Summary of Phishing attacks are SCARY easy to do!! (let me show you!) // FREE Security+ // EP 2

This is an AI generated summary. There may be inaccuracies.
Summarize another video · Purchase summarize.tech Premium

00:00:00 - 00:15:00

This video demonstrates how easy it is to perform a phishing attack by building a fake website that looks and functions just like the real thing. It then shows how to exploit a user's credentials by harvesting them from their LinkedIn profile. To avoid becoming a victim of phishing, be sure to use spam filters and only accept emails from reputable sources.

  • 00:00:00 The video demonstrates how easy it is to perform a phishing attack, by building a fishing website that looks and functions just like the real thing. It then shows how to exploit a user's credentials by harvesting them from their LinkedIn profile.
  • 00:05:00 Phishing attacks are easy to do, and this video demonstrates how to do an email-based phishing attack against a target. The video shows how to send a phishing email to a target, and how to track whether the email was received and acted on.
  • 00:10:00 This video demonstrates how easy it is to phish someone by creating a fake LinkedIn website and poisoning the DNS. By doing this, the hacker can control where Bernard's LinkedIn login takes him, and potentially other online accounts he has access to. To avoid becoming a victim of phishing, be sure to use spam filters and only accept emails from reputable sources.
  • 00:15:00 This video teaches how easy it is to phish someone, and how to protect yourself from these attacks.

Copyright © 2024 Summarize, LLC. All rights reserved. · Terms of Service · Privacy Policy · As an Amazon Associate, summarize.tech earns from qualifying purchases.