INCOGNITO-AN HACKING APPLICATION  CREATED BY Shatadru Chattopadhyay Chirag Gandhi
 
INCOGNITO TECHNIQUES <ul><li>SQL  Injection </li></ul><ul><li>Banner Grabbing  </li></ul><ul><li>Port Scanning </li></ul><...
STRUCTURE INCOGNITO <ul><li>Class Diagram </li></ul><ul><li>Use Case Diagram </li></ul>
SECURITY THREAT: HIGH
WHAT IS SQLI??? <ul><li>SQLI is a technique by which we use a loophole in the website to access contents of database. </li...
POINTS OF ATTACK <ul><li>Error Message </li></ul><ul><li>Vulnerable Links </li></ul><ul><li>Display of username </li></ul>
DEFICIENCIES OF INCOGNITO <ul><li>Blind SQLI </li></ul><ul><ul><li>E.g.:-www.poder360.com </li></ul></ul><ul><li>Can be us...
SECURITY THREAT: MEDIUM <ul><li>Banner Grabbing </li></ul><ul><li>Port Scanner </li></ul>
BANNER GRABBING <ul><li>It is a way of obtaining information about a server </li></ul><ul><li>If such information is doled...
WHAT USE IS INCOGNITO? <ul><li>It would List all information about the websites server if protected it would not be of muc...
PORT SCANNER
WHAT INCOGNITO DOES??? <ul><li>It scans ports itself without any external program. </li></ul><ul><li>Normally all scanning...
TYPES OF SCAN <ul><li>It scans specific ports </li></ul><ul><li>It scans important ports </li></ul><ul><li>It scans all po...
WHY IS INCOGNITO SPECIAL? <ul><li>Hacking Applications are never made in Java </li></ul><ul><li>Python or C is generally u...
Upcoming SlideShare
Loading in …5
×

Incognito

685 views

Published on

Incognito is a special hacking application developed by us...Final Year btech students...with available resources we can commercialize it...this is just half the project

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
685
On SlideShare
0
From Embeds
0
Number of Embeds
17
Actions
Shares
0
Downloads
3
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Incognito

  1. 1. INCOGNITO-AN HACKING APPLICATION CREATED BY Shatadru Chattopadhyay Chirag Gandhi
  2. 3. INCOGNITO TECHNIQUES <ul><li>SQL Injection </li></ul><ul><li>Banner Grabbing </li></ul><ul><li>Port Scanning </li></ul><ul><li>Cross Site Scripting </li></ul><ul><li>Remote File Inclusion </li></ul><ul><li>Local File Inclusion </li></ul>
  3. 4. STRUCTURE INCOGNITO <ul><li>Class Diagram </li></ul><ul><li>Use Case Diagram </li></ul>
  4. 5. SECURITY THREAT: HIGH
  5. 6. WHAT IS SQLI??? <ul><li>SQLI is a technique by which we use a loophole in the website to access contents of database. </li></ul><ul><li>Now let us check an SQLI vulnerable site and lets see what it allows us to do </li></ul>
  6. 7. POINTS OF ATTACK <ul><li>Error Message </li></ul><ul><li>Vulnerable Links </li></ul><ul><li>Display of username </li></ul>
  7. 8. DEFICIENCIES OF INCOGNITO <ul><li>Blind SQLI </li></ul><ul><ul><li>E.g.:-www.poder360.com </li></ul></ul><ul><li>Can be used even to hack the website </li></ul>
  8. 9. SECURITY THREAT: MEDIUM <ul><li>Banner Grabbing </li></ul><ul><li>Port Scanner </li></ul>
  9. 10. BANNER GRABBING <ul><li>It is a way of obtaining information about a server </li></ul><ul><li>If such information is doled out by the server than it makes it more susceptible to network hacking!!!! </li></ul>
  10. 11. WHAT USE IS INCOGNITO? <ul><li>It would List all information about the websites server if protected it would not be of much importance but if not then it can in a real big way hamper the server. </li></ul>
  11. 12. PORT SCANNER
  12. 13. WHAT INCOGNITO DOES??? <ul><li>It scans ports itself without any external program. </li></ul><ul><li>Normally all scanning is done by using NMAP </li></ul><ul><li>If one wants to compare results using INCOGNITO then one can use NMAP and also use command prompt netstat -a </li></ul>
  13. 14. TYPES OF SCAN <ul><li>It scans specific ports </li></ul><ul><li>It scans important ports </li></ul><ul><li>It scans all ports </li></ul><ul><li>HIGHLIGHT:- It uses multithreading to return results faster </li></ul>
  14. 15. WHY IS INCOGNITO SPECIAL? <ul><li>Hacking Applications are never made in Java </li></ul><ul><li>Python or C is generally used for it </li></ul><ul><li>Secondly the vast amount of options available with it is generally never clubbed into one single software </li></ul>

×