{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

CEH.V6.-.Module.40.Spamming

CEH.V6.-.Module.40.Spamming - Ethical Hacking and...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
Ethical Hacking and Countermeasures Version 6 Module XL Spamming
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.nzherald.co.nz/
Background image of page 2
Module Objective This module will familiarize you with: Spamming Techniques used by Spammers How Spamming is performed Ways of Spamming Types of Spam attacks Bulk Emailing Tools Anti-Spam Techniques EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Anti- Spamming Tools
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Module Flow Spamming Types of Spam Attacks Bulk Emailing Tools Techniques used by Spammers How Spamming is Performed Anti- Spam Techniques Ways of Spamming Anti- Spamming Tools EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Background image of page 4
Introduction Spamming is populating the user’s inbox with unsolicited or junk il emails Spam email contains malicious computer programs such as viruses and Trojans hich change the comp ter settings or track the s stem Trojans which change the computer settings or track the system Spamming is also used for product advertisements EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Techniques Used by Spammers Spoofing the domain: Message appears to be from user’s own domain Additi f i i ibl t t b i i Poisoning or spoofing filters: Addition of invisible text or numbering in message Used to manipulate people to perform actions or divulge confidential Social Engineering: information Directory harvesting: By sending messages to possible addresses and then building a list of valid email addresses through non-delivery reports Phishing attacks: EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Convinces the user that the mail is sent by a trusted source
Background image of page 6
Techniques Used by Spammers (cont’d) (cont d) Sending virus attached files: It installs Trojan horse and viruses that malfunctions host computer D t b P i i Using innocuous words (ham words) in a SPAM, thereby effectively poisoning the database in the long run Database Poisoning: Hiding spam words by inserting invalid HTML tags in between words Junk Tags: Spam word like mortgage etc. are masked by inserting special Invalid Words: EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited characters or junk characters in between
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
How Spamming is Performed Getting the email ID’s Spammers get access to the email ID’s when the user registers to any email service, forums, or blogs by hacking the information or registering as genuine users Spiders are used which searches the code in web pages that looks as email ID’s and copies it to the d t b database E-mail extraction tools that have built in search engines to find email ID’s of companies based on the key words entered are used On-line Ad Tracking tools help the spammers to analyze details of the number of users who
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}