SlideShare a Scribd company logo
1 of 29
Let’s Start by Onboarding You!
Scroll and Click on
Hands-on session on
Ethical Hacking
and Recon
Hello Wizard, Welcome to the world of magic!
Table of contents
What is Recon, why it is
necessary, general
practices, effective recon.
Cyber Security, Career,
Roadmaps.
Why Linux, Windows vs.
Linux.
OSINT framework,
importance of OSINT
Installation, Command Line, File
System, Tools and
Technologies.
TryHackMe and
HackTheBox labs
01
04
02
05
03
06
Introduction Why Linux Linux Fundamentals
Recon OSINT LABS
After getting hacked and caught by someone
Why we are not able to find bug?
Before After
Beware Traces left!
Random Instagram/ youtube influencer be like:
Ky hai hacking me lappu si to hacking hai
What is Cyber Security
It is a practice to take advantage of vulnerability or loophole in the
system.
Some times people do these activities for illegal work or for helping
others to stay safe.
To secure yourself from the evil peoples.
Skills required
• Problem solving
• Troubleshooting
• Computers basic knowledge
• Linux command line
• Networking
• Programming
Quick insights of basic terminologies
One who hack for illegal work, without
permissions.
One who hack for good reason with
permissions.
White Hat Hacker
Black Hat Hacker
Grey Hat Hacker
Hacks without permission but doesn’t harm
anyone.
Infected computer used to
harm, to perform DDOS
Malicious software which is
used to damage or harm
the system
Denail of Service is used to
send large number of
packets to the target
Distributed DOS is done with
multiple system and multiple
user with the help of botnet
A file infected by a malware
which can be used to take
access to the system
A fake url page sent to target
to gain credentials
Botnet Malware Exploit
DOS DDOS Phishing
A cryptographic term used to
convert a plain text into
unreadable text using keys
and algorithms
A cryptographic term used to
convert a unreadable text
into plain text using keys
and algorithms
Infected file through which
hacker can spy the
activities of target user
It creates a backdoor to target
system through which
attacker can get access into it
silently
It is an deadly attack which
encrypts the file
Used to change IP address
and our location
Encryption Decryption Ransomware
Spyware Trojan Horse VPN
A cryptographic term used to
convert a plain text into
unreadable text using keys
and algorithms
A cryptographic term used to
convert a unreadable text
into plain text using keys
and algorithms
Infected file through which
hacker can spy the
activities of target user
It creates a backdoor to target
system through which
attacker can get access into it
silently
It is an deadly attack which
encrypts the file
Used to change IP address
and our location
Social Engineering Decryption Ransomware
Spyware Trojan Horse VPN
Types of Penetration Testing
Black Box White Box Grey Box
Steps performed by an Ethical Hacker
It covers pre discussion
on all activities involved
in penetration test and
discussion what to and
where to test.
Gathering of information
and scanning for
vulnenrabilites.
Documentation of
vulnerabilities and the
evidence collected
during the test.
To find the exploit for the
found vulnerability.
Plan
Report
Discover
Attack
Domains
Network
security
Android
security
Web app.
security
Information
security
IoT
security
Risk
Management
Security
Architect
SOC
Roadmap
Computer
Fundamentals and OS
Cryptography
and networking
Cyber security tools
and technologies
Practice on THM, HTB
and portswigger labs
Why Linux
Uses Less resources
and provides secured
environment
A better file system
and powerful than
windows
It is open source and
stable
Fully customizable from
each aspects and most of
cyber security tools are
created for linux
Kali Linux
A penetration testing
framework compatitable to run
on all devices like arm, pc,
desktop, mobile, tablets
Resources to practice
• Picoctf
• Tryhackme
• Hackthebox
• Overthewire
• Portswigger
• vulnhub
Enough theory let’s do
practicals😎
Frustrated windows user after shifting to Linux
Nmap- Network Scanner
A tool used to find the host, services, version, OS of target and other things.
Options
-sN
-sV
-p
-T
TCP 3 way handshake
Rom Rom Bhaiyoo
System faad dege
CREDITS: This presentation template was created by Slidesgo, and
includes icons by Flaticon, and infographics & images by Freepik
Thanks!
Do you have any questions?

More Related Content

Similar to Cyber Security Workshop GDSC-BITW

Similar to Cyber Security Workshop GDSC-BITW (20)

CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
 
Ceh certified ethical hacker
Ceh   certified ethical hackerCeh   certified ethical hacker
Ceh certified ethical hacker
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Introduction to hacking
Introduction to hackingIntroduction to hacking
Introduction to hacking
 
Ethical hacking and cyber security intro
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security intro
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Super1
Super1Super1
Super1
 
Ethical Hacking.pptx
Ethical Hacking.pptxEthical Hacking.pptx
Ethical Hacking.pptx
 
Session Slide
Session SlideSession Slide
Session Slide
 
Intro2 malwareanalysisshort
Intro2 malwareanalysisshortIntro2 malwareanalysisshort
Intro2 malwareanalysisshort
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Cse ethical hacking ppt
Cse ethical hacking pptCse ethical hacking ppt
Cse ethical hacking ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Recently uploaded

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 

Recently uploaded (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 

Cyber Security Workshop GDSC-BITW

  • 1. Let’s Start by Onboarding You! Scroll and Click on
  • 2. Hands-on session on Ethical Hacking and Recon Hello Wizard, Welcome to the world of magic!
  • 3.
  • 4. Table of contents What is Recon, why it is necessary, general practices, effective recon. Cyber Security, Career, Roadmaps. Why Linux, Windows vs. Linux. OSINT framework, importance of OSINT Installation, Command Line, File System, Tools and Technologies. TryHackMe and HackTheBox labs 01 04 02 05 03 06 Introduction Why Linux Linux Fundamentals Recon OSINT LABS
  • 5.
  • 6. After getting hacked and caught by someone
  • 7. Why we are not able to find bug?
  • 10. Random Instagram/ youtube influencer be like: Ky hai hacking me lappu si to hacking hai
  • 11. What is Cyber Security It is a practice to take advantage of vulnerability or loophole in the system. Some times people do these activities for illegal work or for helping others to stay safe. To secure yourself from the evil peoples.
  • 12. Skills required • Problem solving • Troubleshooting • Computers basic knowledge • Linux command line • Networking • Programming
  • 13. Quick insights of basic terminologies One who hack for illegal work, without permissions. One who hack for good reason with permissions. White Hat Hacker Black Hat Hacker Grey Hat Hacker Hacks without permission but doesn’t harm anyone.
  • 14. Infected computer used to harm, to perform DDOS Malicious software which is used to damage or harm the system Denail of Service is used to send large number of packets to the target Distributed DOS is done with multiple system and multiple user with the help of botnet A file infected by a malware which can be used to take access to the system A fake url page sent to target to gain credentials Botnet Malware Exploit DOS DDOS Phishing
  • 15. A cryptographic term used to convert a plain text into unreadable text using keys and algorithms A cryptographic term used to convert a unreadable text into plain text using keys and algorithms Infected file through which hacker can spy the activities of target user It creates a backdoor to target system through which attacker can get access into it silently It is an deadly attack which encrypts the file Used to change IP address and our location Encryption Decryption Ransomware Spyware Trojan Horse VPN
  • 16. A cryptographic term used to convert a plain text into unreadable text using keys and algorithms A cryptographic term used to convert a unreadable text into plain text using keys and algorithms Infected file through which hacker can spy the activities of target user It creates a backdoor to target system through which attacker can get access into it silently It is an deadly attack which encrypts the file Used to change IP address and our location Social Engineering Decryption Ransomware Spyware Trojan Horse VPN
  • 17. Types of Penetration Testing Black Box White Box Grey Box
  • 18. Steps performed by an Ethical Hacker It covers pre discussion on all activities involved in penetration test and discussion what to and where to test. Gathering of information and scanning for vulnenrabilites. Documentation of vulnerabilities and the evidence collected during the test. To find the exploit for the found vulnerability. Plan Report Discover Attack
  • 20. Roadmap Computer Fundamentals and OS Cryptography and networking Cyber security tools and technologies Practice on THM, HTB and portswigger labs
  • 21. Why Linux Uses Less resources and provides secured environment A better file system and powerful than windows It is open source and stable Fully customizable from each aspects and most of cyber security tools are created for linux
  • 22. Kali Linux A penetration testing framework compatitable to run on all devices like arm, pc, desktop, mobile, tablets
  • 23. Resources to practice • Picoctf • Tryhackme • Hackthebox • Overthewire • Portswigger • vulnhub
  • 24. Enough theory let’s do practicals😎
  • 25. Frustrated windows user after shifting to Linux
  • 26. Nmap- Network Scanner A tool used to find the host, services, version, OS of target and other things. Options -sN -sV -p -T
  • 27. TCP 3 way handshake
  • 29. CREDITS: This presentation template was created by Slidesgo, and includes icons by Flaticon, and infographics & images by Freepik Thanks! Do you have any questions?