Exploring Cybercrime Tools and Techniques: Part 2 | Dr. Reshma Kadam
This video provides an in-depth look at various tools and methods employed in cybercrime, focusing on phishing tactics, including the dragnet and rod-and-reel methods of attack.

Reshma Patil
826 views • Jan 21, 2022

About this video
This video contains information about:
Tools and Methods Used in Cybercrime
- Phishing
- Methods of Phishing Attack
- Dragnet Method
- Rod-and-Reel Method
- Lobsterpot Method
- Gillnet Phishing
- Phone Phishing
- URL (weblink) manipulation
- Website Forgery
- Filter Evasion
- Flash Phishing
- Social Phishing
- Classification of Phishing Scams
- Deceptive Phishing
- Malware-based Phishing
- Key Loggers and Screen Loggers
- Web Trojans
- Hosts File Poisoning
- Data Theft
- Pharming
- Content-Injection Phishing
- Man-in-the-Middle Phishing
- Search Engine Phishing
- System Reconfiguration Attacks
- SSL Certificate Phishing
- Spear Phishing
- Countermeasures to Phishing
Tools and Methods Used in Cybercrime
- Phishing
- Methods of Phishing Attack
- Dragnet Method
- Rod-and-Reel Method
- Lobsterpot Method
- Gillnet Phishing
- Phone Phishing
- URL (weblink) manipulation
- Website Forgery
- Filter Evasion
- Flash Phishing
- Social Phishing
- Classification of Phishing Scams
- Deceptive Phishing
- Malware-based Phishing
- Key Loggers and Screen Loggers
- Web Trojans
- Hosts File Poisoning
- Data Theft
- Pharming
- Content-Injection Phishing
- Man-in-the-Middle Phishing
- Search Engine Phishing
- System Reconfiguration Attacks
- SSL Certificate Phishing
- Spear Phishing
- Countermeasures to Phishing
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
826
Likes
14
Duration
52:55
Published
Jan 21, 2022
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now