Concepts of Packet sniffing, Web spoofing, phishing, and key Recorder

Source: Internet
Author: User

Source: Tsinghua University Press

Many scams have existed for many years, while others are new products of the Internet. On the Internet, the main scam is to steal credit card numbers so that money can be transferred quietly. To this end, hackers have developed several ways to steal others' credit card numbers: Packet sniffing, Web spoofing, phishing, and key recorder. 7.6.1 package sniffer

When you enter some information (such as name, phone number, or credit card number) on the Internet, the information does not directly flow from the computer to the Web site to be viewed. In fact, the Internet will break it down into information packages and route it from one computer to another. The working principle is similar to a line of fire brigade that passes buckets. This process continues, until the Information arrives at the computer that stores the Web site to be viewed.

Packet sniffer searches for credit card numbers by capturing these information packets. Generally, someone will set up a package sniffer on the shopping Web site host. As a result, most intercepted packets will contain credit card numbers or other useful information for thieves.

Thieves can intercept wireless phone or mobile phone calls, and the packet sniffer can intercept information on the Internet in a similar way. If you order a product via a wireless phone or mobile phone, when you report a credit card number, the thief can intercept the call and steal the number. After the package sniffer intercepts the credit card number, it copies the number and sends it to the final target. Therefore, you may not immediately notice that the credit card number is stolen until the next payment is made and the charges are not normal.

To avoid packet sniffing attacks, we recommend that you do not send credit card information over the Internet. If you do want to order online, you should trust only those websites with encrypted credit card numbers (when you connect to an online shopping site that is considered safe, a tiny lock icon will be displayed at the bottom of the screen ).

It is a threat that someone else intercepts a credit card number through a package sniffer, but it is far away. The biggest danger comes from companies that store your numbers on their computers. Computers are often insecure. Hackers can access and steal all the credit card information stored there, but you are helpless. 7.6.2 Web Spoofing

Web spoofing is very similar to the package sniffer, but it does not secretly install the package sniffer on a computer host, but sets up a fraudulent Web site: it looks like a legitimate online shopping site, or an existing and valid Web site (see figure 7-4 ).

The URL of a fraudulent Web site is similar to a Web site to impersonate, such as a http://www.micrsoft.com (note, Microsoft misspelled), causing victims to believe that they are connected to a legitimate site. When you shop at a site like this, you may think that you sent your credit card number to a legitimate company, but in fact you handed your number to the thief.

To avoid Web spoofing, make sure that the address of the Web site is visible in the browser. If you are visiting Microsoft's Web site (http://www.microsoft.com), but you know through a browser that you are visiting another country's Web site address, you should carefully examine, otherwise, you may be a victim of Web spoofing.

The most daring way to get a person's credit card number is to directly ask questions. Of course, there is no very appropriate reason, and most people cannot give their credit card numbers. As a result, the scammers will go through the sea to create some reasons.

The phishing scam contacts victims via email or chat room. The swindler may claim to the victim that the billing records of your Internet service provider or online service must be updated. Therefore, can you enter a credit card number to verify your account (see figure 7-5 )? Phishing is popular in America Online or CompuServe chat rooms.

Undoubtedly, no legal organization has the right to query others' credit card numbers by email or chatting room. To avoid such scams, make sure that you do not tell strangers your credit card number over the Internet or any online service. 7.6.4 key Recorder

A key recorder is a special program or device that secretly records user keys, such as keys used to enter passwords or credit card numbers. If an attacker accesses your computer, he or she can secretly install a key recorder on it to record everything you enter. After you leave the computer, the hacker can sit back and search for the captured buttons.

The software key recorder is hidden in the memory, and the hardware key recorder may be connected to the computer and the keyboard, or it may be specially hidden in the disguised keyboard. To view instances of the two key recorder types, visit the KeyGhost site (http://www.keyghost.com ).

Even if a hacker has never accessed your computer, he or she can remotely install a key recorder on your computer using a remote access trojan horse or RAT (See Chapter 6th. Hackers can contact potential victims through email or chat rooms to persuade them to download and run Trojan horses. Once the victim runs a Trojan horse, the program opens a port and gets in touch with the hacker. From then on, hackers can read files or observe keys on the victim's computer without being noticed by the victim.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.