5. The First Hacking
The first hacker appeared in 1960’s at Massachusetts Institute of
Technology(MIT)
During 1970’s different types hackers appeared as Phone Hackers
1980’s hackers migrated to Computer, ”Bulletin Board System (BBS)
1990’s Internet came and hackers were multiplied
6. Hacker and Ethical Hacker
Hacker
Access computer System or network without authorization
Breaks the law
Ethical Hackers
Performs the same activities with the Owner’s Permission
Employed the companies to perform the Penetration Tests
7. Active Hacker Groups on the Earth
Fancy Bear (aka. Sofacy, Pawn Storm) / Cozy Bear (aka. CozyDuke, Office Monkeys)
Rival agencies in the Russian spy services
Lazarus Group (aka. DarkSeoul, Guardians of Peace)
Widely believed to be associated with North Korea
Equation Group
This is the nickname given by Russian antivirus firm Kaspersky
Comment Crew (aka. APT1, Shanghai Group)
China sponsors a plethora of hacking groups
Sandworm (a.k.a. Electrum)
Named for allusions to the sci-fi classic Dune found in its code,
Sandworm is another group believed to be associated with the Russians
8. Hackers Types
White Hat
Good Guys
Don’t use their Skill for illegal purpose
Computer Security experts and help to protect from Black Hats
Black Hat
Bad Guys
Use the skill for malicious purpose
Hack banks, websites, credit cards
Grey Hat
Combination of black hat and white hat
11. Encryption
Encryption is an interesting piece of technology that works by scrambling
data so it is unreadable by unintended parties
01d59a3b5e0ad59fe56710fd3114d97e
Password hashed using MD5 algorithm
A password, hacked recently
16. Operating System for Hacking and Pen Test
Parrot Security OS
Kali Linux
BackBox
Samurai Web Testing Framework
Pentoo Linux
DEFT Linux
Caine
Network Security Toolkit (NST)
BlackArch Linux
Bugtraq
ArchStrike Linux
Fedora Security Spin
25. Want to hack…
Call Us at
+977 9801200111
01-555 15 15
Or write us
info@neosphere.com.np
Editor's Notes
Decode using excel
Convert Binary to Decimal
Decimal to character
Footprinting: is the first and most convenient way that hackers use to gather information about computer systems and the companies they belong to. The purpose of footprinting to learn as much as you can about a system, it's remote access capabilities, its ports and services, and the aspects of its security.
Scanning: is the process to find out from which door or the way a hacker can enter in the Victim computer
Enumeration: The process of enumeration, finding find what services are running, versions, open shares, account details, or possible points of entry
Access and Attack: Successful gain to the Victim computer/device and start doing your Job
Backdoor is a method, often secret, of bypassing normal authentication or encryption in a computer system, a product, or an embedded device
Show them traceroute command
WMIC [Windows Management Instrumentation (WMI)]
wmic OS
wmic /output:c:\data\test.csv computersystem list full /format:csv
wmic /output:c:\data\test.csv os /format:csv
http://www.md5online.org
Use the link to decrypt the password.
http://unminify.com/
At neosphere, we provide optical classroom training, where one student will have access to one machine and that is very important from the “Cone of Learning” point of view.
Trainer’s are from the industry which will help you to understand the live software development training methodologies
Our career partners will guide you in finding the jobs as well as designing the Resume and interview cracking techniques, we will also assist you in getting Job
We will provide you the leading companies in Nepal where you can do your Internship