CEH.V6.-.Module.40.Spamming - Ethical Hacking and...

Info icon This preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
Ethical Hacking and Countermeasures Version 6 Module XL Spamming
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.nzherald.co.nz/
Image of page 2
Module Objective This module will familiarize you with: Spamming Techniques used by Spammers How Spamming is performed Ways of Spamming Types of Spam attacks Bulk Emailing Tools Anti-Spam Techniques EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Anti- Spamming Tools
Image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Module Flow Spamming Types of Spam Attacks Bulk Emailing Tools Techniques used by Spammers How Spamming is Performed Anti- Spam Techniques Ways of Spamming Anti- Spamming Tools EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Image of page 4
Introduction Spamming is populating the user’s inbox with unsolicited or junk il emails Spam email contains malicious computer programs such as viruses and Trojans hich change the comp ter settings or track the s stem Trojans which change the computer settings or track the system Spamming is also used for product advertisements EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Techniques Used by Spammers Spoofing the domain: Message appears to be from user’s own domain Additi f i i ibl t t b i i Poisoning or spoofing filters: Addition of invisible text or numbering in message Used to manipulate people to perform actions or divulge confidential Social Engineering: information Directory harvesting: By sending messages to possible addresses and then building a list of valid email addresses through non-delivery reports Phishing attacks: EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Convinces the user that the mail is sent by a trusted source
Image of page 6
Techniques Used by Spammers (cont’d) (cont d) Sending virus attached files: It installs Trojan horse and viruses that malfunctions host computer D t b P i i Using innocuous words (ham words) in a SPAM, thereby effectively poisoning the database in the long run Database Poisoning: Hiding spam words by inserting invalid HTML tags in between words Junk Tags: Spam word like mortgage etc. are masked by inserting special Invalid Words: EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited characters or junk characters in between
Image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
How Spamming is Performed Getting the email ID’s Spammers get access to the email ID’s when the user registers to any email service, forums, or blogs by hacking the information or registering as genuine users Spiders are used which searches the code in web pages that looks as email ID’s and copies it to the d t b database E-mail extraction tools that have built in search engines to find email ID’s of companies based on the key words entered are used On-line Ad Tracking tools help the spammers to analyze details of the number of users who
Image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern