SlideShare a Scribd company logo
Certified
Penetration Testing
Attacks Using Local System:
• Session Hijacking
• Windows Hacking
• Scanning
• Phishing
Windows Hacking
Hacking : -Art of exploring various security breaches is termed as Hacking.
-Legal or illegal but unauthorised way of bypass any security mechanism
Windows Hacking – Art Of windows Security bypass and Find Loop whole and vulnerability is call a
windows Hacking
Compute security :
• BIOS –Password
• Syskey
• Login
Phishing
Phishing: -Spear phishing is a targeted email scam with the sole purpose of obtaining unauthorized
access to sensitive data
Phishing attacks generally target:
* Bank information – e.g. VISA and PayPal accounts.
* Username and password information.
* Social Security numbers.
* Information which can be used to retrieve forgotten or lost credentials.
MOBILE PHISHING:
Phishing scams are not limited to the internet. Some phishers use the telephone to make
requests for information. If you get a call from your banking institution asking for personal
information, hang up and call your bank directly. Your bank will have your social security number and
account information on file and should only ask you to verify a few digits.
like Iphone,Apple ,iTunes n more...By SMS
EXAMPLE:-
>>Congratulations! Your mobile phone has won US$ 10 Million prize money. To claim your money,
call this number XXXXXXXX,give your permanent address,pin number,account number or credit
card number...
Scaning
Scanning is basically use to scan local LAN and NETWORK
It also motoring To all Input and output data packets and connections
• Angry IP Scanner
• NetScan Tools
• Unicorn scan
• Nmap
Example : netstat –an
Session Hijacking
Session hijacking can be done at two levels:
• Network Level
• Application Level.
Network layer hijacking involves TCP and UDP sessions, whereas
Application level session hijack occurs with HTTP sessions. Successful attack on network level sessions
will provide the attacker some critical information which will than be used to attack
application level sessions, so most of the time they occur together depending on the system
that is attacked. Network level attacks are most attractive to an attacker because they do not have to
be customized on web application basis; they simply attack the data flow of the protocol, which is
common for all web applications

More Related Content

What's hot

Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
 

What's hot (19)

Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Web Security
Web SecurityWeb Security
Web Security
 
Cyber crime and security (1)
Cyber crime and security (1)Cyber crime and security (1)
Cyber crime and security (1)
 
Web security
Web securityWeb security
Web security
 
Hacking
HackingHacking
Hacking
 
Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.Hacking- Ethical/ Non-ethical, Cyber Security.
Hacking- Ethical/ Non-ethical, Cyber Security.
 
Hacking
HackingHacking
Hacking
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
BOTNET
BOTNETBOTNET
BOTNET
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Api security-present
Api security-presentApi security-present
Api security-present
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
 
Unit 3
Unit 3Unit 3
Unit 3
 
ip spoofing by Ipshita Nandy
 ip spoofing by Ipshita Nandy ip spoofing by Ipshita Nandy
ip spoofing by Ipshita Nandy
 
Important Notes
Important NotesImportant Notes
Important Notes
 
Protecting Your POS System from PoSeidon and Other Malware Attacks
Protecting Your POS System from PoSeidon and Other Malware AttacksProtecting Your POS System from PoSeidon and Other Malware Attacks
Protecting Your POS System from PoSeidon and Other Malware Attacks
 
ICT Form 4: Hacking
ICT Form 4: HackingICT Form 4: Hacking
ICT Form 4: Hacking
 

Similar to Attacks using local system

Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
Mehedi Hasan
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
Keshab Nath
 
Ethical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingEthical hacking is a based on computer hacking
Ethical hacking is a based on computer hacking
sxkkjbzq2k
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
Mehedi Hasan
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
DHRUV562167
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
Radiant Minds
 
Session2 2 김휘강 codegate2(hkkim)
Session2 2 김휘강 codegate2(hkkim)Session2 2 김휘강 codegate2(hkkim)
Session2 2 김휘강 codegate2(hkkim)
Korea University
 

Similar to Attacks using local system (20)

hacking
hackinghacking
hacking
 
Workshop on Cyber security and investigation
Workshop on Cyber security and investigationWorkshop on Cyber security and investigation
Workshop on Cyber security and investigation
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Ethical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingEthical hacking is a based on computer hacking
Ethical hacking is a based on computer hacking
 
31.ppt
31.ppt31.ppt
31.ppt
 
31.ppt
31.ppt31.ppt
31.ppt
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Hacking tutorial
Hacking tutorialHacking tutorial
Hacking tutorial
 
Cyber security
Cyber securityCyber security
Cyber security
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
cyber forensics
cyber forensicscyber forensics
cyber forensics
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Crontab Cyber Security session 4
Crontab Cyber Security session 4Crontab Cyber Security session 4
Crontab Cyber Security session 4
 
Session2 2 김휘강 codegate2(hkkim)
Session2 2 김휘강 codegate2(hkkim)Session2 2 김휘강 codegate2(hkkim)
Session2 2 김휘강 codegate2(hkkim)
 
Hacking In Detail
Hacking In DetailHacking In Detail
Hacking In Detail
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdf
YibeltalNibretu
 

Recently uploaded (20)

Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
 
2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx2024_Student Session 2_ Set Plan Preparation.pptx
2024_Student Session 2_ Set Plan Preparation.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Accounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdfAccounting and finance exit exam 2016 E.C.pdf
Accounting and finance exit exam 2016 E.C.pdf
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 

Attacks using local system

  • 2. Attacks Using Local System: • Session Hijacking • Windows Hacking • Scanning • Phishing
  • 3. Windows Hacking Hacking : -Art of exploring various security breaches is termed as Hacking. -Legal or illegal but unauthorised way of bypass any security mechanism Windows Hacking – Art Of windows Security bypass and Find Loop whole and vulnerability is call a windows Hacking Compute security : • BIOS –Password • Syskey • Login
  • 4. Phishing Phishing: -Spear phishing is a targeted email scam with the sole purpose of obtaining unauthorized access to sensitive data Phishing attacks generally target: * Bank information – e.g. VISA and PayPal accounts. * Username and password information. * Social Security numbers. * Information which can be used to retrieve forgotten or lost credentials. MOBILE PHISHING: Phishing scams are not limited to the internet. Some phishers use the telephone to make requests for information. If you get a call from your banking institution asking for personal information, hang up and call your bank directly. Your bank will have your social security number and account information on file and should only ask you to verify a few digits.
  • 5. like Iphone,Apple ,iTunes n more...By SMS EXAMPLE:- >>Congratulations! Your mobile phone has won US$ 10 Million prize money. To claim your money, call this number XXXXXXXX,give your permanent address,pin number,account number or credit card number...
  • 6. Scaning Scanning is basically use to scan local LAN and NETWORK It also motoring To all Input and output data packets and connections • Angry IP Scanner • NetScan Tools • Unicorn scan • Nmap Example : netstat –an
  • 7. Session Hijacking Session hijacking can be done at two levels: • Network Level • Application Level. Network layer hijacking involves TCP and UDP sessions, whereas Application level session hijack occurs with HTTP sessions. Successful attack on network level sessions will provide the attacker some critical information which will than be used to attack application level sessions, so most of the time they occur together depending on the system that is attacked. Network level attacks are most attractive to an attacker because they do not have to be customized on web application basis; they simply attack the data flow of the protocol, which is common for all web applications