0
--By Anindya Roy<br />Sr. Manager – Tech Research<br />CyberMedia Labs<br />Are you Secure?<br />
Hack<br />A Hack is usually a technique used to subvert, misuse or cleverly change a program, gadget or mechanism in such ...
Hacking	<br />Unauthorized use, or attempts to circumvent or bypass the security mechanisms of an information system or ne...
Agenda<br />DDoS<br />Sniffing<br />Spoofing<br />Phishing/Spamming <br />Brute-force/Dictionary Attacks<br />Physical Sec...
DDoS<br />A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to m...
Sniffing<br />Promiscuous Sniffing: An Ethernet sniffer or wireless sniffer is computer software or computer hardware that...
How Sniffing works<br />
How Sniffing works<br />
Spoofing<br />Monkey in the Middle: is an attack in which an attacker is able to read, insert and modify at will, messages...
How Spoofing works<br />Mac 3<br />Switch<br />Switches IP-ARP Cache Table<br />Mac1: 192.168.0.1 -- 00:00:00:00:00:11<br ...
How Spoofing works<br />Mac 3<br />Switch<br />Switches IP-ARP Cache Table<br />Mac1: 192.168.0.1 -- 00:00:00:00:00:11<br ...
Phishing<br />The human Flaw: In computing, phishing is an attempt to criminally and fraudulently acquire sensitive inform...
I Am the next MS CIO! AM I? <br />
Physical Security<br />
Physical Security<br />
Questions<br />
Thanks<br />anindyar@cybermedia.co.in<br />anindyar.roy@gmail.com<br />Skype: anindyaroy29<br />Ph: 9811565558<br />
Upcoming SlideShare
Loading in...5
×

Are you Secure

326

Published on

how hacking works

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
326
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Are you Secure"

  1. 1. --By Anindya Roy<br />Sr. Manager – Tech Research<br />CyberMedia Labs<br />Are you Secure?<br />
  2. 2. Hack<br />A Hack is usually a technique used to subvert, misuse or cleverly change a program, gadget or mechanism in such a way as to change, or add to, its functionality.<br />Hack has several meanings in the technology and computer science fields: a clever or quick fix to a computer program problem; a clumsy or inelegant solution to a problem; or a modification of a program or device to give the user access to features that were otherwise unavailable to them.<br />From Wikipedia<br />
  3. 3. Hacking <br />Unauthorized use, or attempts to circumvent or bypass the security mechanisms of an information system or network<br />
  4. 4. Agenda<br />DDoS<br />Sniffing<br />Spoofing<br />Phishing/Spamming <br />Brute-force/Dictionary Attacks<br />Physical Security<br />
  5. 5. DDoS<br />A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it generally consists of the intensive, malicious efforts of a person or persons to prevent an Internet site or service from functioning efficiently or at all, temporarily or indefinitely. <br />
  6. 6.
  7. 7. Sniffing<br />Promiscuous Sniffing: An Ethernet sniffer or wireless sniffer is computer software or computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams flow across the network, the sniffer captures each packet and eventually decodes and analyzes its content according to the appropriate RFC or other specifications.<br />
  8. 8. How Sniffing works<br />
  9. 9. How Sniffing works<br />
  10. 10. Spoofing<br />Monkey in the Middle: is an attack in which an attacker is able to read, insert and modify at will, messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept messages going between the two victims.<br />
  11. 11. How Spoofing works<br />Mac 3<br />Switch<br />Switches IP-ARP Cache Table<br />Mac1: 192.168.0.1 -- 00:00:00:00:00:11<br />Mac2: 192.168.0.2 -- 00:00:00:00:00:22<br />Mac3: 192.168.0.3 -- 00:00:00:00:00:33<br />Mac 1<br />Mac 2<br />
  12. 12. How Spoofing works<br />Mac 3<br />Switch<br />Switches IP-ARP Cache Table<br />Mac1: 192.168.0.1 -- 00:00:00:00:00:11<br />Mac2: 192.168.0.2 -- 00:00:00:00:00:33<br />Mac3: 192.168.0.3 -- 00:00:00:00:00:22<br />Mac 1<br />Mac 2<br />
  13. 13. Phishing<br />The human Flaw: In computing, phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication. eBay, PayPal and online banks are common targets. Phishing is typically carried out by email or instant messaging<br />
  14. 14. I Am the next MS CIO! AM I? <br />
  15. 15. Physical Security<br />
  16. 16. Physical Security<br />
  17. 17. Questions<br />
  18. 18. Thanks<br />anindyar@cybermedia.co.in<br />anindyar.roy@gmail.com<br />Skype: anindyaroy29<br />Ph: 9811565558<br />
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×