personal data
  • Social engineering attacks can be done by many methods, including phishing, pretexting, baiting, and others.

[6] Phone Phishing :

  • Phone phishing, also known as vishing, is a type of attack that uses voice communication technique to trick people into revealing sensitive information such as passwords, credit card numbers, or other personal data.
  • The attacker uses fake phone numbers, voice altering software, and other tactics to lure people to trap.

warning-6587278_640.png

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE BLURT!