• Save
Computer Security
Upcoming SlideShare
Loading in...5
×
 

Computer Security

on

  • 1,746 views

 

Statistics

Views

Total Views
1,746
Views on SlideShare
1,453
Embed Views
293

Actions

Likes
2
Downloads
0
Comments
0

9 Embeds 293

http://www.securityhunk.com 257
http://compufreaks.blogspot.com 19
http://0dl.blogspot.com 8
http://translate.googleusercontent.com 3
http://www.0dl.blogspot.com 2
http://static.slidesharecdn.com 1
http://0dl.blogspot.in 1
http://0dl.blogspot.co.uk 1
http://www.securityhunk.in 1
More...

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Computer Security Computer Security Presentation Transcript

  • COMPUTER SECURITY
    By:Satyajit Das
    8thSem
    GITA,bbsr.
  • CONTENTS
    • What is Computer Security?
    • What is Hacking?
    • Methods and Prevention.
    • Tools
    • Trojans
    • Virus
    • RATS
    • FUDS
    • Backdoors
    • E-mail Security
    • Demos
    • How to increase security of a Computer?
  • What is Computer Security?
    The terms computer system security, means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively.
  • WHAT IS HACKING?
    The meaning associated to the word 'hacking' is a positive one, and it mainly refers to the ability and desire to understand the inner mechanisms through which different components in the ICT world (typically computer programs) work. For this reason, even regular computer programmers are sometimes referred to as hackers.
    HACKERS
    WHITE HAT
    GREY HAT
    BLACK HAT
  • METHODS
    Brute Force
    Dictionary Attack
    Social Engineering
    Forgot Password Attack
    Phishing
    Denial of Service Attack(DOS)
    SQL Injection Attack
    ARP Poison Routing
    Attack using Tools
  • PHISHING
    GET THE SPOOF/FAKE PAGE
    .PHP
    SEARCH THE “ACTION =” FOR LOGIN
    ASSIGN “.PHP” FILE TO IT
    .HTML
    UPLOAD THE FILES TO WEB SPACE
    GET THE LINK OF THE HTML FILE
    SEND THE LINK TO VICTIM & WAIT FOR THE LOG FILE
  • TOOLS
    KEYLOGGERS
    MAIL BOMBER
    RATS
    CRYPTERS
    BINDERS
    JOINERS
    CAIN & ABEL
    SNIFFERS
    SUPER PHISHER
    ICON CHANGER
    SQLiHELPER V 2.7
    VIRUS GENERATOR
    .BAT TO .EXE CONVERTER
    SANDBOXIE
  • Trojans
    "A Trojan horse  also called as TROJAN, is non-self replicating  malware  that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system. The term is derived from the Trojan Horse story in Greek mythology."
    • Use of the machine as part of a botnet (i.e. to perform spamming or to perform Distributed Denial-of-service(DDoS) attacks).
    • Data theft(e.g. passwords, credit card information, etc.).
    • Installation of software (including other malware).
    • Downloading or uploading of files.
    • Modification or deletion of files.
    • Keystroke logging.
    • Viewing the user's screen.
    • Wasting computer storage space.
  • How to make a FUD SERVER
    USE IT ON OWN COMPUTER
    CLIENT
    TROJAN
    SERVER
    BINDING
    CHANGE ICON
    SCAN WITH novirusthanks.com
    FUD
    SEND TO VICTIM
  • VIRUS
    A virus is an entity that uses the resources of the host to spread and reproduce itself, usually without informed operator action. Let us stress here the word “informed”. A virus cannot run completely of its own volition. The computer user must always take some action , even if it is only to turn the computer on. This is the major strength of a virus: it uses normal computer operations to do its dirty work, and so there is no single unique characteristic that can be used to identify a previously unknown viral program.
    VIRUS
    INFECTION
    PAYLOAD
    TRIGGER
  • REMOTE ADMISTRATION TOOLS
    A Remote Administration Tool (known more commonly on the Internet as a RAT) is used to remotely connect and manage a single or multiple computers with a variety of tools, such as:
    Screen/camera capture or control
    File management (download/upload/execute/etc.)
    Shell control (usually piped from command prompt)
    Computer control (power off/on/log off)
    Registry management (query/add/delete/modify)
    Other product-specific function
  • FULLY UNDETECABLE
    When a system is to be attacked by a Trojan or R.A.T then the server part of it is made fully undectable by a crypter with the recent stub so that it can not be detected by the antivirus of the victim.By doing this the server of the trojan or R.A.T can escape from the antivirus and can be runned at the background.
    After accomplishing this one can check the authencity with the help of multiple antivirus engine ie. www.novirusthanks.com
  • CONCLUSION
    Hacking has a positive sense as compared to cracking.Knowing the tricks of hacking not only make one equiped with it but also make make the user maintain his/her security when working online.The hacking triks described above are for educational purpose not to harm anyone.
  • THANK YOU