Linux and Phishing

Linux and Phishing

Published on 15 January 2023
Transcript
00:00
Team Members!
00:00
Topic :- Linux and Phishing
00:00
Ammar
00:01
Roshaan
00:01
Hashim
00:01
Awais
00:07
In today's digital world, it's important to have a basic understanding both Linux and phishing . Linux is a widely used open-source operating system, while phishing is a method used by cybercriminals to steal sensitive information In this presentation, we will explore the relationship between Linux and phishing and how understanding each can help protect against cyber attacks.
00:07
Introduction
00:12
Why We Use Linux?
00:12
Free
00:13
Light weight
00:13
Stability
00:13
Perfomance
00:13
Security
00:13
Privacy
00:14
Software Updated
00:14
Graphical user interface
00:14
Suitable for Programmers
00:18
What is Phishing?
00:19
Phishing is a type of cyber attack in which an attacker attempts to trick a victim into providing sensitive information, such as login credentials or financial information.
00:20
The attacker typically does this by disguising themselves as a trustworthy entity, such as a bank or popular website, and sending an email or message to the victim that appears to be from that entity.
00:21
Phishing attacks can be developed by any individual or group with an interest in obtaining sensitive information.
00:33
Coinage Of Phishing:
00:34
It is not clear who specifically created the concept of phishing.
00:35
The term "phishing" was coined in the 1990s by hackers who were attempting to steal AOL passwords.
00:36
Phishing as a cybercrime tactic has been developed and evolved over time by cybercriminals and hackers.
00:51
Types of Phishing
00:51
Email
00:52
SMS
00:53
Vishing
00:53
Smishing
00:54
Spear-Phishing
01:03
Common techniques used in Phishing
01:04
Social Engineering
01:05
Spoofed emails
01:05
Fake Websites
01:07
Malware
01:15
Prevention and protection against Phishing:
01:16
How to recognize phishing attempts: Look for spelling errors, inconsistencies in the website address, and unexpected requests for personal information.
01:17
Best practices for staying safe online: Use strong passwords, keep your security software updated, and use two-factor authentication
01:18
How to report phishing attempts: Report suspicious emails and websites to the appropriate authorities and to your IT department.
01:33
Phishing Detector
01:34
The script checks if curl command is installed on the system. The script prompts the user to enter a URL and stores it. The script uses curl command to check the effective URL after visiting the provided URL. The script compares the effective URL with the provided URL to check if the user is being redirected to a different website. The script prints a warning message if the effective URL is different from the provided URL, indicating that it may be a phishing link.