• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Ethical Hacking
 

Ethical Hacking

on

  • 763 views

 

Statistics

Views

Total Views
763
Views on SlideShare
763
Embed Views
0

Actions

Likes
1
Downloads
0
Comments
3

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel

13 of 3 previous next Post a comment

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
  • http://www.mediafire.com/download/bibo8k8wqt5ckwe
    Are you sure you want to
    Your message goes here
    Processing…
  • You Can Free Download Latest & Working -> http://www.sendspace.com/file/ccgilz
    Are you sure you want to
    Your message goes here
    Processing…
  • Nice
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Ethical Hacking Ethical Hacking Presentation Transcript

    • ETHICAL HACKINGBY ….. Miss. Pallavi S. Sonone (CSE Dept. PLIT, Buldana)
    • Hacking Include’s……. Password Cracking Trojans Phishing Facebook Hacking Sniffers IP Tracking Website Hacking Cross Site Scripting Proxies Remote Testers Port Hacking Mobile Phone Hacking WiFi Hacking Social Engineering ATM Machine Hacking
    • IP Address: This address is unique for different devices.e.g. 172.16.254.1 225.168.1.20
    • TORRENTs UNBLOCKING: How Torrents Blocked? -Disable Torrent Clients-Block Download of .torrent extension files
    • COOKIES: It is a text file stored on our computer sort by the website on user machine. -Cookies logged us automatically(On google.com) -allows to customize background image(On google.com)
    • TYPES Of Cookies: Session/ Temporary Cookies: Persistent Cookies: First-Party Cookies: Third-Party Cookies: Unsatisfactory Cookies:
    • TROJANs: Trojans are RATs or Remote Administration Tools that give an attacker remote control or remote access to the victims computer.
    • Protection: Trojan should start automatically (Whenever windows boots) Trojan has to open a port Trojan has to be loaded into memory
    • SPOOFING:Spoofing means “Hacking Other’s Email, SMS or Call”There Are Three Types Of SPOOFING: 1) EMAIL Spoofing: 2)SMS Spoofing: 3) Call Spoofing:
    • PASSWORD CRACKING:Include’s… Online Account Admin/Windows Login Password Cracking File/Application Cracking BIOS Cracking Network Cracking(FTP, SQL, Coporate email) Wifi Passwords Mobile Login Cracking
    • MAFIABOY:
    • DOS ATTACK: To bring down an entire network -Each system connected to internet has limited bandwidth available. [If our computer has bandwidth of 2mbps & the criminal sends 100mbps of data then our computer will crack]
    • TYPES OF DOS ATTACK:1.Ping Of Death:2.TearDrop:1]Ping Of Death:65,536 bytes is the size of data packet.(Not Larger Attack)
    • .2 TearDrop:Data is broken down into smallerchunks of datae.g. 4000 Bytes Chunk A 1-1500 bytes Chunk B 1500-3000 bytes Chunk C 3000-4000 bytesDOS attack is extremely dangerous
    • STEGNOGRAPHY:Hiding of any file or data into the other fileTYPES OF STEGNOGRAPHY:1. Image STEGNOGRAPHY2. Text STEGNOGRAPHY3. Spam(Mimic) STEGNOGRAPHY
    • ROAD SIGN HACKING:
    • ATM MACHINE HACKING:
    • BEST SECURITY PRACTICES:1. Install a FIREWALL: Zone Alarm (Free Download)2. Use an Antivirus: Update it Weakly3. Use an ANTISPYWARE: PrevX, SpySweeper4. Update your OS: Every 15 days5. Choose a Strong Password6. Avoid Public computer to bank or shop Online.7. Secure your WiFi: Enable WEP, WPA or WPA28. Encrypt your Data/Folders/Drivers: Truecrypt9. Use Digital signature/PGP Encrypted Email
    • ….