Skip to content
Related Articles

Related Articles

Ethical hacking – Practical Phishing
  • Last Updated : 18 Jan, 2021

Phishing :
It is a way to gather personal information using deceptive e-mails and websites. It is a very regular practice done in every field, it can be done by professional hackers or a normal person also. It can be done through a simple trap link or a fully prepared fake account on Facebook or on some other platform. So it is very important to know how to resist them.

The most common technique that people are using for hacking your personal accounts like Facebook, Twitter, YouTube, and almost all accounts through Facebook is Trap links. These are the links that are made to trap users and redirect them to any random website where they lost their account credentials.

Important points :

  • Trap links are sent most often through some of the fake accounts on Facebook. make sure to check the profile before talking to any stranger. If the profile is newly created then it is possible that it can be a fake account.
  • It is not always compulsory that it is a real account if that account has some mutual friends because most of the time they pick a single account and send friend requests to all their listed friends.
  • A professional hacker can also create a dummy account that acts as bait in the process of phishing. When someone tries to view that profile or send a friend request to that dummy account then it redirects you to the page where they will say “login to continue” and users accidentally enter their email/phone and password and get hacked.
  • The third way of trapping users is by sending links in the public domain like groups and comment sections. As Facebook is strictly working in this that no one can send inappropriate links in the form of comments and while posting any photos and videos, but identifying all the links is not possible and hackers may use link shortens and modifiers which makes it much harder for the Facebook community to identify them.
  • After hacking user’s accounts they often blackmail them to leak their chats and other media and ask for a huge amount of money in place of that.

Identify phishing attacks :

  • The website where you will be redirected will be something like a clone of some trusted websites like Facebook, Gmail, etc.
  • It can be some known online game and will ask you “login with Facebook” or “login with Google” or “login to continue”.
  • Most of the time it will be related to your interest as they try to track your activity and then send you something related to your interest so that you click that link.
  • Always verify the domain name of that website as it will be something like big companies like Facebook, Netflix, etc. with some spelling mistakes.

Note –
To avoid these kind of activities or if you want to avoid then follow the given below link for your reference to avoid phishing attacks.
Reference link –Avoid phishing attacks

Attention reader! Don’t stop learning now. Get hold of all the important CS Theory concepts for SDE interviews with the CS Theory Course at a student-friendly price and become industry ready.

My Personal Notes arrow_drop_up
Recommended Articles
Page :