Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Computer Security -A Hacker's Perspective

1,880 views

Published on

A sneak peek at tools used for level 1 hacks.

Published in: Technology, News & Politics
  • Be the first to comment

Computer Security -A Hacker's Perspective

  1. 1. COMPUTER SECURITY A Hacker’s Perspective Presented by Kunal Mohanty
  2. 2. LEGAL DISCLAIMER Any actions and or activities related to the material contained within this presentation is solely your responsibility.The misuse of the information in this presentation can result in criminal charges brought against the persons in question. The author will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law. This presentation contains materials that can be potentially damaging or dangerous. If you do not fully understand something on this presentation , then please IGNORE! Refer to the laws in your province/country before accessing, using,or in any other way utilizing these materials.These materials are for educational and research purposes only.Do not attempt to violate the law with anything contained here. Neither the author of this material, or anyone else affiliated in any way, is going to accept responsibility for your actions. Any linked sites or references are not under the control of author and the author is not responsible for the contents of any linked site or any link contained in a linked site, or any changes or updates to such sites. I am providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement by me. Presented by : Kunal Mohanty 07-06-2010
  3. 3. HACKING Process of breaking into systems for: 1. Personal or Commercial Gains 2. Malicious Intent – Causing severe damage to Information & Assets Presented by : Kunal Mohanty 07-06-2010
  4. 4. STATISTICS Presented by : Kunal Mohanty 07-06-2010
  5. 5. TYPES OF INCIDENTS Presented by : Kunal Mohanty 07-06-2010
  6. 6. SOME TRADITIONAL WAYS
  7. 7. FOOTPRINTING Presented by : Kunal Mohanty 07-06-2010
  8. 8. FOOTPRINTING PING TRACEROUTE Presented by : Kunal Mohanty 07-06-2010
  9. 9. SCANNING AND ENUMERATION NMAP Presented by : Kunal Mohanty 07-06-2010
  10. 10. SCANNING AND ENUMERATION SUPERSCAN Presented by : Kunal Mohanty 07-06-2010
  11. 11. SYSTEM HACKING SNADBOY Presented by : Kunal Mohanty 07-06-2010
  12. 12. SYSTEM HACKING KEYLOGGER Presented by : Kunal Mohanty 07-06-2010
  13. 13. TROJANS AND BACKDOORS NETBUS Presented by : Kunal Mohanty 07-06-2010
  14. 14. TROJANS AND BACKDOORS SUBSEVEN Presented by : Kunal Mohanty 07-06-2010
  15. 15. SNIFFERS SMAC Presented by : Kunal Mohanty 07-06-2010
  16. 16. SNIFFERS ETHEREAL Presented by : Kunal Mohanty 07-06-2010
  17. 17. WEB BASED PASSWORD CRACKING CAIN AND ABEL Presented by : Kunal Mohanty 07-06-2010
  18. 18. WEB BASED PASSWORD CRACKING BRUTUS Presented by : Kunal Mohanty 07-06-2010
  19. 19. PHISHING ATTACKS Presented by : Kunal Mohanty 07-06-2010
  20. 20. THANKYOU

×