0
 
<ul><li>Tushar Das </li></ul><ul><li>Vidhi Bhandari </li></ul><ul><li>Basuraj Datta </li></ul><ul><li>Abhishek Agarwal </l...
 
<ul><li>Script Kiddie or Packet Monkeys </li></ul><ul><li>Black hat hacker (Unethical) </li></ul><ul><li>White hat hacker ...
<ul><li>Security Exploit </li></ul><ul><li>Social engineering </li></ul><ul><li>Worm </li></ul><ul><li>Trojan Horse </li><...
<ul><li>Reconnaissance : </li></ul><ul><li>Physical Break-in </li></ul><ul><li>Social Engineering </li></ul><ul><li>Scanni...
<ul><li>Gaining Access/ Penetration </li></ul><ul><li>Password guessing </li></ul><ul><li>Password cracking </li></ul><ul>...
<ul><li>Anti Virus Software (McAfee,Norton) </li></ul><ul><li>Firewall </li></ul><ul><li>Intrusion Detection System (IDS) ...
Conclusion
 
Upcoming SlideShare
Loading in...5
×

Hacking 2003 Format

842

Published on

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
842
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
44
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Transcript of "Hacking 2003 Format"

  1. 2. <ul><li>Tushar Das </li></ul><ul><li>Vidhi Bhandari </li></ul><ul><li>Basuraj Datta </li></ul><ul><li>Abhishek Agarwal </li></ul><ul><li>Radhika Agrawal </li></ul>Group Members
  2. 4. <ul><li>Script Kiddie or Packet Monkeys </li></ul><ul><li>Black hat hacker (Unethical) </li></ul><ul><li>White hat hacker (Ethical) </li></ul><ul><li>Grey hat hacker </li></ul>Types Of Hacking
  3. 5. <ul><li>Security Exploit </li></ul><ul><li>Social engineering </li></ul><ul><li>Worm </li></ul><ul><li>Trojan Horse </li></ul><ul><li>Virus </li></ul><ul><li>Vulnerability scanner </li></ul><ul><li>Packet Sniffer </li></ul>Hackers Tools
  4. 6. <ul><li>Reconnaissance : </li></ul><ul><li>Physical Break-in </li></ul><ul><li>Social Engineering </li></ul><ul><li>Scanning: </li></ul><ul><li>Locating Nodes </li></ul><ul><li>Performing service discoveries </li></ul><ul><li>Testing services </li></ul>Hacking Process
  5. 7. <ul><li>Gaining Access/ Penetration </li></ul><ul><li>Password guessing </li></ul><ul><li>Password cracking </li></ul><ul><li>Maintaining Access: </li></ul><ul><li>Backdoor Kits </li></ul><ul><li>Traditional Root Kits </li></ul><ul><li>Covering Tracks & Hiding: </li></ul><ul><li>Offline log deleting </li></ul><ul><li>Flood log with garbage </li></ul>Contd …
  6. 8. <ul><li>Anti Virus Software (McAfee,Norton) </li></ul><ul><li>Firewall </li></ul><ul><li>Intrusion Detection System (IDS) </li></ul><ul><li>Content Filtering Software </li></ul><ul><li>Sand boxing Software </li></ul><ul><li>Behavior Analysis Software </li></ul>Prevention
  7. 9. Conclusion
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×