+ All Categories
Home > Education > Ethical hacking

Ethical hacking

Date post: 14-Jan-2015
Category:
Upload: shivam-kushwaha
View: 2,086 times
Download: 5 times
Share this document with a friend
Description:
~This is The PPT On Ethical Hacking is Presented By Me and only for educational Purpose . Topic Included: 1. Intro Of Ethical Hacking* 2.Types Of Hacker* 3.Fake Mail ans Spam Concept* 4.Windows Hacking* 5.Trojan Horse* 6.SAM Security on Windows OS*
Popular Tags:
29
ETHICAL HACKING Presented By: Shivam Kushwaha CS-3 rd Year
Transcript
Page 1: Ethical hacking

ETHICAL HACKING

Presented By: Shivam Kushwaha

CS-3rd Year

Page 2: Ethical hacking

CONTENTS

Concept of Ethical Hacking Hacker Email Hacking Windows Hacking Trojan

Page 3: Ethical hacking

1. CONCEPT OF ETHICAL HACKING

Ethical Hacking is testing the resources for a good cause and for the betterment of technology.

Technically Ethical Hacking means penetration testing which is focused on Securing and Protecting IT Systems.

Page 4: Ethical hacking

1. CONCEPT OF ETHICAL HACKING

Introduction to Hacking:- Its all about showing your Expertize.

Page 5: Ethical hacking

2. HACKER

Hacker is a word that has twomeanings: who likes to play with Software or Electronic Systems.

Hackers enjoy Exploring and Learning how Computer

systems operate.

And second, who maliciously breaks into systems , for personal

gain. Technically, these criminals are Crackers as Criminal

Hackers.

Page 6: Ethical hacking

TYPES OF HACKER

White Hat Hacker, Who perform Ethical Hacking. They are Security Professional.

Black Hat Hacker, Perform Unehthical Hacking. They are the Criminals hackers or Crackers

who use their skills and knowledge for illegal purpose.

Page 7: Ethical hacking

3.EMAIL HACKING

How Email works ? Email Travelling Path.

USER xyzUSER abc

Page 8: Ethical hacking

EMAIL HACKING(CONT..)

Fake mail ( Using PHP Script)

Page 9: Ethical hacking

EMAIL HACKING(CONT..)

Proving a Fake Email

Page 10: Ethical hacking

EMAIL HACKING(CONT..)

Email Bombing

Email Spamming

Page 11: Ethical hacking

EMAIL HACKING(CONT..)

Email Password Hacking Loose Security answers Phishing Key Loggers

Page 12: Ethical hacking

EMAIL HACKING(CONT..)

Phishing… Requirements:- We need a PHP Script …(test.php)

Page 13: Ethical hacking

EMAIL HACKING(CONT..)

Phishing… We need a Fake Login page with Some changes in Source Code …(ServiceLogin.html)

Page 14: Ethical hacking

EMAIL HACKING(CONT..)

Phishing… Upload Both files ServiceLogin.html and test.php on any Webhosting Server.

Page 15: Ethical hacking

EMAIL HACKING(CONT..)

Phishing…

[email protected]

*******

Page 16: Ethical hacking

EMAIL HACKING(CONT..)

File Manager >hacked.txt

Page 17: Ethical hacking

EMAIL HACKING(CONT..)

Prevention against Phishing. Read email carefully. Watch the link carefully before you clicking. During logged in session do not use any

suspicious link. Always check the URL before Signing In your a/c.

Page 18: Ethical hacking

EMAIL HACKING(CONT..)

Keyloggers

Hardware Keylogger

Software Keylogger

Page 19: Ethical hacking

EMAIL HACKING(CONT..)

Some Famous Keyloggers Actual Spy Perfect Keylogger Family Keylogger Home Keylogger Soft Central Keylogger Adramax Keylogger

Page 20: Ethical hacking

4.WINDOWS HACKING AND SECURITY

Security architecture of Windows LSA(local Security Authority) SAM (Security Account Manager)

LSAUsernam

ePassword

SAM

Authentication Package

Logon Dialog

Key (In Hash Format)User a/c

database

Query

Returns user’s SID

Page 21: Ethical hacking

4.WINDOWS HACKING AND SECURITY

Security architecture of Windows SAM (Security Account Manager) Location of a SAM file C:\Windows\System32\Config

Page 22: Ethical hacking

4.WINDOWS HACKING AND SECURITY Windows User Account Attacks

To check the User Account net user

To Add a New User Account net user username password /add

To Delete a User Account net user username /delete

To change the Password of User Account net user username *

.

Page 23: Ethical hacking

4.WINDOWS HACKING AND SECURITY

Windows User Account Attacks Brute-force Method Rainbow Table Attack(Oph Crack)

Page 24: Ethical hacking

4.WINDOWS HACKING AND SECURITY

Creating a Backdoor in window. Sticky key Backdoor

Page 25: Ethical hacking

4.WINDOWS HACKING AND SECURITY

Steganography

Performing System Security Application Monitoring Process Monitoring

Page 26: Ethical hacking

5 .TROJANS

o What is Trojan?

o Different Types of Trojanso Remote Administration Trojans

o Data Stealing Trojans

o Security Disabler Trojan

Page 27: Ethical hacking

5 .TROJANS

o Some Famous Trojano Bo NetBuso ProRato Sub7

east

Page 28: Ethical hacking
Page 29: Ethical hacking

Ask a Question ?


Recommended