+ All Categories
Home > Documents > Gurukul work shop ppt

Gurukul work shop ppt

Date post: 03-Jan-2016
Category:
Upload: rajan-khandelwal
View: 46 times
Download: 2 times
Share this document with a friend
Description:
its a ppt for students they can download it from here or my website www.officialrajankhandelwal01.weebly.com
54
S AAKANKSHA INTERNATIONAL SCHOOL-THE GURUKUL, NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER ANKIT FADIYA & SUNNY VAGELA)
Transcript
Page 1: Gurukul work shop ppt

S

AAKANKSHA INTERNATIONAL SCHOOL-THE GURUKUL,

NAGAUR

ETHICAL HACKING WORKSHOP BY

RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED)SACHIN PUNIYA (TRAINER UNDER ANKIT FADIYA & SUNNY VAGELA)

Page 2: Gurukul work shop ppt

TOPICS OF WORKSHOP ETHICAL HACKING INTRODUCTION.

INTRODUCTION TO INFORMATION GATHERING & FOOT PRINTING

PHISHING (GMAIL HACKING,FACE-BOOK HACKING)

CYBER FORENSICS. VIRUS,WORMS,KEYLOGGERS,SNIFF

ERS, TROZANS.

Page 3: Gurukul work shop ppt

TOPICS

SYSTEM HACKING & SECURITY.

GOOGLE HACKING REVERSE ENGINEERING.

MOBILE AND BLUETOOTH HACKING.

STEGNOGRAPHY

Page 4: Gurukul work shop ppt

TOPICS FIREWALLS AND DNS .

WEBSITE HACKING(ONLY SQL INJECTION).

Page 5: Gurukul work shop ppt

1).ETHICAL HACKING INTRODUCTION

1. WHAT IS HACKING?

2. WHAT IS ETHICAL HACKING AND WHO ARE ETHICAL HACKERS?

3. WHAT ARE TYPE OF ETHICAL HACKERS?

Black hat ,White hat ,Grey hat, Script kiddies,

Undergo Employees.

Page 6: Gurukul work shop ppt

Hackers development cycle

Reconnaissance- it’s the basic information gathering about the target system.

Scanning-its to target the system for open ports and services running on the open ports.(65570 ports)

Gaining Access-it’s the actual access of the target system by exploiting the system.

Maintaining Access-keeping the access of the system even after leaving the system so as not to perform all the steps from the start.

Cleaning tracks- To remove the footprints if any so as to remain undetected from the system.

Page 7: Gurukul work shop ppt

practical's Global IP address-www.ipcow.com

To find dedicated and shared server-www.yougetsignal.com

Use to check IP address and contact details of any website-

Who.is website, Samspade software.

How to copy full website and see it in offline –winHT track website copier.

To see website back to time –way back time machine.

Page 8: Gurukul work shop ppt

For changing right click properties Go to run type regedit.

In regedit go to my computer then Hkey classes root

Then search for name “folder”.

In folder there is shell open ,

Default change content according to you .

To ping any website- c:CD/

C:/>ping www.websitename.com

Page 9: Gurukul work shop ppt

For changing hard disk options

Go to run type gpedit.msc

User configurations.

Admin privileges.

Windows component.

Windows explorer –just see on its right side and change settings according to you.

Page 10: Gurukul work shop ppt

INTRODUCTION TO INFORMATION GATHERING AND FOOTPRINTING FOOT PRINTING IS PRE ATTACK PHASE IT HELPS US TO

GATHER MAXIMUM ABOUT OUR VICTIM.

SCANNING IS A PROCESS OR TECHNIQUE OF INTELLIGENT INFORMATION FOR AN ATTACKER

WE FIND

1. IP ADDRESS

2. OPERATING SYSTEMS.

3. SYSTEM ARCHITECTURE.

4. SERVICES RUNNING ON EACH COMPUTER.

THREE TYPES OF SCANNING

PORT SCANNING,NETWORK SCANNING ,VULNERABILITY SCANNING

Page 11: Gurukul work shop ppt

PRACTICALS SOFTWARE TO SCAN PERSONS THAT ARE IN

YOUR NETWORK IF U ARE WORKING ON WIFI OR ANY COMPANY

SOFTPERFECT NET SCAN FOR NET WORK

SCANNING

SOFTWARE TO SCAN DETAILS OF ANY WEBSITE ANY SERVER ,ANY COMPUTER

ZENMAP OR NMAP (SCAN ANY WEBSITE )

C:/>NMAP 192.168.150.1.

Page 12: Gurukul work shop ppt

PHISHING (GMAIL,FACE BOOK HACKING)

PHISHING IS A TECHNIQUE THROUGH WHICH WE SEND A CLONE PAGE OF ANY WEBSITE TO THE VICTIM AND AS THE VICTIM FILES THE USERNAME AND PASSWORD WE GET THAT PASSWORD AND WE CAN ACCESS THAT MAIL OR WEBSITE ACCOUNT OF THE VICTIM.

REQUIREMENTS:-

1. GMAIL FAKE PAGE .

2. PHP SCRIPT.

3. LOGS.txt.

4. FREE HOSTING WEBSITE.

Page 13: Gurukul work shop ppt

PRACTICAL OEN GMAIL .COM

RIGHT CLICK ON IT OR PRESS CONTROL+U.

ITS PAGE SOURCE VIEW COPY ALL THE PAGE

OPEN NOTEPAD AND PASTE IT

EDIT FIND ACTION CHANGE FILE TO NOKIA.PHP

AND SAVE THAT FILE AS GMAIL.HTML

NOW THAT FILE IS ON LOCAL MACHINE BUT TO SEND THAT TO ANY VICTIM WE SHOULD HAVE TO UPLOAD THAT ON ANY WESITE THROUGH WHICH IT WOULD BE GETTING LINKED.

Page 14: Gurukul work shop ppt

CONTINUE ANY WEBHOSTING SITE

WWW.T35.COM,WWW.110MB.COM,WWW.BYTEHOSTING.COM,000WEBHOST.COM

MAKE YOUR ACCOUNT THEN GO TO CONTROL PANEL FILE MANAGER

MAKE NEW FOLDER MAKE NEW DIRECTORY

UPLOAD NOKIA.PHP FILE ,GMAIL.HTML(FAKE

PAGE).

Page 15: Gurukul work shop ppt

CONTINUE SEND THE LINK OF YOUR FAKE PAGE TO VICTIM

YOU WOULD GET THE USERNAME PASSWORD IN LINK YOU SEND IT TO THE VICTIM JUST CHANGE LAST ROOT FILE OF IT WITH LOGS.TXT.

http://roam.hostingsiteforfree.com/nokia.php/logs.txt

http://roam.hostingsiteforfree.com/nokia.php/gmail.html

http://roam.hostingsiteforfree.com/nokia.php/facebook.html

Page 16: Gurukul work shop ppt

CYBER FOREINSICS Cyber Forensics can be defined as a process

of retrieving back the evidences deleted by the criminal from hard disk, pen drive, memory card, laptop disks, portable hard disks.

The process takes place in two manners:-

1. Recovering the deleted data

2. In case of damage Sorting the data from a scrambled

form.

Page 17: Gurukul work shop ppt

continue

Formatting

1. Quick Formatting 2. Complete Formatting

Index Application Size

101001 ramayan.avi 850MB

Quick Formatting will be very quick and after when its done your OS will not gone show you any content of the pendrive and hence we think data is deleted but in reality data is always there in quick formatting, its only Index is gone. and when index is gone then Windows OS can not determine the location of file and hence will say its empty.

Page 18: Gurukul work shop ppt

Continue

Complete Formatting : It will delete both index and data.

Whatsapp Forensic Recovery:-Can recover up to 7 days of the chat because after 7 days backup whatsapp delete the logs from your storage.

Page 19: Gurukul work shop ppt

Practical How to recover what's app messages

1. Take the phone whose messages you want to recover take file called MySQL from database of whatsapp to your computer and save it .

2. Go to website www.recovermessages.com

3. Scan the MySQL file and you will have messages of seven days.

Page 20: Gurukul work shop ppt

Continue

How to recover pendrive and hard disk drives?

For that a software is needed it is

Easus data recovery professional for data recovery .

Select the drive in this software which you want to recover but first condition drive should be quick format .

Page 21: Gurukul work shop ppt

Virus ,worms keyloggers,trojans

What is virus ?

Malicious program ,using this program will damage your

system, by injecting the virus into other program

what is worms?

same as virus but they will spread throughout the

network.

What is Trojan ?]

It is like data of the victim to be used by someone else.

Not harming your computer.

Page 22: Gurukul work shop ppt

TROJANS

There are 2 types of Trojans are there

1. DIRECT TROZAN – IT’S THE TROZAN IN WHICH YOU NEED TO HAVE IP ADDRESS OF THE VICTIM EVERYTIME .

2. REVERSE TROZAN- IT’S THE TROZAN IN WHICH YOU NEED TO HAVE IP ADDRESS OF THE VICTIM ONCE AS IT CHANGES DYNAMICALLY THERE WILL BE EFFECT IN OUR ID WHICH WE WANT(VICTIM’S IP)

Page 23: Gurukul work shop ppt

PRACTICAL DIRECT TROZAN ARE-

1. BEAST TROZAN V2.0

2. PRO RAT

3. TROKOZAN

REVERSE TROZAN

1. CYBER GATE

2. DARK COMMET.

Page 24: Gurukul work shop ppt

CONTINUE

BEAST TROZAN

1. HOST IP address ,port, built server

2. As server is build there will be file we will send it to victim there he clicks it .

3. And then we connect the victim by clicking on go beast now we can have ay change .

DARK COMMET

1.CLIENT 2.EDIT SERVER 3.SERVER MODULE 4.TEST

NETWORK 4.INSTALL MESSAGE 5.BUILD SERVER .

Page 25: Gurukul work shop ppt

Keyloggers (theory n practical) What is key logger?

It is a tool which keeps record of what ever you write on pc

or notepad file username password etc.

Two types of key logger

1.local key logger – family key logger.

2.remote key logger –general keylogger.

Page 26: Gurukul work shop ppt

SYSTEM HACKING & SECURITY

What is system hacking?

it’s the process in which we log into the victims computer

or any persons computer which is locked without

password or by changing the password.

there are 2 modes in which system hacking is done :-

1 online mode.

2 offline mode.

Page 27: Gurukul work shop ppt

PRACTICALS Online mode-

For windows XP –command prompt net user password

For windows 7 and above manage options local users

user administrator (change password)

Offline mode-

1. Hiren boot cd.

2. Kon boot cd.

Page 28: Gurukul work shop ppt

security

Use windows 8 version or Ubuntu.

Use bios password locker .

Use boot priority as from hard disk .

Change periodically your password.

Page 29: Gurukul work shop ppt

GOOGLE HACKING Who discovered Google?

Larry Page and Sergey Brin 1997 and deploy in 1998 from Stanford university.

Google ranking--> Its a page rank algorithm that rank the websites according to their genuine content and their relevance on stats incurring hits on the websites and popularity among the cyber space youth.

Google hacking is nothing but its advance method for searching required things in the internet. As Google advance searching platform gives us a refined search.

Page 30: Gurukul work shop ppt

PRACTICALS Define: computer.

Time: Gujarat.

Weather: America.

CCTV Camera Hacking with Google

DORK ----> "view/shtml”

Website Hacking with Google Hacks

XML Extraction attack

"app/etc./local.xml”

www.exploit-db.com -- to see more Google hacks.

Page 31: Gurukul work shop ppt

REVERSE ENGINEERING Reverse engineering is used to redevelop

something .

Required things:-

1. Debugger and

2. Application you want to crack.

Page 32: Gurukul work shop ppt

Practical Here am using Ollydbg as a debugger and

SMAC as Application to crack

Step 1 :Open SMAC and type anything in the registration key box. It will revert back with an error like "Invalid Registration ID".

STEP 2:Open Ollydbg. Go to File-->Attach Smac application Go to View-->All Executable Modules Click on SMAC.EXE It will open a new window with all the executable modules of SMAC

Page 33: Gurukul work shop ppt

Practical Step 3: Give a Right click, choose "search for

text” and then again right click on "All referenced text strings”. Try to find KEY of the application which will be like XXXX-XXXX-XXXX-XXXX Analyze each line. You will find "SMC2U-" is the starting key value for all editions of the software. Now find rest of the key.

Step 4:Key is 67BF-89E7-00E6-56C1-1F07. So the total key isSMC2U-67BF-89E7-00E6-56C1-1F07 Close OLLYDBG. Open SMAC and enter this key.

Page 34: Gurukul work shop ppt

Continue Step 5:Now you will get an error like "Invalid Registration

ID entered” Now do the same thing as previous we done to attach the SMAC and viewing executable modules and search for text "Invalid Registration ID entered”. You will find that string 4 times. Now we will terminate the process by changing the address of "Invalid Registration ID entered" to "Product has been successfully registered". The address of the "Product has been successfully registered" is 004874EF.First we have to double click on the "Invalid Registration ID entered" row it will open a new window.

Step 6:Select or click on "Invalid Registration ID entered” and then press Space. Replace the text in the box with JMP 004874EF. Now click on Assemble and then cancel It will terminate the process and will jump to success method. Do the same thing for another 3 "Invalid Registration ID entered".

Page 35: Gurukul work shop ppt

continue Step 7:After changing the address now you have

to right click on the window opened and click on Copy to executable" -->"All Modifications” Again a new window will come up. Right click again and "save file" Give any name to the name.

Step 8: Now open the file it will show you a message "This product has been modified and will shut down” Now again open Ollydbg do the same process find for the text "This product has been modified and will shut down "After finding right click on that find any JMP statement in the Assembly code. If you find JE then convert it to JNE and vice versa.

Page 36: Gurukul work shop ppt

Continue Step 9:You will find the JE on the top of "This

product has been modified and will shut down" statement and select it and press Space bar. Now change the JE 004660CE to JNE 004660CE. Save the file as we did above. Now open the file give reg id as SMC2U-anything you want you will get a success message.

Page 37: Gurukul work shop ppt

Practical(to crack WinRAR) Download WinRAR (trial version)

Download resource hacker.

1. Open file winRAR.exe dialoguereminder1033delete resourcesave the filecrack folderwinrar.exenow copy that new exe file to original folder of WinRAR replace original file with cracker file

So now your WinRAR is there for lifetime

Page 38: Gurukul work shop ppt

MOBILE HACKING AND BLUETOOTH HACKING

Mobile hacking actually means attacks on operating system of mobile phones and also methods to track a mobile handset.

For android phone :-

Rooting your android phone is getting its super user rights with it you can have permissions to install custom software, increase battery life etc.

For iPhone's its jail breaking its similar to rooting

Page 39: Gurukul work shop ppt

practical's ROOTING of ANDROID phone

Step 1:turn on USB DEBUGGING in your phone

Step 2 :download unlock root from its official website

http://www.unlockroot.com

Now just open the unlock Root application by double clicking on the runnable file

Connect the phone to computer through usb cable and your phone will be detected automatically

Now click on root and your phone will be rooted and it will ask to install power saver application and finally it will be ask to reboot your phone reboot it .

Page 40: Gurukul work shop ppt

continue Jail braking in IPHONE :-

Open http//www.jailbreakme.com on your safari iphone4 browsers

As full page loads slide your finger on “slide to jailbreak”

After few minutes phone will be getting jailbreak and a icon would appear cydia icon click on cydia

Here you click on first time user it will take time for loading click on sources on next screen and click on edit button

Cydia buttons will be changed you have to choose add ,keep in mind you are connected to internet ,now select version of AppSync.

Page 41: Gurukul work shop ppt

TRACING A MOBILE NUMBER Step 1:go to www.way2sms.com

Register yourself there and then on right hand side you will see option find mobile location

Just feed the number and you will get the location and company of the mobile no.

Another website is also there its indiatrace.com

Page 42: Gurukul work shop ppt

Bluetooth hacking Go to www.hack.pt.tp

Download super Bluetooth hack v 1.7

And then install on your java supported phone

And then follow accordingly as shown in video.

Page 43: Gurukul work shop ppt

STEGNOGRAPHY

It is science of hiding information.

It is hiding text files in pictures audio mp3 files ,video files.

Basically used by terrorist in 9/11 attacks on USA

Page 44: Gurukul work shop ppt

Practical First make a notepad file and save as

“secret.txt”

And next we should have pictures any image. Jpg

Now go to command prompt type

copy/b image.Jpg+secret.txt secretimage.jpg

1 file copied (it’s a way in command prompt)

Using GUI we use Stool which accepts only bmp image file

Page 45: Gurukul work shop ppt

FIREWALLS Firewall in computer terms can be defined as the

gatekeeper which checks the genuine of every data packet coming and going out from the computer. Mainly it is deployed to protect our computer from external attacks ,like malicious URL attacks, remote exploits like netapi, viruses etc.

Company Colleges Restrictions

Establishing ID

Establishing UTMs

Establishing Firewalls

Page 46: Gurukul work shop ppt

Practicals 1. Software Firewall: can be defined as an

application software which is going to be installed on windows or any other operating system. And then start its scanning and protection mechanism.

Top software firewalls

1. Zone Alarm Firewall 2.Viper Internet Security 2013

*Limitation of Software Firewall*

can easily be corrupted and infected

- Unable to protect servers and other OS from zero day attacks

Page 47: Gurukul work shop ppt

practical 2. Hardware Firewall: can be defined as a piece

of hardware that can be deployed in the organization to protect it from external as well as internal attacks. As its a piece of hardware its always comes into a read only rom chip that can not be easily infected by any virus or exploit.

Hardware Firewalls Available

1. Juniper Hardware Firewall (UTM)unified threat mgmt. system.

2. Nebero ( Anti-Porn)

3. Cyberom (Indian Company Ahmedabad, Client)

Page 48: Gurukul work shop ppt

Set up a free firewall Name –open DNS

Website Control Panel: www.opendns.com

Support: Servers, Windows, LAN and MAN up to 5k users.

Deployment: For Personal PC, For LAN Router, For

College University and organization etc. etc.

Page 49: Gurukul work shop ppt

WEBSITE HACKING What is website?

Websites can be defined as a platform to present information about a company, person, organization etc. etc.

Web site are of two types

1. Static Websites: Static Websites can be defined as the websites which are not driven by a proper database and maximum all static websites are developed in HTML technology with almost rare response feature from the end these website are not having any control panel. they are mostly driven through TP clients connected to the hosting server.

Page 50: Gurukul work shop ppt

Continue

2. Dynamic Websites: These websites can be defined as the websites having large number of database installed and also have features to insert new data, fetch new data, delete the data etc. etc. These websites have their own control panels from which the admin do change the settings as per required. It has properties like : Read Write Delete Insert etc. etc. which are not available in Static websites. Dynamic Websites uses databases like: MY SQL , SQL SERVER , ORACLE etc.

Parts of Web Application

Front Hand : From where user fills the data and when clicks on submit the data goes to the database.

Backhand: is the database where the requested data is being stored.

Page 51: Gurukul work shop ppt

Continue SQL ( Structured Query Language)

Its a technology that able to get the data from the front hand and stored the data into the backhand And when required do the vice versa.

Admin Login Page

The page from where the administrator enters into the control panel of the website and do the need fully changes.

"adminlogin.php" "admin/login.php" "administrator.php" "login/admin.php"

"adminlogin.asp" "admin/login.asp" "adminstrator.asp" "login/admin.asp"

"adminlogin.aspx" "admin/login.aspx" "adminstrator.aspx" "login/admin.aspx"

Page 52: Gurukul work shop ppt

Continue When u find admin age then u need to enter

username password

Write 'or' '=’ in user Name n password Field

Use proxies while hacking

If time Left i Will teach You error based SQL injection and xss vulnérabilités

Page 53: Gurukul work shop ppt

BONUS (Wi-Fi cracking)

What is WI-FI hacking?

It is cracking wireless routers and connections which are available but are WEP WPA WPA-2 secured .

Requirement_

1. backtrack 5R1

2. ATHERNO ADAPTOR AS WIRELESS CARD

Go to exploitation tool gerix Wi-Fi cracker through this u can crack your Wi-Fi

Page 54: Gurukul work shop ppt

QUERIES

For any enquires & questions contact on

Facebook-https://www.facebook.com/rajan.khandelwal.98

Gmail- http://[email protected]

My WEBSITE-officialrajankhandelwal01.weebly.com

On whatsapp only ques 9414463477

YOU can follow me on TWITTER-

AND MR SACHIN PUNIYA

Sachinpuniya.blogspot.com

Facebook-https://www.facebook.com/sachin.puniya


Recommended