Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Ethical Hacking
Contents:
• Introduction
• Mobile hacking
• Blocking Sites
• Proxy Servers
• Password Cracking
• Facebook TRicks
• Anonymo...
Introduction:
: Ethical hacking and ethical hacker are
terms that describe hacking performed to
help a company or individu...
Rules &Regulations:
• You have permission to probe the network and attempt to
identify potential security risks. It is rec...
-SCRIPT KIDDIES
-WHITE HAT HACKERS
-BLACK HAT HACKERS
-GRAY HAT HACKERS
Types of Hackers:
Blocking Sites:
• This may be an Interesting one to know ..How
actually an Admin puts a Restriction on
popular sites/Socia...
Steps:
• Firstly browse the following route:
• C:windowssystem32driversetc
• Find the file Named as ”Hosts”
• Under "127.0...
Steps:
For every site after that you want to add, just add "1" to
the last number in the internal ip (127.0.0.2) and then
...
Mobile Hacking
Steps to follows:
-Go to https://www.mobivox.com
-Make a free account up there.
During registration don’t forget to enter ...
Proxy Servers:
• These Servers Allows the User to provide a
network to a Blocked Sites.
• Bascially ,Top rated Proxy Serve...
Some Popular PROXY Servers:
www.meebo.com/
www.iloveim.com/
www.the-cloak.com/
www.cantblock.me
www.mb35.info
www.cloaking...
Password Cracking:
• CMD
• Free SOFTWARES
1. GO TO START –> RUN –> TYPE IN CMD
2. ENTER COMMAND: CD
WINDOWSSYSTEM32
3. MKDIR NEWPASS
4. COPY LOGON.SCR NEWPASSLOGON....
Note:
• So basically you are telling windows is to
backup the command program and the screen
saver file.
• Then we edited ...
Example:
• If the admin username is ‘CyberSix’ and you want
change the password to ‘cyber6’ Then type in the
following com...
Bacic technique Used in Win7
• Open Cmd(Command Prompt).
• Net user username*
• Put a password.
• Again put Password for c...
Steps:
-Open Notepad
Type: www.cmdcommand.com
-save File as .bat
-Double Click on it…
CMD Opens………………………………………….
Free Softwares:
-Ophcrack
-UbuntuOS
There are many Softwares available in the Google
Search Engine You may find. But I thi...
Anonymous Surfing:
-There are various methods to achieve the Anonymous surfing.
-Use Trusted VPN (Virtual Private Network)...
Facebook Tracing:
Step 1) Go to your Facebook Profile Page.
Step 2) Now Press Ctrl + U from your keyboard for
see source c...
Steps:
•
Step 6) There are some Facebook Profile Ids of your friends
who visited recently.
Step 7) The first one ID's are ...
How to Cancel Friends Request:
1. Go to account settings.
2. Select `download a copy
3. Choose `expanded archive` from the...
Fake Facebook_ID
-WE (BOYS) always in search of a SEXY girl in
Facebook….
STOP
Would u know is she Really Exist?? OR Is it...
Trick:
-Firstly
Open the Profile Pic of a Victim…
-Right click on it…
-Copy the image URL(Uniform Resource Locator)
-Paste...
Warnings:
• Hello Guys, whatever I showed up in the Slides
are just up to the Knowledge Purpose only.
Just Keep that one t...
Hope you like my slides !
See you guys ..
Have a nice time !!
Thanking you.
:D
For more tricks ,Keep Following. !

Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Ethical hacking
Upcoming SlideShare
Loading in …5
×

Ethical hacking

In this slides i have mentioned some hacking tricks which are interesting to know.. You will able to know how the sites are blocked, how to get rid of them.You will also able to crack the passwords...And some useful tricks related to facebook and mobile hacking.. i hope,You will like it...But one thing ,the tricks are old...But what i think is Old is Gold. :p

Related Books

Free with a 30 day trial from Scribd

See all
  • Be the first to comment

Ethical hacking

  1. 1. Ethical Hacking
  2. 2. Contents: • Introduction • Mobile hacking • Blocking Sites • Proxy Servers • Password Cracking • Facebook TRicks • Anonymous Surfing • Warnings
  3. 3. Introduction: : Ethical hacking and ethical hacker are terms that describe hacking performed to help a company or individual identify potential threats on the computer or network. : An ethical hacker attempts to hack their way past the system security, finding any weak points in the security that could be exploited by other hackers. : The organization uses what the ethical hacker finds to improve the system security.
  4. 4. Rules &Regulations: • You have permission to probe the network and attempt to identify potential security risks. It is recommended that if you are the person performing the tests that you get written consent. • You respect the individual's or company's privacy and only go looking for security issues. • You report all security vulnerabilities you detect to the company, not leaving anything open for you or someone else to come in at a later time. • You let the software developer or hardware manufacturer know of any security vulnerabilities you locate in their software or hardware if not already known by the company.
  5. 5. -SCRIPT KIDDIES -WHITE HAT HACKERS -BLACK HAT HACKERS -GRAY HAT HACKERS Types of Hackers:
  6. 6. Blocking Sites: • This may be an Interesting one to know ..How actually an Admin puts a Restriction on popular sites/Social Networking Sites/Adult sites……..
  7. 7. Steps: • Firstly browse the following route: • C:windowssystem32driversetc • Find the file Named as ”Hosts” • Under "127.0.0.1 localhost" Add 127.0.0.2 www.xyz.com , and that site will no longer be accessable. • DONE !
  8. 8. Steps: For every site after that you want to add, just add "1" to the last number in the internal ip (127.0.0.2) and then the addy like before. ie: 127.0.0.3 www.yahoo.com 127.0.0.4 www.msn.com 127.0.0.5 www.google.com
  9. 9. Mobile Hacking
  10. 10. Steps to follows: -Go to https://www.mobivox.com -Make a free account up there. During registration don’t forget to enter the victims mobile number. -Once the confirmations is being made, then Go that site again and click on “DIRECT WEB CALL”. -Fill up the common details related to it…. -THAT’S IT.
  11. 11. Proxy Servers: • These Servers Allows the User to provide a network to a Blocked Sites. • Bascially ,Top rated Proxy Server: • Hidemyass.com
  12. 12. Some Popular PROXY Servers: www.meebo.com/ www.iloveim.com/ www.the-cloak.com/ www.cantblock.me www.mb35.info www.cloaking.me www.proxybrowsing.com www.behidden.com www.yourfreedom.net www.hujiko.com www.anonymizer.ru www.schoolproxylists.cn/ www.xysurfing.com/ www.googlefaker.com/ www.internetoxy.com/
  13. 13. Password Cracking: • CMD • Free SOFTWARES
  14. 14. 1. GO TO START –> RUN –> TYPE IN CMD 2. ENTER COMMAND: CD WINDOWSSYSTEM32 3. MKDIR NEWPASS 4. COPY LOGON.SCR NEWPASSLOGON.SCR 5. COPY CMD.EXE NEWPASSCMD.EXE 6. DEL LOGON.SCR 7. RENAME CMD.EXE LOGON.SCR CMD IN WINDOWS XP/7
  15. 15. Note: • So basically you are telling windows is to backup the command program and the screen saver file. • Then we edited the settings so when windows loads the screen saver, we will get an unprotected dos prompt without logging in. When this appears enter this command :- net user username password
  16. 16. Example: • If the admin username is ‘CyberSix’ and you want change the password to ‘cyber6’ Then type in the following command :- net user CyberSix cyber6 • This will change the administrator password to cyber6. • Thats it you have sucessfully hacked the Window XP Administrator Password now you can Log in, using the hacked Window XP Administrator Password and do whatever you want to do.
  17. 17. Bacic technique Used in Win7 • Open Cmd(Command Prompt). • Net user username* • Put a password. • Again put Password for confirmation.. • Done… • Bascially , Cmd is somewhere Not authorised to used it…SO don’t worry….steps are simple….
  18. 18. Steps: -Open Notepad Type: www.cmdcommand.com -save File as .bat -Double Click on it… CMD Opens………………………………………….
  19. 19. Free Softwares: -Ophcrack -UbuntuOS There are many Softwares available in the Google Search Engine You may find. But I think the Above two which I listed were Perfect One.. Everything about these softwares that is how to install, and how to work upon it, all were given in their official Sites. So Feel Free !!
  20. 20. Anonymous Surfing: -There are various methods to achieve the Anonymous surfing. -Use Trusted VPN (Virtual Private Network),such as Cyberghost, Proxpn, Hotspot Shield or use Proxy Servers and so on. -The best and Most secured way is to use the Tor browser. Most secured and Trusted one. Simply stating: If you are using the Tor Browser, You didn’t have to worry about the Admin who is monitoring you .This is because, it hides your IP address even MAC too and assigns our IP address with the unknown IP address of an unknown location which ever it gets through Tor Network, which you might say as a Proxy servers address. So its hard for him to trace out the location. It doesn’t matter if you are using Cyberoam captive portal. It’s a highly Secured one.
  21. 21. Facebook Tracing: Step 1) Go to your Facebook Profile Page. Step 2) Now Press Ctrl + U from your keyboard for see source code of your profile page. Step 3) Now press Ctrl + F from your keyboard to open search box. Step 4) Now search this code {"list": Step 5) You find some Facebook Profile Ids are like shown below. Click on example image for zoom.
  22. 22. Steps: • Step 6) There are some Facebook Profile Ids of your friends who visited recently. Step 7) The first one ID's are showing visits the most number of time. Step 8) Now if your want to findout, Open a new tab Enter below link : www.facebook.com/Facebook Profile Id For Example : www.facebook.com/100001257992988 • DONE…..
  23. 23. How to Cancel Friends Request: 1. Go to account settings. 2. Select `download a copy 3. Choose `expanded archive` from the next page opened and enter your password and click continue. 4. Select `start my archive`. 5. After a few hours you'll get the download link in your email. 5. Download the file `facebook` and unzip it. 6. Open the folder html and then `friend_requests.html`. 7. You can see the list of your friend requests and pending lists. Now goto their accounts and click`cancel request. That's all You are done now. Your account is safe.
  24. 24. Fake Facebook_ID -WE (BOYS) always in search of a SEXY girl in Facebook…. STOP Would u know is she Really Exist?? OR Is it a Girl only? There is a solution to find the Truth.. Sounds Crazy.. Lets have a look..
  25. 25. Trick: -Firstly Open the Profile Pic of a Victim… -Right click on it… -Copy the image URL(Uniform Resource Locator) -Paste the link into Google images…. -Press ENTER… YIPEEE. That’s done….IF the searched Item found to be in some site it means it’s a fake…Otherwise if its give an Error….Means Victim isnt Fake…………….
  26. 26. Warnings: • Hello Guys, whatever I showed up in the Slides are just up to the Knowledge Purpose only. Just Keep that one thing in mind.. • That’s it.
  27. 27. Hope you like my slides ! See you guys .. Have a nice time !! Thanking you. :D
  28. 28. For more tricks ,Keep Following. ! 

×