Ethical hacking
-
Upload
shivam-kushwaha -
Category
Education
-
view
2.085 -
download
5
description
Transcript of Ethical hacking
![Page 1: Ethical hacking](https://reader033.fdocuments.us/reader033/viewer/2022050722/54b5ec1a4a795949388b45f0/html5/thumbnails/1.jpg)
ETHICAL HACKING
Presented By: Shivam Kushwaha
CS-3rd Year
![Page 2: Ethical hacking](https://reader033.fdocuments.us/reader033/viewer/2022050722/54b5ec1a4a795949388b45f0/html5/thumbnails/2.jpg)
CONTENTS
Concept of Ethical Hacking Hacker Email Hacking Windows Hacking Trojan
![Page 3: Ethical hacking](https://reader033.fdocuments.us/reader033/viewer/2022050722/54b5ec1a4a795949388b45f0/html5/thumbnails/3.jpg)
1. CONCEPT OF ETHICAL HACKING
Ethical Hacking is testing the resources for a good cause and for the betterment of technology.
Technically Ethical Hacking means penetration testing which is focused on Securing and Protecting IT Systems.
![Page 4: Ethical hacking](https://reader033.fdocuments.us/reader033/viewer/2022050722/54b5ec1a4a795949388b45f0/html5/thumbnails/4.jpg)
1. CONCEPT OF ETHICAL HACKING
Introduction to Hacking:- Its all about showing your Expertize.
![Page 5: Ethical hacking](https://reader033.fdocuments.us/reader033/viewer/2022050722/54b5ec1a4a795949388b45f0/html5/thumbnails/5.jpg)
2. HACKER
Hacker is a word that has twomeanings: who likes to play with Software or Electronic Systems.
Hackers enjoy Exploring and Learning how Computer
systems operate.
And second, who maliciously breaks into systems , for personal
gain. Technically, these criminals are Crackers as Criminal
Hackers.
![Page 6: Ethical hacking](https://reader033.fdocuments.us/reader033/viewer/2022050722/54b5ec1a4a795949388b45f0/html5/thumbnails/6.jpg)
TYPES OF HACKER
White Hat Hacker, Who perform Ethical Hacking. They are Security Professional.
Black Hat Hacker, Perform Unehthical Hacking. They are the Criminals hackers or Crackers
who use their skills and knowledge for illegal purpose.
![Page 7: Ethical hacking](https://reader033.fdocuments.us/reader033/viewer/2022050722/54b5ec1a4a795949388b45f0/html5/thumbnails/7.jpg)
3.EMAIL HACKING
How Email works ? Email Travelling Path.
USER xyzUSER abc
![Page 8: Ethical hacking](https://reader033.fdocuments.us/reader033/viewer/2022050722/54b5ec1a4a795949388b45f0/html5/thumbnails/8.jpg)
EMAIL HACKING(CONT..)
Fake mail ( Using PHP Script)
![Page 9: Ethical hacking](https://reader033.fdocuments.us/reader033/viewer/2022050722/54b5ec1a4a795949388b45f0/html5/thumbnails/9.jpg)
EMAIL HACKING(CONT..)
Proving a Fake Email
![Page 10: Ethical hacking](https://reader033.fdocuments.us/reader033/viewer/2022050722/54b5ec1a4a795949388b45f0/html5/thumbnails/10.jpg)
EMAIL HACKING(CONT..)
Email Bombing
Email Spamming
![Page 11: Ethical hacking](https://reader033.fdocuments.us/reader033/viewer/2022050722/54b5ec1a4a795949388b45f0/html5/thumbnails/11.jpg)
EMAIL HACKING(CONT..)
Email Password Hacking Loose Security answers Phishing Key Loggers
![Page 12: Ethical hacking](https://reader033.fdocuments.us/reader033/viewer/2022050722/54b5ec1a4a795949388b45f0/html5/thumbnails/12.jpg)
EMAIL HACKING(CONT..)
Phishing… Requirements:- We need a PHP Script …(test.php)
![Page 13: Ethical hacking](https://reader033.fdocuments.us/reader033/viewer/2022050722/54b5ec1a4a795949388b45f0/html5/thumbnails/13.jpg)
EMAIL HACKING(CONT..)
Phishing… We need a Fake Login page with Some changes in Source Code …(ServiceLogin.html)
![Page 14: Ethical hacking](https://reader033.fdocuments.us/reader033/viewer/2022050722/54b5ec1a4a795949388b45f0/html5/thumbnails/14.jpg)
EMAIL HACKING(CONT..)
Phishing… Upload Both files ServiceLogin.html and test.php on any Webhosting Server.
![Page 16: Ethical hacking](https://reader033.fdocuments.us/reader033/viewer/2022050722/54b5ec1a4a795949388b45f0/html5/thumbnails/16.jpg)
EMAIL HACKING(CONT..)
File Manager >hacked.txt
![Page 17: Ethical hacking](https://reader033.fdocuments.us/reader033/viewer/2022050722/54b5ec1a4a795949388b45f0/html5/thumbnails/17.jpg)
EMAIL HACKING(CONT..)
Prevention against Phishing. Read email carefully. Watch the link carefully before you clicking. During logged in session do not use any
suspicious link. Always check the URL before Signing In your a/c.
![Page 18: Ethical hacking](https://reader033.fdocuments.us/reader033/viewer/2022050722/54b5ec1a4a795949388b45f0/html5/thumbnails/18.jpg)
EMAIL HACKING(CONT..)
Keyloggers
Hardware Keylogger
Software Keylogger
![Page 19: Ethical hacking](https://reader033.fdocuments.us/reader033/viewer/2022050722/54b5ec1a4a795949388b45f0/html5/thumbnails/19.jpg)
EMAIL HACKING(CONT..)
Some Famous Keyloggers Actual Spy Perfect Keylogger Family Keylogger Home Keylogger Soft Central Keylogger Adramax Keylogger
![Page 20: Ethical hacking](https://reader033.fdocuments.us/reader033/viewer/2022050722/54b5ec1a4a795949388b45f0/html5/thumbnails/20.jpg)
4.WINDOWS HACKING AND SECURITY
Security architecture of Windows LSA(local Security Authority) SAM (Security Account Manager)
LSAUsernam
ePassword
SAM
Authentication Package
Logon Dialog
Key (In Hash Format)User a/c
database
Query
Returns user’s SID
![Page 21: Ethical hacking](https://reader033.fdocuments.us/reader033/viewer/2022050722/54b5ec1a4a795949388b45f0/html5/thumbnails/21.jpg)
4.WINDOWS HACKING AND SECURITY
Security architecture of Windows SAM (Security Account Manager) Location of a SAM file C:\Windows\System32\Config
![Page 22: Ethical hacking](https://reader033.fdocuments.us/reader033/viewer/2022050722/54b5ec1a4a795949388b45f0/html5/thumbnails/22.jpg)
4.WINDOWS HACKING AND SECURITY Windows User Account Attacks
To check the User Account net user
To Add a New User Account net user username password /add
To Delete a User Account net user username /delete
To change the Password of User Account net user username *
.
![Page 23: Ethical hacking](https://reader033.fdocuments.us/reader033/viewer/2022050722/54b5ec1a4a795949388b45f0/html5/thumbnails/23.jpg)
4.WINDOWS HACKING AND SECURITY
Windows User Account Attacks Brute-force Method Rainbow Table Attack(Oph Crack)
![Page 24: Ethical hacking](https://reader033.fdocuments.us/reader033/viewer/2022050722/54b5ec1a4a795949388b45f0/html5/thumbnails/24.jpg)
4.WINDOWS HACKING AND SECURITY
Creating a Backdoor in window. Sticky key Backdoor
![Page 25: Ethical hacking](https://reader033.fdocuments.us/reader033/viewer/2022050722/54b5ec1a4a795949388b45f0/html5/thumbnails/25.jpg)
4.WINDOWS HACKING AND SECURITY
Steganography
Performing System Security Application Monitoring Process Monitoring
![Page 26: Ethical hacking](https://reader033.fdocuments.us/reader033/viewer/2022050722/54b5ec1a4a795949388b45f0/html5/thumbnails/26.jpg)
5 .TROJANS
o What is Trojan?
o Different Types of Trojanso Remote Administration Trojans
o Data Stealing Trojans
o Security Disabler Trojan
![Page 27: Ethical hacking](https://reader033.fdocuments.us/reader033/viewer/2022050722/54b5ec1a4a795949388b45f0/html5/thumbnails/27.jpg)
5 .TROJANS
o Some Famous Trojano Bo NetBuso ProRato Sub7
east
![Page 28: Ethical hacking](https://reader033.fdocuments.us/reader033/viewer/2022050722/54b5ec1a4a795949388b45f0/html5/thumbnails/28.jpg)
![Page 29: Ethical hacking](https://reader033.fdocuments.us/reader033/viewer/2022050722/54b5ec1a4a795949388b45f0/html5/thumbnails/29.jpg)
Ask a Question ?