In today's digital world, it's important to have a basic understanding
both Linux and phishing
. Linux is a widely used open-source operating system,
while phishing is a method used by cybercriminals to steal sensitive information
In this presentation, we will explore the relationship between
Linux and phishing and how understanding each can help protect against cyber attacks.
00:07
Introduction
00:12
Why We Use Linux?
00:12
Free
00:13
Light weight
00:13
Stability
00:13
Perfomance
00:13
Security
00:13
Privacy
00:14
Software Updated
00:14
Graphical user interface
00:14
Suitable for Programmers
00:18
What is Phishing?
00:19
Phishing is a type of cyber attack in which an attacker attempts
to trick a victim into providing sensitive information, such as login
credentials or financial information.
00:20
The attacker typically does this by disguising themselves as a
trustworthy entity, such as a bank or popular website, and sending
an email or message to the victim that appears to be from
that entity.
00:21
Phishing attacks can be developed by any individual or group
with an interest in obtaining sensitive information.
00:33
Coinage Of Phishing:
00:34
It is not clear who specifically created the concept of phishing.
00:35
The term "phishing" was coined in the 1990s by hackers who were
attempting to steal AOL passwords.
00:36
Phishing as a cybercrime tactic has been developed and
evolved over time by cybercriminals and hackers.
00:51
Types of Phishing
00:51
Email
00:52
SMS
00:53
Vishing
00:53
Smishing
00:54
Spear-Phishing
01:03
Common techniques used in Phishing
01:04
Social Engineering
01:05
Spoofed emails
01:05
Fake Websites
01:07
Malware
01:15
Prevention and protection against Phishing:
01:16
How to recognize phishing attempts: Look for spelling errors,
inconsistencies in the website address, and unexpected
requests for personal information.
01:17
Best practices for staying safe online: Use strong passwords,
keep your security software updated, and use
two-factor authentication
01:18
How to report phishing attempts: Report suspicious emails and
websites to the appropriate authorities and to your
IT department.
01:33
Phishing Detector
01:34
The script checks if curl command is installed on the system.
The script prompts the user to enter a URL and stores it.
The script uses curl command to check the effective URL
after visiting the provided URL.
The script compares the effective URL with the
provided URL to check if the user is being redirected to
a different website.
The script prints a warning message if the
effective URL is different from the provided URL, indicating
that it may be a phishing link.