ETHICAL HACKING
Presented By: Shivam Kushwaha
CS-3rd Year
CONTENTS
 Concept of Ethical Hacking
 Hacker
 Email Hacking
 Windows Hacking
 Trojan
1. CONCEPT OF ETHICAL HACKING
 Ethical Hacking is testing the resources for a good
cause and for the betterment of techno...
1. CONCEPT OF ETHICAL HACKING
 Introduction to Hacking:-
 Its all about showing your Expertize.
2. HACKER
Hacker is a word that has two
meanings:
 who likes to play with Software or Electronic Systems.
 Hackers enjoy...
TYPES OF HACKER
White Hat Hacker,
 Who perform Ethical Hacking.
 They are Security Professional.
Black Hat Hacker,
 Per...
3.EMAIL HACKING
 How Email works ?
 Email Travelling Path.
USER xyzUSER abc
EMAIL HACKING(CONT..)
 Fake mail ( Using PHP Script)
EMAIL HACKING(CONT..)
 Proving a Fake Email
EMAIL HACKING(CONT..)
 Email Bombing
 Email Spamming
EMAIL HACKING(CONT..)
Email Password Hacking
 Loose Security answers
 Phishing
 Key Loggers
EMAIL HACKING(CONT..)
 Phishing…
Requirements:-
 We need a PHP Script …(test.php)
EMAIL HACKING(CONT..)
 Phishing…
 We need a Fake Login page with Some
changes in Source Code …(ServiceLogin.html)
EMAIL HACKING(CONT..)
 Phishing…
 Upload Both files ServiceLogin.html
and test.php on any Webhosting Server.
EMAIL HACKING(CONT..)
 Phishing…
username@gmail.com
*******
EMAIL HACKING(CONT..)
 File Manager >hacked.txt
EMAIL HACKING(CONT..)
 Prevention against Phishing.
 Read email carefully.
 Watch the link carefully before you clickin...
EMAIL HACKING(CONT..)
 Keyloggers
 Hardware Keylogger
 Software Keylogger
EMAIL HACKING(CONT..)
Some Famous Keyloggers
 Actual Spy
 Perfect Keylogger
 Family Keylogger
 Home Keylogger
 Soft C...
4.WINDOWS HACKING AND SECURITY
 Security architecture of Windows
 LSA(local Security Authority)
 SAM (Security Account ...
4.WINDOWS HACKING AND SECURITY
 Security architecture of Windows
 SAM (Security Account Manager)
Location of a SAM file
...
4.WINDOWS HACKING AND SECURITY
 Windows User Account Attacks
 To check the User Account
net user
 To Add a New User Acc...
4.WINDOWS HACKING AND SECURITY
 Windows User Account Attacks
 Brute-force Method
 Rainbow Table Attack(Oph Crack)
4.WINDOWS HACKING AND SECURITY
 Creating a Backdoor in window.
 Sticky key Backdoor
4.WINDOWS HACKING AND SECURITY
 Steganography
 Performing System Security
 Application Monitoring
 Process Monitoring
5 .TROJANS
o What is Trojan?
o Different Types of Trojans
o Remote Administration Trojans
o Data Stealing Trojans
o Securi...
5 .TROJANS
o Some Famous Trojan
o B
o NetBus
o ProRat
o Sub7
east
Ask a Question ?
Ethical hacking
Upcoming SlideShare
Loading in...5
×

Ethical hacking

2,480

Published on

~This is The PPT On Ethical Hacking is Presented By Me and only for educational Purpose .
Topic Included:
1. Intro Of Ethical Hacking*
2.Types Of Hacker*
3.Fake Mail ans Spam Concept*
4.Windows Hacking*
5.Trojan Horse*
6.SAM Security on Windows OS*

2 Comments
2 Likes
Statistics
Notes
  • I Got The Full File, I Just Wanna Share to You Guyszz.. It's Working You Can The Download The Full File + Instructions Here ://http://gg.gg/setupexe
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • You Can Free Download Latest & Working -> http://gg.gg/6wgz
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
No Downloads
Views
Total Views
2,480
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
340
Comments
2
Likes
2
Embeds 0
No embeds

No notes for slide

Ethical hacking

  1. 1. ETHICAL HACKING Presented By: Shivam Kushwaha CS-3rd Year
  2. 2. CONTENTS  Concept of Ethical Hacking  Hacker  Email Hacking  Windows Hacking  Trojan
  3. 3. 1. CONCEPT OF ETHICAL HACKING  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration testing which is focused on Securing and Protecting IT Systems.
  4. 4. 1. CONCEPT OF ETHICAL HACKING  Introduction to Hacking:-  Its all about showing your Expertize.
  5. 5. 2. HACKER Hacker is a word that has two meanings:  who likes to play with Software or Electronic Systems.  Hackers enjoy Exploring and Learning how Computer systems operate. And second,  who maliciously breaks into systems , for personal gain.  Technically, these criminals are Crackers as Criminal Hackers.
  6. 6. TYPES OF HACKER White Hat Hacker,  Who perform Ethical Hacking.  They are Security Professional. Black Hat Hacker,  Perform Unehthical Hacking.  They are the Criminals hackers or Crackers who use their skills and knowledge for illegal purpose.
  7. 7. 3.EMAIL HACKING  How Email works ?  Email Travelling Path. USER xyzUSER abc
  8. 8. EMAIL HACKING(CONT..)  Fake mail ( Using PHP Script)
  9. 9. EMAIL HACKING(CONT..)  Proving a Fake Email
  10. 10. EMAIL HACKING(CONT..)  Email Bombing  Email Spamming
  11. 11. EMAIL HACKING(CONT..) Email Password Hacking  Loose Security answers  Phishing  Key Loggers
  12. 12. EMAIL HACKING(CONT..)  Phishing… Requirements:-  We need a PHP Script …(test.php)
  13. 13. EMAIL HACKING(CONT..)  Phishing…  We need a Fake Login page with Some changes in Source Code …(ServiceLogin.html)
  14. 14. EMAIL HACKING(CONT..)  Phishing…  Upload Both files ServiceLogin.html and test.php on any Webhosting Server.
  15. 15. EMAIL HACKING(CONT..)  Phishing… username@gmail.com *******
  16. 16. EMAIL HACKING(CONT..)  File Manager >hacked.txt
  17. 17. EMAIL HACKING(CONT..)  Prevention against Phishing.  Read email carefully.  Watch the link carefully before you clicking.  During logged in session do not use any suspicious link.  Always check the URL before Signing In your a/c.
  18. 18. EMAIL HACKING(CONT..)  Keyloggers  Hardware Keylogger  Software Keylogger
  19. 19. EMAIL HACKING(CONT..) Some Famous Keyloggers  Actual Spy  Perfect Keylogger  Family Keylogger  Home Keylogger  Soft Central Keylogger  Adramax Keylogger
  20. 20. 4.WINDOWS HACKING AND SECURITY  Security architecture of Windows  LSA(local Security Authority)  SAM (Security Account Manager) LSAUsername Password SAM Authentication Package Logon Dialog Key (In Hash Format) User a/c databas e Query Returns user’s SID
  21. 21. 4.WINDOWS HACKING AND SECURITY  Security architecture of Windows  SAM (Security Account Manager) Location of a SAM file C:WindowsSystem32Config
  22. 22. 4.WINDOWS HACKING AND SECURITY  Windows User Account Attacks  To check the User Account net user  To Add a New User Account net user username password /add  To Delete a User Account net user username /delete  To change the Password of User Account net user username * .
  23. 23. 4.WINDOWS HACKING AND SECURITY  Windows User Account Attacks  Brute-force Method  Rainbow Table Attack(Oph Crack)
  24. 24. 4.WINDOWS HACKING AND SECURITY  Creating a Backdoor in window.  Sticky key Backdoor
  25. 25. 4.WINDOWS HACKING AND SECURITY  Steganography  Performing System Security  Application Monitoring  Process Monitoring
  26. 26. 5 .TROJANS o What is Trojan? o Different Types of Trojans o Remote Administration Trojans o Data Stealing Trojans o Security Disabler Trojan
  27. 27. 5 .TROJANS o Some Famous Trojan o B o NetBus o ProRat o Sub7 east
  28. 28. Ask a Question ?
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×