There are several techniques used by the criminals to obtain the data they needed. Some of the techniques can be concluded as below:
1) Man-in-the-middle attacks
This kind of attacks involves the http and https communications. The customer confidently used a website which they thought as a real site, however the truth is, the customer is connected to the criminal server while the criminals than makes many connection to the real site. The criminal server then represent the real application server and communicate with the customer in real time.
2) URL confusion
This technique is used by making a slight changes to the real url. They will then tricks the user to follow a hyperlink (URL) to the criminal’s server.
3) Pharming
Pharming is used by the criminals to redirect web
users from legitimate commercial web sites to malicious sites, which can then be used to elicit
information of the users.
The video below will explain more about how the criminals comitting the crime:
Url: https://www.youtube.com/watch?v=_3hK0PuSkhw
No comments:
Post a Comment