information security & ethical hacking workshop

19
Information Security & Ethical Hacking Workshop

Upload: vishwesh-satapute

Post on 08-Aug-2015

71 views

Category:

Education


1 download

TRANSCRIPT

Information Security & Ethical Hacking Workshop

#whoami

Penetration Testing Trainer (OSCP)

Interested in finding loop holes in networks.

Learning some new concepts and ninja techniques.

Interested in hardware hacking. hacking.

Agenda

• Introduction to EHIT/CC/PT.• Types of Hackers.• IP Address Basics.• Wireshark.• Virtualization.• Information Gathering.• Google Hacking Database.• PC Hacking• Hiding Data Behind Images• Mobile Hacking.• Q & A.

1. Introduction to PT/EH/CC

• What is hacking?

• How hacker works?

• How they gather info?

• What’s EH, PT ,CC?

2. Types of H@cK3r’s

• White Hat.

• Black Hat.

• Gray Hat.

3.IP Address & Basics.

• What is IP Address?• Types of IP’s• Classes of IP’s• Sources of IP’s

IP Address Management

ISP

User

www.ripe.net

www.apnic.net

www.afrinic.netwww.lacnic.net

www.arin.net

3-Way Handshake

4. Wireshark

• What is Wireshark?• Why it is used?

5. Virtualization

• Virtual Box.• VMware.• Setting up kali for Testing.

6. Information Gathering

• Why Information gathering needed?• How it is done?• What we will get ?• How it is useful?

Email Harvesting

• Extracting Emails from a website.• Extracting Emails from MNC’s domains.

7. GHDB• GHDB is Google hacking database.• The best site www.exploit-db.com• Finding Live camera too • *inurl:”CgiStart?page=”

* inurl:/view.shtml* intitle:”Live View / – AXIS* inurl:view/view.shtml* inurl:ViewerFrame?Mode=* inurl:ViewerFrame?Mode=Refresh* inurl:axis-cgi/jpg* inurl:axis-cgi/mjpg (motion-JPEG) (disconnected)* inurl:view/indexFrame.shtml* inurl:view/index.shtml* inurl:view/view.shtml* liveapplet* intitle:”live view” intitle:axis* intitle:liveapplet* allintitle:”Network Camera NetworkCamera” (disconnected)* intitle:axis intitle:”video server”* intitle:liveapplet inurl:LvAppl

8. PC Hacking

• What is Keylogger?• How it works?• Why it is used?

9. Hiding Data Behind Images

• What is Steganography?• Why it is used ?• How it Works?

Mobile Hacking & Security

• How to protect mobile phone.• How to make fake calls.• How to hack mobile.• Loop holes in android

Thank

You