Uploaded on

~This is The PPT On Ethical Hacking is Presented By Me and only for educational Purpose . …

~This is The PPT On Ethical Hacking is Presented By Me and only for educational Purpose .
Topic Included:
1. Intro Of Ethical Hacking*
2.Types Of Hacker*
3.Fake Mail ans Spam Concept*
4.Windows Hacking*
5.Trojan Horse*
6.SAM Security on Windows OS*

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
  • I Got The Full File, I Just Wanna Share to You Guyszz.. It's Working You Can The Download The Full File + Instructions Here ://http://gg.gg/setupexe
    Are you sure you want to
    Your message goes here
  • You Can Free Download Latest & Working -> http://gg.gg/6wgz
    Are you sure you want to
    Your message goes here
No Downloads

Views

Total Views
2,047
On Slideshare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
262
Comments
2
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. ETHICAL HACKING Presented By: Shivam Kushwaha CS-3rd Year
  • 2. CONTENTS  Concept of Ethical Hacking  Hacker  Email Hacking  Windows Hacking  Trojan
  • 3. 1. CONCEPT OF ETHICAL HACKING  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration testing which is focused on Securing and Protecting IT Systems.
  • 4. 1. CONCEPT OF ETHICAL HACKING  Introduction to Hacking:-  Its all about showing your Expertize.
  • 5. 2. HACKER Hacker is a word that has two meanings:  who likes to play with Software or Electronic Systems.  Hackers enjoy Exploring and Learning how Computer systems operate. And second,  who maliciously breaks into systems , for personal gain.  Technically, these criminals are Crackers as Criminal Hackers.
  • 6. TYPES OF HACKER White Hat Hacker,  Who perform Ethical Hacking.  They are Security Professional. Black Hat Hacker,  Perform Unehthical Hacking.  They are the Criminals hackers or Crackers who use their skills and knowledge for illegal purpose.
  • 7. 3.EMAIL HACKING  How Email works ?  Email Travelling Path. USER xyzUSER abc
  • 8. EMAIL HACKING(CONT..)  Fake mail ( Using PHP Script)
  • 9. EMAIL HACKING(CONT..)  Proving a Fake Email
  • 10. EMAIL HACKING(CONT..)  Email Bombing  Email Spamming
  • 11. EMAIL HACKING(CONT..) Email Password Hacking  Loose Security answers  Phishing  Key Loggers
  • 12. EMAIL HACKING(CONT..)  Phishing… Requirements:-  We need a PHP Script …(test.php)
  • 13. EMAIL HACKING(CONT..)  Phishing…  We need a Fake Login page with Some changes in Source Code …(ServiceLogin.html)
  • 14. EMAIL HACKING(CONT..)  Phishing…  Upload Both files ServiceLogin.html and test.php on any Webhosting Server.
  • 15. EMAIL HACKING(CONT..)  Phishing… username@gmail.com *******
  • 16. EMAIL HACKING(CONT..)  File Manager >hacked.txt
  • 17. EMAIL HACKING(CONT..)  Prevention against Phishing.  Read email carefully.  Watch the link carefully before you clicking.  During logged in session do not use any suspicious link.  Always check the URL before Signing In your a/c.
  • 18. EMAIL HACKING(CONT..)  Keyloggers  Hardware Keylogger  Software Keylogger
  • 19. EMAIL HACKING(CONT..) Some Famous Keyloggers  Actual Spy  Perfect Keylogger  Family Keylogger  Home Keylogger  Soft Central Keylogger  Adramax Keylogger
  • 20. 4.WINDOWS HACKING AND SECURITY  Security architecture of Windows  LSA(local Security Authority)  SAM (Security Account Manager) LSAUsername Password SAM Authentication Package Logon Dialog Key (In Hash Format) User a/c databas e Query Returns user’s SID
  • 21. 4.WINDOWS HACKING AND SECURITY  Security architecture of Windows  SAM (Security Account Manager) Location of a SAM file C:WindowsSystem32Config
  • 22. 4.WINDOWS HACKING AND SECURITY  Windows User Account Attacks  To check the User Account net user  To Add a New User Account net user username password /add  To Delete a User Account net user username /delete  To change the Password of User Account net user username * .
  • 23. 4.WINDOWS HACKING AND SECURITY  Windows User Account Attacks  Brute-force Method  Rainbow Table Attack(Oph Crack)
  • 24. 4.WINDOWS HACKING AND SECURITY  Creating a Backdoor in window.  Sticky key Backdoor
  • 25. 4.WINDOWS HACKING AND SECURITY  Steganography  Performing System Security  Application Monitoring  Process Monitoring
  • 26. 5 .TROJANS o What is Trojan? o Different Types of Trojans o Remote Administration Trojans o Data Stealing Trojans o Security Disabler Trojan
  • 27. 5 .TROJANS o Some Famous Trojan o B o NetBus o ProRat o Sub7 east
  • 28. Ask a Question ?