Phishing : The Gateway to the Dark Internet - Understanding Risks and Prevention


'Phishing' - The Gateway Of Dark Internet



Introduction

Phishing is the process of creating a duplicate of any website to gain unauthorized access to user data. It enables hackers to access victims' personal information, account details, device information, location, IP address, and more. In some cases, they can even capture the victim's image and eavesdrop through the microphone.

Main Body

The term "phishing" was first recorded in 1995 in the cracking toolkit AOHell, although it may have been used earlier in the hacker magazine 2600. The term is a variation of "fishing" and refers to the use of lures to "fish" for sensitive information.

Phishing involves duplicating websites unethically and converting them into what is known as a phishing link. A phishing site may appear similar to the legitimate site, but there are often subtle differences for copyright purposes.

How It Works

Initially, a hacker creates a phishing site and sends the link to the victim. When the victim clicks the link, their IP address is sent to the hacker. If the victim grants permission for their camera, microphone, and location, the hacker can access this information. If the phishing site is a login page and the victim enters their username and password, the hackers can capture this data.

How to Stay Secure

  1. Never click links from unknown sources.
  2. Be cautious when clicking on links that seem suspicious.

How to Recognize a Phishing Link

To check if a link is a phishing link, follow these steps:

a. First, copy the link and open the terminal on your Android device.

b. Type the following commands:


apt install w3m
w3m <link>

If the screen is blank, it may indicate that the site is a phishing link.

c. Then type the following command:



ping <link>

If the IP address of the site is secure, it is likely not a phishing link.

For any further information, please email us at mail@anindasadhukhan.publicvm.com.


NOTE : OUR WEBSITE DOES NOT LENIENCE ANY UNETHICAL WORK, IT IS FOR EDUCATIONAL PURPOSE ONLY.

Comments

Popular posts from this blog

Inside Hydra: The Password Cracker Hackers Love & How You Can Defend Against It

Why You Should Think Twice Before Connecting to Any Wi-Fi Network

MaxPhisher: The Tool Hackers Use to Create Phishing Sites