Jump to content

Login spoofing

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Eejit43Bot (talk | contribs) at 00:47, 26 April 2023 ([Task 1] Fix non-plural section headers). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Login spoofings are techniques used to steal a user's password.[1][2] The user is presented with an ordinary looking login prompt for username and password, which is actually a malicious program (usually called a Trojan horse) under the control of the attacker. When the username and password are entered, this information is logged or in some way passed along to the attacker, breaching security.

To prevent this, some operating systems require a special key combination (called a secure attention key) to be entered before a login screen is presented, for example Control-Alt-Delete. Users should be instructed to report login prompts that appear without having pressed this secure attention sequence. Only the kernel, which is the part of the operating system that interacts directly with the hardware, can detect whether the secure attention key has been pressed, so it cannot be intercepted by third party programs (unless the kernel itself has been compromised).

Similarity to phishing

While similar to login spoofing, phishing usually involves a scam in which victims respond to unsolicited e-mails that are either identical or similar in appearance to a familiar site which they may have prior affiliation with. Login spoofing usually is indicative of a much more heinous form of vandalism or attack in which case the attacker has already gained access to the victim computer to at least some degree.

Internet

Internet-based login spoofing[3] can be caused by

  • compromised sites
  • those named similarly to legitimate sites: typos bring people there.[citation needed]

References

  1. ^ Bongsik Shin (2017). A Practical Introduction to Enterprise Network and Security Management. ISBN 978-1498787987.
  2. ^ Insupp Lee; Dianna Xu (2 December 2003). "CSE 380 Computer Operating Systems" (ppt). University of Pennsylvania. p. 35. Retrieved 6 April 2016.
  3. ^ Emmett Dulaney (2011). CompTIA Security+ Deluxe Study Guide: SY0-201. ISBN 978-0470439852.