Date post: | 14-Jan-2015 |
Category: |
Education |
Upload: | shivam-kushwaha |
View: | 2,086 times |
Download: | 5 times |
ETHICAL HACKING
Presented By: Shivam Kushwaha
CS-3rd Year
CONTENTS
Concept of Ethical Hacking Hacker Email Hacking Windows Hacking Trojan
1. CONCEPT OF ETHICAL HACKING
Ethical Hacking is testing the resources for a good cause and for the betterment of technology.
Technically Ethical Hacking means penetration testing which is focused on Securing and Protecting IT Systems.
1. CONCEPT OF ETHICAL HACKING
Introduction to Hacking:- Its all about showing your Expertize.
2. HACKER
Hacker is a word that has twomeanings: who likes to play with Software or Electronic Systems.
Hackers enjoy Exploring and Learning how Computer
systems operate.
And second, who maliciously breaks into systems , for personal
gain. Technically, these criminals are Crackers as Criminal
Hackers.
TYPES OF HACKER
White Hat Hacker, Who perform Ethical Hacking. They are Security Professional.
Black Hat Hacker, Perform Unehthical Hacking. They are the Criminals hackers or Crackers
who use their skills and knowledge for illegal purpose.
3.EMAIL HACKING
How Email works ? Email Travelling Path.
USER xyzUSER abc
EMAIL HACKING(CONT..)
Fake mail ( Using PHP Script)
EMAIL HACKING(CONT..)
Proving a Fake Email
EMAIL HACKING(CONT..)
Email Bombing
Email Spamming
EMAIL HACKING(CONT..)
Email Password Hacking Loose Security answers Phishing Key Loggers
EMAIL HACKING(CONT..)
Phishing… Requirements:- We need a PHP Script …(test.php)
EMAIL HACKING(CONT..)
Phishing… We need a Fake Login page with Some changes in Source Code …(ServiceLogin.html)
EMAIL HACKING(CONT..)
Phishing… Upload Both files ServiceLogin.html and test.php on any Webhosting Server.
EMAIL HACKING(CONT..)
File Manager >hacked.txt
EMAIL HACKING(CONT..)
Prevention against Phishing. Read email carefully. Watch the link carefully before you clicking. During logged in session do not use any
suspicious link. Always check the URL before Signing In your a/c.
EMAIL HACKING(CONT..)
Keyloggers
Hardware Keylogger
Software Keylogger
EMAIL HACKING(CONT..)
Some Famous Keyloggers Actual Spy Perfect Keylogger Family Keylogger Home Keylogger Soft Central Keylogger Adramax Keylogger
4.WINDOWS HACKING AND SECURITY
Security architecture of Windows LSA(local Security Authority) SAM (Security Account Manager)
LSAUsernam
ePassword
SAM
Authentication Package
Logon Dialog
Key (In Hash Format)User a/c
database
Query
Returns user’s SID
4.WINDOWS HACKING AND SECURITY
Security architecture of Windows SAM (Security Account Manager) Location of a SAM file C:\Windows\System32\Config
4.WINDOWS HACKING AND SECURITY Windows User Account Attacks
To check the User Account net user
To Add a New User Account net user username password /add
To Delete a User Account net user username /delete
To change the Password of User Account net user username *
.
4.WINDOWS HACKING AND SECURITY
Windows User Account Attacks Brute-force Method Rainbow Table Attack(Oph Crack)
4.WINDOWS HACKING AND SECURITY
Creating a Backdoor in window. Sticky key Backdoor
4.WINDOWS HACKING AND SECURITY
Steganography
Performing System Security Application Monitoring Process Monitoring
5 .TROJANS
o What is Trojan?
o Different Types of Trojanso Remote Administration Trojans
o Data Stealing Trojans
o Security Disabler Trojan
5 .TROJANS
o Some Famous Trojano Bo NetBuso ProRato Sub7
east
Ask a Question ?