COMPUTER  SECURITY<br />By:Satyajit Das<br />                8thSem<br />GITA,bbsr.  <br />
CONTENTS<br /><ul><li> What is Computer Security?
 What is Hacking?
 Methods and Prevention.
 Tools
 Trojans
 Virus
 RATS
 FUDS
 Backdoors
 E-mail  Security
 Demos
 How to increase  security of a Computer?</li></li></ul><li>What  is  Computer  Security?<br />The terms computer system s...
WHAT IS HACKING?<br />The meaning associated to the word 'hacking' is a positive one, and it mainly refers to the ability ...
Upcoming SlideShare
Loading in...5
×

Computer Security

1,532

Published on

Published in: Education, Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,532
On Slideshare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
0
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Transcript of "Computer Security"

  1. 1. COMPUTER SECURITY<br />By:Satyajit Das<br /> 8thSem<br />GITA,bbsr. <br />
  2. 2. CONTENTS<br /><ul><li> What is Computer Security?
  3. 3. What is Hacking?
  4. 4. Methods and Prevention.
  5. 5. Tools
  6. 6. Trojans
  7. 7. Virus
  8. 8. RATS
  9. 9. FUDS
  10. 10. Backdoors
  11. 11. E-mail Security
  12. 12. Demos
  13. 13. How to increase security of a Computer?</li></li></ul><li>What is Computer Security?<br />The terms computer system security, means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively.<br />
  14. 14. WHAT IS HACKING?<br />The meaning associated to the word 'hacking' is a positive one, and it mainly refers to the ability and desire to understand the inner mechanisms through which different components in the ICT world (typically computer programs) work. For this reason, even regular computer programmers are sometimes referred to as hackers.<br />HACKERS<br />WHITE HAT<br />GREY HAT<br />BLACK HAT<br />
  15. 15. METHODS<br />Brute Force<br />Dictionary Attack<br />Social Engineering<br />Forgot Password Attack<br />Phishing<br />Denial of Service Attack(DOS)<br />SQL Injection Attack<br />ARP Poison Routing<br />Attack using Tools<br />
  16. 16. PHISHING<br />GET THE SPOOF/FAKE PAGE<br />.PHP<br />SEARCH THE “ACTION =” FOR LOGIN<br />ASSIGN “.PHP” FILE TO IT<br />.HTML<br />UPLOAD THE FILES TO WEB SPACE<br />GET THE LINK OF THE HTML FILE<br />SEND THE LINK TO VICTIM & WAIT FOR THE LOG FILE<br />
  17. 17. TOOLS<br />KEYLOGGERS<br />MAIL BOMBER<br />RATS<br />CRYPTERS<br />BINDERS<br />JOINERS<br />CAIN & ABEL<br />SNIFFERS<br />SUPER PHISHER<br />ICON CHANGER<br />SQLiHELPER V 2.7<br />VIRUS GENERATOR<br />.BAT TO .EXE CONVERTER<br />SANDBOXIE<br />
  18. 18. Trojans<br />"A Trojan horse  also called as TROJAN, is non-self replicating  malware  that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system. The term is derived from the Trojan Horse story in Greek mythology."<br /><ul><li>Use of the machine as part of a botnet (i.e. to perform spamming or to perform Distributed Denial-of-service(DDoS) attacks).
  19. 19. Data theft(e.g. passwords, credit card information, etc.).
  20. 20. Installation of software (including other malware).
  21. 21. Downloading or uploading of files.
  22. 22. Modification or deletion of files.
  23. 23. Keystroke logging.
  24. 24. Viewing the user's screen.
  25. 25. Wasting computer storage space.</li></li></ul><li>How to make a FUD SERVER<br />USE IT ON OWN COMPUTER<br />CLIENT<br />TROJAN<br />SERVER<br />BINDING<br />CHANGE ICON<br />SCAN WITH novirusthanks.com<br />FUD<br />SEND TO VICTIM<br />
  26. 26. VIRUS<br />A virus is an entity that uses the resources of the host to spread and reproduce itself, usually without informed operator action. Let us stress here the word “informed”. A virus cannot run completely of its own volition. The computer user must always take some action , even if it is only to turn the computer on. This is the major strength of a virus: it uses normal computer operations to do its dirty work, and so there is no single unique characteristic that can be used to identify a previously unknown viral program.<br />VIRUS<br />INFECTION<br />PAYLOAD<br />TRIGGER<br />
  27. 27. REMOTE ADMISTRATION TOOLS<br />A Remote Administration Tool (known more commonly on the Internet as a RAT) is used to remotely connect and manage a single or multiple computers with a variety of tools, such as:<br />Screen/camera capture or control<br />File management (download/upload/execute/etc.)<br />Shell control (usually piped from command prompt)<br />Computer control (power off/on/log off)<br />Registry management (query/add/delete/modify)<br />Other product-specific function<br />
  28. 28. FULLY UNDETECABLE<br />When a system is to be attacked by a Trojan or R.A.T then the server part of it is made fully undectable by a crypter with the recent stub so that it can not be detected by the antivirus of the victim.By doing this the server of the trojan or R.A.T can escape from the antivirus and can be runned at the background.<br />After accomplishing this one can check the authencity with the help of multiple antivirus engine ie. www.novirusthanks.com<br />
  29. 29. CONCLUSION<br />Hacking has a positive sense as compared to cracking.Knowing the tricks of hacking not only make one equiped with it but also make make the user maintain his/her security when working online.The hacking triks described above are for educational purpose not to harm anyone.<br />
  30. 30. THANK YOU<br />

×