Successfully reported this slideshow.
WHAT IS HACKING? <ul><li>Hacking – the art of Exploitation </li></ul><ul><li>A methodology of testing and securing network...
HACKER <ul><li>Also termed as  White Hat </li></ul><ul><li>A good guy performing  </li></ul><ul><li>vulnerability assessme...
Understand the difference HACKING VS  CRACKING
Hacker vs.   Cracker <ul><li>Crackers </li></ul><ul><li>Bad guy </li></ul><ul><li>Break them </li></ul><ul><li>Deploys to ...
Some others.... <ul><li>Phreakers : Phone system manipulators </li></ul><ul><li>Script Kiddies:   Non-expert who breaks in...
SNEAK AT SOME MOST PREVAILING ATTACKS
Reasons Behind Cracking <ul><li>Just for Fun </li></ul><ul><li>Steal information </li></ul><ul><li>Crack others secretly <...
Five Phases of an Attack <ul><li>Reconnaissance </li></ul><ul><li>Scanning </li></ul><ul><li>Gaining Access </li></ul><ul>...
Reconnaissance <ul><li>Social Engineering </li></ul><ul><li>Physical Break-In </li></ul><ul><li>Dumpster Diving </li></ul>...
Scanning <ul><li>Network Mapping </li></ul><ul><li>TraceRouting </li></ul><ul><li>FIN probe </li></ul><ul><li>Port Scannin...
Penetration <ul><li>Password Attacks </li></ul><ul><li>Stack overflow Attacks </li></ul><ul><li>Web Application Attacks </...
Maintaining Access <ul><li>Back Door Kits </li></ul><ul><li>Trojan Horses </li></ul><ul><li>Programs </li></ul><ul><li>Oth...
Covering Tracks and Hiding <ul><li>Altering Event logs </li></ul><ul><li>Creating Hidden files or Directories </li></ul><u...
WHAT DO YOU MEAN BY “ MOST SECURED SYSTEM ”
<ul><li>A System sealed inside a thick  box and locked?? </li></ul><ul><li>A System unplugged from all cables and Disconne...
“ The whole concept of secured System in itself is a flawed concept”
Common Causes of Cracking   <ul><li>Ignorance </li></ul><ul><li>Ignorance </li></ul><ul><li>Ignorance </li></ul><ul><li>Ig...
Most Common Attacks
DOS (Denial Of Service) <ul><li>It is an attempt to make a computer resource unavailable to its intended users </li></ul><...
PoD (Ping Of Death) <ul><li>It is a type of attack on a computer that involves sending a malformed or otherwise malicious ...
SQL Injection Now a Days This Attack method is HOT
DEMO
Phishing <ul><li>Phishing is an  e-mail fraud  method in which the perpetrator sends out email in an attempt to  gather  p...
DEMO
 
How to Secure yourselves <ul><li>A good Antivirus </li></ul><ul><li>A good Firewall </li></ul><ul><li>A good Spyware or Tr...
Prajwal Panchmahalkar Team :  Matriux  , n|u   [email_address] [email_address]
THANKS TO ALL
 
Upcoming SlideShare
Loading in …5
×

Security

1,594 views

Published on

  • Be the first to comment

Security

  1. 1. WHAT IS HACKING? <ul><li>Hacking – the art of Exploitation </li></ul><ul><li>A methodology of testing and securing networks and computers from vulnerabilities </li></ul><ul><li>  Ethical hacking is also known as  penetration testing ,  intrusion testing  and  red teaming </li></ul>
  2. 2. HACKER <ul><li>Also termed as White Hat </li></ul><ul><li>A good guy performing </li></ul><ul><li>vulnerability assessment and securing from the bad guys ( Crackers ) </li></ul><ul><li>Often mistaken for a cracker </li></ul>
  3. 3. Understand the difference HACKING VS CRACKING
  4. 4. Hacker vs. Cracker <ul><li>Crackers </li></ul><ul><li>Bad guy </li></ul><ul><li>Break them </li></ul><ul><li>Deploys to destruct </li></ul><ul><li>Destructs and gains </li></ul><ul><li>unauthorized control </li></ul><ul><li>For fun or bad intentions </li></ul><ul><li>Hackers </li></ul><ul><li>Good guy </li></ul><ul><li>Hackers Build things </li></ul><ul><li>Deploys to Secure </li></ul><ul><li>Helps secure the </li></ul><ul><li>network and computers </li></ul><ul><li>For help or educational purposes </li></ul>
  5. 5. Some others.... <ul><li>Phreakers : Phone system manipulators </li></ul><ul><li>Script Kiddies:  Non-expert who breaks into computer systems by using pre-packaged automated tools written by others </li></ul>
  6. 6. SNEAK AT SOME MOST PREVAILING ATTACKS
  7. 7. Reasons Behind Cracking <ul><li>Just for Fun </li></ul><ul><li>Steal information </li></ul><ul><li>Crack others secretly </li></ul><ul><li>Notify thoughts to the mass </li></ul><ul><li>Destroy enemy’s computer </li></ul><ul><li>Show off </li></ul>
  8. 8. Five Phases of an Attack <ul><li>Reconnaissance </li></ul><ul><li>Scanning </li></ul><ul><li>Gaining Access </li></ul><ul><li>Maintaining Access </li></ul><ul><li>Covering Attacks and Hiding </li></ul>
  9. 9. Reconnaissance <ul><li>Social Engineering </li></ul><ul><li>Physical Break-In </li></ul><ul><li>Dumpster Diving </li></ul><ul><li>DNS </li></ul><ul><li>Websites, Search Engines, Usenets </li></ul>
  10. 10. Scanning <ul><li>Network Mapping </li></ul><ul><li>TraceRouting </li></ul><ul><li>FIN probe </li></ul><ul><li>Port Scanning </li></ul>
  11. 11. Penetration <ul><li>Password Attacks </li></ul><ul><li>Stack overflow Attacks </li></ul><ul><li>Web Application Attacks </li></ul><ul><li>SQL Attacks </li></ul><ul><li>Sniffing </li></ul><ul><li>Spoofing </li></ul><ul><li>Session Hijacking </li></ul>
  12. 12. Maintaining Access <ul><li>Back Door Kits </li></ul><ul><li>Trojan Horses </li></ul><ul><li>Programs </li></ul><ul><li>Other Malicious scripts </li></ul>
  13. 13. Covering Tracks and Hiding <ul><li>Altering Event logs </li></ul><ul><li>Creating Hidden files or Directories </li></ul><ul><li>Tunneling </li></ul><ul><li>Using TCP/IP headers to carry Data </li></ul>
  14. 14. WHAT DO YOU MEAN BY “ MOST SECURED SYSTEM ”
  15. 15. <ul><li>A System sealed inside a thick box and locked?? </li></ul><ul><li>A System unplugged from all cables and Disconnected from the internet?? </li></ul><ul><li>A system patched with latest updates anti virus and firewall ?? </li></ul>
  16. 16. “ The whole concept of secured System in itself is a flawed concept”
  17. 17. Common Causes of Cracking <ul><li>Ignorance </li></ul><ul><li>Ignorance </li></ul><ul><li>Ignorance </li></ul><ul><li>Ignorance </li></ul><ul><li>Ignorance </li></ul>
  18. 18. Most Common Attacks
  19. 19. DOS (Denial Of Service) <ul><li>It is an attempt to make a computer resource unavailable to its intended users </li></ul><ul><li>Typically targets High profile webservers </li></ul>
  20. 20. PoD (Ping Of Death) <ul><li>It is a type of attack on a computer that involves sending a malformed or otherwise malicious ping to a computer </li></ul><ul><li>Sending a ping of this size often crashes the target computer </li></ul>
  21. 21. SQL Injection Now a Days This Attack method is HOT
  22. 22. DEMO
  23. 23. Phishing <ul><li>Phishing is an e-mail fraud method in which the perpetrator sends out email in an attempt to gather personal and financial information from recipients </li></ul><ul><li>The messages appear to come from well known and trustworthy Web sites. </li></ul>
  24. 24. DEMO
  25. 26. How to Secure yourselves <ul><li>A good Antivirus </li></ul><ul><li>A good Firewall </li></ul><ul><li>A good Spyware or Trojanbuster </li></ul><ul><li>Use of Genuine Software </li></ul><ul><li>Avoid ignoring even simple things </li></ul>
  26. 27. Prajwal Panchmahalkar Team : Matriux , n|u [email_address] [email_address]
  27. 28. THANKS TO ALL

×