Thursday, July 19, 2012

How to steal data from an E-mail


  •       Social Engineering.
  •   Exploiting the vulnerabilities in security.
  •   Keyloggers and browser monitoring.
Social Engineering
Social engineering is a collection of techniques used to manipulate people into performing action or divulging information. While similer to a confidence tricks or simple fraude, the term typically applies to trickey for information gathering or computer system access and in most cases the attacker never comes face-to-face with the victim.
Social engineering is considered a revolutionary art amoung the hacker community, it has proven to be an intresting tool that can be exploited by anyone. All social engineering attackes are based on flaws in human as congnitive biases.Some of these attackes are :
  •  Pretexting.
  •  Phishing.
  •  IVR/Phone Phishing.
  •  Trojan horse.
  •  Road apple

Security Vulnerability
Vulnerabilities are seccurity flaws or holes through which hackers can infiltrate.these holes can provide the hacker access to mailbox even the permission of the user.sometimes the administrator is negligent in patching the vulnerability in security. The hacker makes use of the vulnerability at this point and steals confidential data without the consent of the user.

Keyloggers
A keyloggers is a type os survellance software or spyware that has the capability to record every keystroke you make to a log file,usually encrypted. A keyllogers recoreder can record instant messages,e-mail and any information you type at any time using your keyboard.The log file created by the key loggers can then be sent specified receiver.