Ethical hacking (2)

781 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
781
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Ethical hacking (2)

  1. 1. What is ethical hacking?Ethical hacking, often performed by white hatsor skilled computer experts, is the use ofprogramming skills to determine vulnerabilitiesin computer systems.
  2. 2. History Kevin mitnic(1995) Gary mckinnon (2002)
  3. 3. Hacking methods: Brute force hack Fake login hack Cookie steal hack Web mail hack
  4. 4. Types of hackers: white hat hacker grey hat hacker black hat hacker
  5. 5. Hacking with ethicsHacking website: • open the website u want to hack • Provide wrong user name and password • Right click on the page->go to view source->html • Delete the java script from the source carefully • Give input=“password” type=“password” -> replace • File-> saveas->store inhard disk->goto saved page and open it ---->u can see some changes
  6. 6.  Locally stored passwords Trojan Key logger Impersonation Sniffing Sniffing Social engineering
  7. 7. Basicneeds for hacking: First u can learn about computers you are in much femeliar about HTML language
  8. 8. CODE: Learn about hardware , dos, batch files Port scanning Learn programming languages HTML,C++,Perl….etc How to secure yourself FTP(file transfer protocol) TCP/IP,UDP,DHCP
  9. 9. Shop admin hacking :Finding vp-asp 5.00 In google.com type vp-asp 5.00 and install software Page will be like this ***://***.victim.com/shop/shop displaycategories.asp Now the URL will be like this ****://***.victim.com/shop/shoping140.mdb
  10. 10.  If you don’t download the database try this the URL will be ****://***.victim.com/sp/resx/shoping1 40.mdb If u see error messg try this ***://***.victim.com/shop/shopping 500.m db download mdb file Admin page is usually located here ***://***victim.com/shop/shopadmin.asp
  11. 11. Hacking windows X-P: Boot the pc in safe mode Select the safe mode option Try rebooting pc in DOS Now, Access to c:Windowssysytem32configSAM Rename SAM as SAM.mj Go to cmd prompt and type next user Hold Ctrl+Alt key and press DEL twice
  12. 12. Conclusion: The role of ETHICAL HACKING in security is to provide customers with awareness of how they could potentially be attacked and why they would be targeted. The only way to anticipate the actions of a hacker is to act like the hacker.
  13. 13. PRESENTED BY-A.SIRISHAM.MANJEERA

×