Ethical Hacking

1,007 views

Published on

Published in: Technology
3 Comments
2 Likes
Statistics
Notes
No Downloads
Views
Total views
1,007
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
0
Comments
3
Likes
2
Embeds 0
No embeds

No notes for slide

Ethical Hacking

  1. 1. ETHICAL HACKINGBY ….. Miss. Pallavi S. Sonone (CSE Dept. PLIT, Buldana)
  2. 2. Hacking Include’s……. Password Cracking Trojans Phishing Facebook Hacking Sniffers IP Tracking Website Hacking Cross Site Scripting Proxies Remote Testers Port Hacking Mobile Phone Hacking WiFi Hacking Social Engineering ATM Machine Hacking
  3. 3. IP Address: This address is unique for different devices.e.g. 172.16.254.1 225.168.1.20
  4. 4. TORRENTs UNBLOCKING: How Torrents Blocked? -Disable Torrent Clients-Block Download of .torrent extension files
  5. 5. COOKIES: It is a text file stored on our computer sort by the website on user machine. -Cookies logged us automatically(On google.com) -allows to customize background image(On google.com)
  6. 6. TYPES Of Cookies: Session/ Temporary Cookies: Persistent Cookies: First-Party Cookies: Third-Party Cookies: Unsatisfactory Cookies:
  7. 7. TROJANs: Trojans are RATs or Remote Administration Tools that give an attacker remote control or remote access to the victims computer.
  8. 8. Protection: Trojan should start automatically (Whenever windows boots) Trojan has to open a port Trojan has to be loaded into memory
  9. 9. SPOOFING:Spoofing means “Hacking Other’s Email, SMS or Call”There Are Three Types Of SPOOFING: 1) EMAIL Spoofing: 2)SMS Spoofing: 3) Call Spoofing:
  10. 10. PASSWORD CRACKING:Include’s… Online Account Admin/Windows Login Password Cracking File/Application Cracking BIOS Cracking Network Cracking(FTP, SQL, Coporate email) Wifi Passwords Mobile Login Cracking
  11. 11. MAFIABOY:
  12. 12. DOS ATTACK: To bring down an entire network -Each system connected to internet has limited bandwidth available. [If our computer has bandwidth of 2mbps & the criminal sends 100mbps of data then our computer will crack]
  13. 13. TYPES OF DOS ATTACK:1.Ping Of Death:2.TearDrop:1]Ping Of Death:65,536 bytes is the size of data packet.(Not Larger Attack)
  14. 14. .2 TearDrop:Data is broken down into smallerchunks of datae.g. 4000 Bytes Chunk A 1-1500 bytes Chunk B 1500-3000 bytes Chunk C 3000-4000 bytesDOS attack is extremely dangerous
  15. 15. STEGNOGRAPHY:Hiding of any file or data into the other fileTYPES OF STEGNOGRAPHY:1. Image STEGNOGRAPHY2. Text STEGNOGRAPHY3. Spam(Mimic) STEGNOGRAPHY
  16. 16. ROAD SIGN HACKING:
  17. 17. ATM MACHINE HACKING:
  18. 18. BEST SECURITY PRACTICES:1. Install a FIREWALL: Zone Alarm (Free Download)2. Use an Antivirus: Update it Weakly3. Use an ANTISPYWARE: PrevX, SpySweeper4. Update your OS: Every 15 days5. Choose a Strong Password6. Avoid Public computer to bank or shop Online.7. Secure your WiFi: Enable WEP, WPA or WPA28. Encrypt your Data/Folders/Drivers: Truecrypt9. Use Digital signature/PGP Encrypted Email
  19. 19. ….

×