What is phishing attack?

 Hi, everyone, this is Grey HAT, and today we'll be learning about phishing attacks. In the previous blog, I spoke about Kali Linux, where I explained to you what Kali Linux is? So in this session, I'll be talking about what phishing is how phishing works and also, at the next session, I'll be telling you how you can be safe from phishing attacks.



Phishing is a web-based application or process and this is mainly used to steal credentials

 So first, let us understand what a phishing attack is? now talking about what phishing is on a day to day basis use. Internet use a web application you can be using a web application through your apps on your smartphone or some applications on your desktop or you might be using a web browser now consider the case where you're using a web browser and you have to shop something online now we search for the product and you come across different web sites and you like the product on two different web sites so one of these websites is a very famous very popular very trustworthy e-commerce web site and there is another web site which is selling your product for the same price and or maybe for a more discounted price but it is not popular you've never heard of that ecommerce website before now you choose to pay for your product online and for that you might have to enter your credit card or your debit card details.



 Now the question is which website would you trust more with your personal details with your sensitive details that is your credit card details obviously you would be less hesitant while you're entering the credit card details onto the e-commerce website that is trustworthy and it would be more hesitant. You would be worried while entering these details onto the website that you are pouring the name for the first time this is because you don't trust the new website the other website the popular website you heard of the name before you've used it before and you have a trust factor with that website.

 So this psychology is what hackers take advantage of in phishing attacks so hackers take advantage of this trust factor and they fake themselves as a trustworthy entity to steal your sensitive data or a personal data so if using is an attack of gathering sensitive information of a target such as user name password email ID or other sensitive information maybe your bank details your credit card your debit card details by disguising themselves as a trustworthy entity. So as, I told you previously if you are entering any sensitive information maybe your card details onto a trustworthy website you wouldn't be hesitant.


So in phishing attacks a hacker disguises himself as a trustworthy entity then he meets you he tricks you into entering your sensitive information into that fake a web application so this is phishing.

Grey Hat

Here we explore some Linux, OS, and technical knowledge. I have a little bit of knowledge about computers and some operating system stuff and am most Curious about historical facts and their myths; these are like a dream for me. I think this platform is more suitable for us than any other. So, let's explore our adventure of knowledge. I wanted to say a quick thank you to everyone who has been reading and supporting this Blog!! If you are a returning subscriber, welcome back!! If you are new here, remember to share before you leave. Further information, facts, and mysteries will be posted daily!

Post a Comment

Previous Post Next Post