Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 14

PHREAKING

&
PHARMING
Sibug, Mark Emerald
Montoya, Mark James
Reyes, Jimmuel Cyrous
PHREAKING
What is phreaking?
Phreaking represents a subculture of hacking,
primarily focused on manipulating and exploiting
telephone networks. The term “phreaking” itself is a
blend of the words “phone” and “freaking”,
illustrating its connection to telecommunication
systems.
A brief history of phreaking
The birth of phreaking can be traced back to the 1970s when a group of
enthusiasts discovered they could manipulate the signals used in
telephone networks. One of the pioneers of phreaking was a man known
as John Draper, also known as “Captain Crunch.” He earned his
nickname after discovering that a toy whistle found in a Cap’n Crunch
cereal box could emit a tone at 2600 hertz – the same frequency that
controlled long-distance dialing in AT&T’s telephone network.
Throughout the 1980s and 1990s, phreaking continued to evolve with the
development of technology.
How phreaking works
Understanding how phreaking works requires a basic
understanding of how telephone networks operate.
Traditional telephone networks use specific signal
tones to initiate different actions, such as connecting
or disconnecting a call.
How phreaking works
In the modern era, phreaking has become more
complex. With the advent of Voice over Internet
Protocol (VoIP) technologies, phreakers now have a
new playground.
Conclusion
Phreaking, while an obscure and often overlooked
aspect of hacker culture, has played a significant role
in the evolution of telecommunications and
cybersecurity.
PHARMING
What is pharming?
Pharming is a scamming practice in which
malicious code is installed on a personal computer
(PC) or server, misdirecting users to fraudulent
websites without their knowledge or consent. The
aim is for users to input their personal information.
How does pharming
work?
Pharming uses the domain name system (DNS) to
redirect users from the intended domain to another
website. This can be done by exploiting vulnerabilities
in the DNS protocol or by compromising insecure
DNS servers and adding entries that redirect traffic.
Signs of pharming
WHILE THERE ARE STEPS TO TAKE TO PROTECT A
SYSTEM AGAINST PHARMING, THERE ARE TWO
SIGNIFICANT SIGNS THAT PHARMING MAY BE TAKING
PLACE:

A slightly different site link and appearance. An unsecure connection.

Although Hypertext Transfer Protocol Secure


Pharming websites look slightly different
(HTTPS) is a widely adopted security measure to
than legitimate sites using different colors, protect users and their data, pharming scams
logos or graphics but they attempt to trick a continue to prey on unsuspecting users by luring
user into thinking the site is safe to visit. them to insecure, fake websites.
Protecting Keep computers updated.

against pharming Keeping a computer's operating system (OS) and other software updated

Clear browser cache.


THERE ARE MANY STEPS
THAT CAN BE TAKEN TO While surfing the internet, browsers store information about the sites
visited.
PREVENT PHARMING
AND OTHER MALICIOUS
ATTACKS FROM Download antivirus and antimalware software.
OCCURRING:
Using an antivirus program is a common and effective way to protect a
computer from online threats and to protect against pharming.
Protecting Use HTTPS instead of HTTP.

against pharming HTTPS is the secure communication protocol of the internet. It encrypts
data so that it cannot be read by anyone but the intended receivers.

Use a virtual private network (VPN)


THERE ARE MANY STEPS
THAT CAN BE TAKEN TO
A VPN hides IP addresses from websites and keeps hackers from stealing
PREVENT PHARMING
personal information.
AND OTHER MALICIOUS
ATTACKS FROM
Use bookmarks.
OCCURRING:
Bookmarking frequently accessed
THANK
YOU

You might also like