COMPUTER SECURITY
  A Hacker’s Perspective

         Presented by

     Kunal Mohanty
LEGAL DISCLAIMER
Any actions and or activities related to the material contained within this presentation is
     solely y...
HACKING

Process of breaking into systems for:


1.   Personal or Commercial Gains
2.   Malicious Intent – Causing severe ...
STATISTICS




Presented by : Kunal Mohanty   07-06-2010
TYPES OF INCIDENTS




   Presented by : Kunal Mohanty   07-06-2010
SOME TRADITIONAL WAYS
FOOTPRINTING




 Presented by : Kunal Mohanty   07-06-2010
FOOTPRINTING

     PING



TRACEROUTE




              Presented by : Kunal Mohanty   07-06-2010
SCANNING AND ENUMERATION
NMAP




       Presented by : Kunal Mohanty   07-06-2010
SCANNING AND ENUMERATION
SUPERSCAN




            Presented by : Kunal Mohanty   07-06-2010
SYSTEM HACKING
SNADBOY




          Presented by : Kunal Mohanty   07-06-2010
SYSTEM HACKING
KEYLOGGER




            Presented by : Kunal Mohanty   07-06-2010
TROJANS AND BACKDOORS
NETBUS




         Presented by : Kunal Mohanty   07-06-2010
TROJANS AND BACKDOORS
SUBSEVEN




           Presented by : Kunal Mohanty   07-06-2010
SNIFFERS
SMAC




       Presented by : Kunal Mohanty   07-06-2010
SNIFFERS
ETHEREAL




           Presented by : Kunal Mohanty   07-06-2010
WEB BASED PASSWORD CRACKING
  CAIN AND ABEL




             Presented by : Kunal Mohanty   07-06-2010
WEB BASED PASSWORD CRACKING
  BRUTUS




           Presented by : Kunal Mohanty   07-06-2010
PHISHING ATTACKS




   Presented by : Kunal Mohanty   07-06-2010
THANKYOU
Upcoming SlideShare
Loading in …5
×

Computer Security -A Hacker's Perspective

1,754 views
1,673 views

Published on

A sneak peek at tools used for level 1 hacks.

Published in: Technology, News & Politics
0 Comments
5 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,754
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
108
Comments
0
Likes
5
Embeds 0
No embeds

No notes for slide

Computer Security -A Hacker's Perspective

  1. 1. COMPUTER SECURITY A Hacker’s Perspective Presented by Kunal Mohanty
  2. 2. LEGAL DISCLAIMER Any actions and or activities related to the material contained within this presentation is solely your responsibility.The misuse of the information in this presentation can result in criminal charges brought against the persons in question. The author will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law. This presentation contains materials that can be potentially damaging or dangerous. If you do not fully understand something on this presentation , then please IGNORE! Refer to the laws in your province/country before accessing, using,or in any other way utilizing these materials.These materials are for educational and research purposes only.Do not attempt to violate the law with anything contained here. Neither the author of this material, or anyone else affiliated in any way, is going to accept responsibility for your actions. Any linked sites or references are not under the control of author and the author is not responsible for the contents of any linked site or any link contained in a linked site, or any changes or updates to such sites. I am providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement by me. Presented by : Kunal Mohanty 07-06-2010
  3. 3. HACKING Process of breaking into systems for: 1. Personal or Commercial Gains 2. Malicious Intent – Causing severe damage to Information & Assets Presented by : Kunal Mohanty 07-06-2010
  4. 4. STATISTICS Presented by : Kunal Mohanty 07-06-2010
  5. 5. TYPES OF INCIDENTS Presented by : Kunal Mohanty 07-06-2010
  6. 6. SOME TRADITIONAL WAYS
  7. 7. FOOTPRINTING Presented by : Kunal Mohanty 07-06-2010
  8. 8. FOOTPRINTING PING TRACEROUTE Presented by : Kunal Mohanty 07-06-2010
  9. 9. SCANNING AND ENUMERATION NMAP Presented by : Kunal Mohanty 07-06-2010
  10. 10. SCANNING AND ENUMERATION SUPERSCAN Presented by : Kunal Mohanty 07-06-2010
  11. 11. SYSTEM HACKING SNADBOY Presented by : Kunal Mohanty 07-06-2010
  12. 12. SYSTEM HACKING KEYLOGGER Presented by : Kunal Mohanty 07-06-2010
  13. 13. TROJANS AND BACKDOORS NETBUS Presented by : Kunal Mohanty 07-06-2010
  14. 14. TROJANS AND BACKDOORS SUBSEVEN Presented by : Kunal Mohanty 07-06-2010
  15. 15. SNIFFERS SMAC Presented by : Kunal Mohanty 07-06-2010
  16. 16. SNIFFERS ETHEREAL Presented by : Kunal Mohanty 07-06-2010
  17. 17. WEB BASED PASSWORD CRACKING CAIN AND ABEL Presented by : Kunal Mohanty 07-06-2010
  18. 18. WEB BASED PASSWORD CRACKING BRUTUS Presented by : Kunal Mohanty 07-06-2010
  19. 19. PHISHING ATTACKS Presented by : Kunal Mohanty 07-06-2010
  20. 20. THANKYOU

×