ethical hacking

Post on 14-Jan-2015

2.085 Views

Category:

Education

5 Downloads

Preview:

Click to see full reader

DESCRIPTION

~This is The PPT On Ethical Hacking is Presented By Me and only for educational Purpose . Topic Included: 1. Intro Of Ethical Hacking* 2.Types Of Hacker* 3.Fake Mail ans Spam Concept* 4.Windows Hacking* 5.Trojan Horse* 6.SAM Security on Windows OS*

TRANSCRIPT

ETHICAL HACKING

Presented By: Shivam Kushwaha

CS-3rd Year

CONTENTS

Concept of Ethical Hacking Hacker Email Hacking Windows Hacking Trojan

1. CONCEPT OF ETHICAL HACKING

Ethical Hacking is testing the resources for a good cause and for the betterment of technology.

Technically Ethical Hacking means penetration testing which is focused on Securing and Protecting IT Systems.

1. CONCEPT OF ETHICAL HACKING

Introduction to Hacking:- Its all about showing your Expertize.

2. HACKER

Hacker is a word that has twomeanings: who likes to play with Software or Electronic Systems.

Hackers enjoy Exploring and Learning how Computer

systems operate.

And second, who maliciously breaks into systems , for personal

gain. Technically, these criminals are Crackers as Criminal

Hackers.

TYPES OF HACKER

White Hat Hacker, Who perform Ethical Hacking. They are Security Professional.

Black Hat Hacker, Perform Unehthical Hacking. They are the Criminals hackers or Crackers

who use their skills and knowledge for illegal purpose.

3.EMAIL HACKING

How Email works ? Email Travelling Path.

USER xyzUSER abc

EMAIL HACKING(CONT..)

Fake mail ( Using PHP Script)

EMAIL HACKING(CONT..)

Proving a Fake Email

EMAIL HACKING(CONT..)

Email Bombing

Email Spamming

EMAIL HACKING(CONT..)

Email Password Hacking Loose Security answers Phishing Key Loggers

EMAIL HACKING(CONT..)

Phishing… Requirements:- We need a PHP Script …(test.php)

EMAIL HACKING(CONT..)

Phishing… We need a Fake Login page with Some changes in Source Code …(ServiceLogin.html)

EMAIL HACKING(CONT..)

Phishing… Upload Both files ServiceLogin.html and test.php on any Webhosting Server.

EMAIL HACKING(CONT..)

Phishing…

username@gmail.com

*******

EMAIL HACKING(CONT..)

File Manager >hacked.txt

EMAIL HACKING(CONT..)

Prevention against Phishing. Read email carefully. Watch the link carefully before you clicking. During logged in session do not use any

suspicious link. Always check the URL before Signing In your a/c.

EMAIL HACKING(CONT..)

Keyloggers

Hardware Keylogger

Software Keylogger

EMAIL HACKING(CONT..)

Some Famous Keyloggers Actual Spy Perfect Keylogger Family Keylogger Home Keylogger Soft Central Keylogger Adramax Keylogger

4.WINDOWS HACKING AND SECURITY

Security architecture of Windows LSA(local Security Authority) SAM (Security Account Manager)

LSAUsernam

ePassword

SAM

Authentication Package

Logon Dialog

Key (In Hash Format)User a/c

database

Query

Returns user’s SID

4.WINDOWS HACKING AND SECURITY

Security architecture of Windows SAM (Security Account Manager) Location of a SAM file C:\Windows\System32\Config

4.WINDOWS HACKING AND SECURITY Windows User Account Attacks

To check the User Account net user

To Add a New User Account net user username password /add

To Delete a User Account net user username /delete

To change the Password of User Account net user username *

.

4.WINDOWS HACKING AND SECURITY

Windows User Account Attacks Brute-force Method Rainbow Table Attack(Oph Crack)

4.WINDOWS HACKING AND SECURITY

Creating a Backdoor in window. Sticky key Backdoor

4.WINDOWS HACKING AND SECURITY

Steganography

Performing System Security Application Monitoring Process Monitoring

5 .TROJANS

o What is Trojan?

o Different Types of Trojanso Remote Administration Trojans

o Data Stealing Trojans

o Security Disabler Trojan

5 .TROJANS

o Some Famous Trojano Bo NetBuso ProRato Sub7

east

Ask a Question ?

top related