SlideShare a Scribd company logo
Awareness against Hacking
Author’s Name: Dipnarayan Das
Author’s Email: dipnarayan.das35@gmail.com
How to create Virtual Lab
Virtual Box
VirtualBox is a powerful x86 and
AMD64/Intel64 virtualization product
for enterprise as well as home use.
It is freely available as Open Source
Software under the terms of the
GNU General Public License (GPL).
Contd…
Version:
New April 17th, 2018
VirtualBox 5.1.36 released!
New October 18th, 2017
VirtualBox 5.2 released!
Contd…
Platforms:
Presently, VirtualBox runs on
Windows, Linux, Macintosh, and
Solaris hosts and supports a large
number of guest operating systems
including but not limited to Windows
(NT 4.0, 2000, XP, Server 2003,
Vista, Windows 7, Windows 8,
Windows 10), DOS/Windows 3.x,
Linux (2.4, 2.6, 3.x and 4.x), Solaris
and OpenSolaris, OS/2, and
OpenBSD.
Hacking OS
Kali Linux
Kali Linux is the new generation of
the industry-leading BackTrack Linux
penetration testing and security
auditing Linux distribution. Kali
Linux is a complete re-build of
BackTrack from the ground up,
adhering completely to Debian
development standards.
Parrot Universe
Parrot is a GNU/Linux distribution
based on Debian Testing and
designed with Security,
Development and Privacy in mind.
It includes a full portable laboratory
for security and digital forensics
experts, but it also includes all you
need to develop your own software
or protect your privacy while surfing
the net.
Pics of Hacking OS
Fig 1. Kali Linux Customized Fig 2. Kali Linux Standard
Fig 3. Parrot Menu Options Fig 4. Parrot Editor Panel
What is Cryptography
Cryptography
Cryptography is associated with the
process of converting ordinary plain
text into unintelligible text and vice-
versa. It is a method of storing and
transmitting data in a particular
form so that only those for whom it
is intended can read and process it.
Cryptography not only protects data
from theft or alteration, but can also
be used for user authentication.
Caesar cipher
In cryptography, a Caesar cipher,
also known as Caesar's cipher, the
shift cipher, Caesar's code or Caesar
shift, is one of the simplest and
most widely known encryption
techniques. It is a type of
substitution cipher in which each
letter in the plaintext is replaced by
a letter some fixed number of
positions down the alphabet. For
example, with a left shift of 3, D
would be replaced by A, E would
become B, and so on. The method is
named after Julius Caesar, who used
it in his private correspondence.
The action of a Caesar cipher is to
replace each plaintext letter with a
different one a fixed number of
places down the alphabet. The
cipher illustrated here uses a left
shift of three, so that (for example)
each occurrence of E in the
plaintext becomes B in the cipher
text.
Continue…
In cryptography, a Caesar cipher,
also known as Caesar's cipher, the
shift cipher, Caesar's code or Caesar
shift, is one of the simplest and
most widely known encryption
techniques. It is a type of
substitution cipher in which each
letter in the plaintext is replaced by
a letter some fixed number of
positions down the alphabet. For
example, with a left shift of 3, D
would be replaced by A, E would
become B, and so on. The method is
named after Julius Caesar, who used
it in his private correspondence.
Decryption
shift
Candidate plaintext
0 exxegoexsrgi
1 dwwdfndwrqfh
2 cvvcemcvqpeg
3 buubdlbupodf
4 attackatonce
5 zsszbjzsnmbd
6 yrryaiyrmlac
...
23 haahjrhavujl
24 gzzgiqgzutik
25 fyyfhpfytshj
Caesar Encryption &
Decryption
c2d = dict(zip("abcdefghijklmnopqrstuvwxyz",range(26)))
d2c = dict(zip(range(26),"abcdefghijklmnopqrstuvwxyz"))
for i in range(26):
key_c = i
ciphertext =
"wshpualeapzhalytbzlkpujyfwavnyhwofaohaylmlyzavhtlzzhnlilmvyllujyfwapvuvyhmalykljyfwapvuhukpzhtlzzhnl
puhmvytaohapzlhzpsfylhkhislifobthuz"
# encipher
plaintext = ""
for c in ciphertext:
if c: plaintext += d2c[ (c2d[c] + key_c)%26 ]
else: plaintext += c
print(plaintext)
print("n")
'''
Answer:
Key is 19
Text is "PLAIN TEXT IS A TERM USED IN CRYPTOGRAPHY THAT REFERS TO A MESSAGE BEFORE ENCRYPTION OR
AFTER DECRYPTION AND IS A MESSAGE IN A FORM THAT IS EASILY READABLE BY HUMANS"
'''
Hacking Tools
Hacking Tools
Trojan Horse is a method that enables the cracker to set up a way to intrude on a
computer or a system, by having his/her code installed with useful software on the
machine, network, or system. The cracker can enter the system through that back door
later on. Examples of this useful software are programs that mimic login screens,
viruses that fool the user to download programs, and other applications.
Snooper is an application that enables the cracker to capture secure information while it
is in transit within a computer or a network. For example, information transported
between web pages for form applications transitions and stages, and the transportation
of information from a form to the server.
A worm is an application that looks for weaknesses in a system or a network, and
reproduces itself on that system till the system crashes. A virus on the other hand, is
attached to software, and is spread once the software is executed. The danger of a
virus can be as harmless as a sound, or a picture, or as harmful as a worm, that
changes the binary setting of the computer, and crashes the system. Further light will
be shed on how each of viruses and worms act when accessing a system.
Vulnerability Scanner is a tool that is used to check if a computer on a network has a
known weakness. There are also port scanners that enable the cracker to determine the
open port that can be accessed through to the computer.
Packet Sniffing can be used for network monitoring, and for troubleshooting. It can be a
powerful tool to gather information that helps compromise the network.
Hacking Thwarting
Hacking Thwarting
Some of the methods and
techniques that are used to reduce
the effects of hackers and malicious
software are developed by different
companies. Companies vary in their
ideas of what is the weakest point in
a network that should be protected
from hackers. Each software tool
has its negatives and positives, and
below, is a discussion of some of the
tools that are used to lessen the
intrusion of a hacker or virus to a
network system.
IDS (Intrusion Detection
System)
In cryptography, a Caesar cipher,
also known as Caesar's cipher, the
shift cipher, Caesar's code or Caesar
shift, is one of the simplest and
most widely known encryption
techniques. It is a type of
substitution cipher in which each
letter in the plaintext is replaced by
a letter some fixed number of
positions down the alphabet. For
example, with a left shift of 3, D
would be replaced by A, E would
become B, and so on. The method is
named after Julius Caesar, who used
it in his private correspondence.
Performance Analysis
In cryptography, a Caesar cipher,
also known as Caesar's cipher, the
shift cipher, Caesar's code or Caesar
shift, is one of the simplest and
most widely known encryption
techniques. It is a type of
substitution cipher in which each
letter in the plaintext is replaced by
a letter some fixed number of
positions down the alphabet. For
example, with a left shift of 3, D
would be replaced by A, E would
become B, and so on. The method is
named after Julius Caesar, who used
it in his private correspondence.
Computer Performance
Analysis
In cryptography, a Caesar cipher,
also known as Caesar's cipher, the
shift cipher, Caesar's code or Caesar
shift, is one of the simplest and
most widely known encryption
techniques. It is a type of
substitution cipher in which each
letter in the plaintext is replaced by
a letter some fixed number of
positions down the alphabet. For
example, with a left shift of 3, D
would be replaced by A, E would
become B, and so on. The method is
named after Julius Caesar, who used
it in his private correspondence.
Website Spam Detection
In cryptography, a Caesar cipher,
also known as Caesar's cipher, the
shift cipher, Caesar's code or Caesar
shift, is one of the simplest and
most widely known encryption
techniques. It is a type of
substitution cipher in which each
letter in the plaintext is replaced by
a letter some fixed number of
positions down the alphabet. For
example, with a left shift of 3, D
would be replaced by A, E would
become B, and so on. The method is
named after Julius Caesar, who used
it in his private correspondence.
Example of Infection
Program
Overview of Xblades.exe
What Is Xblades.exe?
Xblades.exe is a type of EXE file associated with X-
Blades developed by Gaijin Entertainment for the
Windows Operating System. The latest known version
of Xblades.exe is 1.0.0.0, which was produced for
Windows XP. This EXE file carries a popularity rating of
1 stars and a security rating of "UNKNOWN".
What Are EXE Files?
EXE ("executable") files, such as xblades.exe, are files
that contain step-by-step instructions that a
computer follows to carry out a function. When
you "double-click" an EXE file, your computer
automatically executes these instructions designed by a
software developer (eg. Gaijin Entertainment) to run a
program (eg. X-Blades) on your PC.
Every software application on your PC uses an
executable file - your web browser, word processor,
spreadsheet program, etc. - making it one of the most
useful kinds of files in the Windows operating system.
Without executable files like xblades.exe, you wouldn't
be able to use any programs on your PC.
Example Attack
Target Convolution
Change target at attack scene
Continue…
User attacked the Target
Continue…
You are the target victim
Thank you
For any query or any report, viewer can contact with my email.

More Related Content

Similar to Awareness against hacking

Cryptography (Revised Edition)
Cryptography (Revised Edition)Cryptography (Revised Edition)
Cryptography (Revised Edition)
Somaditya Basak
 
Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityIntroductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information Security
Bikramjit Sarkar, Ph.D.
 
Viruses and Anti-Viruses
Viruses and Anti-VirusesViruses and Anti-Viruses
Viruses and Anti-Viruses
Ayman Hussein
 
COMP416-Risk-and-threats_127798.pptx
COMP416-Risk-and-threats_127798.pptxCOMP416-Risk-and-threats_127798.pptx
COMP416-Risk-and-threats_127798.pptx
ChHammad22
 
Alice & bob public key cryptography 101
Alice & bob  public key cryptography 101Alice & bob  public key cryptography 101
Alice & bob public key cryptography 101
Joshua Thijssen
 
Hacking
HackingHacking
Hacking
SUNY Oneonta
 
Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03
Saif Kassim
 
Encrypted message transmitter on public network
Encrypted message transmitter on public networkEncrypted message transmitter on public network
Encrypted message transmitter on public network
Rowshina Nikzad
 
Chasing the Adder. A tale from the APT world...
Chasing the Adder. A tale from the APT world...Chasing the Adder. A tale from the APT world...
Chasing the Adder. A tale from the APT world...
Stefano Maccaglia
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a
Google
 
Criptography
CriptographyCriptography
Criptography
Sajan Sahu
 
Cns 1
Cns 1Cns 1
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
Seema Goel
 
The Ultimate IDS Smackdown
The Ultimate IDS SmackdownThe Ultimate IDS Smackdown
The Ultimate IDS Smackdown
Mario Heiderich
 
Cryptography chap#6.pptx
Cryptography chap#6.pptxCryptography chap#6.pptx
Cryptography chap#6.pptx
HamnaMalik31
 
Introduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key InfrastructureIntroduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key Infrastructure
Mike Gates
 
The Hidden XSS - Attacking the Desktop & Mobile Platforms
The Hidden XSS - Attacking the Desktop & Mobile PlatformsThe Hidden XSS - Attacking the Desktop & Mobile Platforms
The Hidden XSS - Attacking the Desktop & Mobile Platforms
kosborn
 
Cryptography and .NET
Cryptography and .NETCryptography and .NET
Cryptography and .NET
GlobalLogic Ukraine
 
Ransomware for fun and non-profit
Ransomware for fun and non-profitRansomware for fun and non-profit
Ransomware for fun and non-profit
Youness Zougar
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
Christopher Martin
 

Similar to Awareness against hacking (20)

Cryptography (Revised Edition)
Cryptography (Revised Edition)Cryptography (Revised Edition)
Cryptography (Revised Edition)
 
Introductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information SecurityIntroductory Lecture on Cryptography and Information Security
Introductory Lecture on Cryptography and Information Security
 
Viruses and Anti-Viruses
Viruses and Anti-VirusesViruses and Anti-Viruses
Viruses and Anti-Viruses
 
COMP416-Risk-and-threats_127798.pptx
COMP416-Risk-and-threats_127798.pptxCOMP416-Risk-and-threats_127798.pptx
COMP416-Risk-and-threats_127798.pptx
 
Alice & bob public key cryptography 101
Alice & bob  public key cryptography 101Alice & bob  public key cryptography 101
Alice & bob public key cryptography 101
 
Hacking
HackingHacking
Hacking
 
Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03Computer Security (Cryptography) Ch03
Computer Security (Cryptography) Ch03
 
Encrypted message transmitter on public network
Encrypted message transmitter on public networkEncrypted message transmitter on public network
Encrypted message transmitter on public network
 
Chasing the Adder. A tale from the APT world...
Chasing the Adder. A tale from the APT world...Chasing the Adder. A tale from the APT world...
Chasing the Adder. A tale from the APT world...
 
Op Sy 03 Ch 61a
Op Sy 03 Ch 61aOp Sy 03 Ch 61a
Op Sy 03 Ch 61a
 
Criptography
CriptographyCriptography
Criptography
 
Cns 1
Cns 1Cns 1
Cns 1
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
The Ultimate IDS Smackdown
The Ultimate IDS SmackdownThe Ultimate IDS Smackdown
The Ultimate IDS Smackdown
 
Cryptography chap#6.pptx
Cryptography chap#6.pptxCryptography chap#6.pptx
Cryptography chap#6.pptx
 
Introduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key InfrastructureIntroduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key Infrastructure
 
The Hidden XSS - Attacking the Desktop & Mobile Platforms
The Hidden XSS - Attacking the Desktop & Mobile PlatformsThe Hidden XSS - Attacking the Desktop & Mobile Platforms
The Hidden XSS - Attacking the Desktop & Mobile Platforms
 
Cryptography and .NET
Cryptography and .NETCryptography and .NET
Cryptography and .NET
 
Ransomware for fun and non-profit
Ransomware for fun and non-profitRansomware for fun and non-profit
Ransomware for fun and non-profit
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 

Recently uploaded

THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
zuzanka
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Kalna College
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
Nguyen Thanh Tu Collection
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
heathfieldcps1
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
andagarcia212
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
sanamushtaq922
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
blueshagoo1
 
Ch-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdfCh-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdf
lakshayrojroj
 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
MJDuyan
 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapitolTechU
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
RandolphRadicy
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
Celine George
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
Celine George
 
adjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammaradjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammar
7DFarhanaMohammed
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
TechSoup
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
Nguyen Thanh Tu Collection
 

Recently uploaded (20)

THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
 
SWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptxSWOT analysis in the project Keeping the Memory @live.pptx
SWOT analysis in the project Keeping the Memory @live.pptx
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
 
The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
欧洲杯下注-欧洲杯下注押注官网-欧洲杯下注押注网站|【​网址​🎉ac44.net🎉​】
 
Observational Learning
Observational Learning Observational Learning
Observational Learning
 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
 
Ch-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdfCh-4 Forest Society and colonialism 2.pdf
Ch-4 Forest Society and colonialism 2.pdf
 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
 
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptxCapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
CapTechTalks Webinar Slides June 2024 Donovan Wright.pptx
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
 
How to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in useHow to Fix [Errno 98] address already in use
How to Fix [Errno 98] address already in use
 
How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17How to Setup Default Value for a Field in Odoo 17
How to Setup Default Value for a Field in Odoo 17
 
adjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammaradjectives.ppt for class 1 to 6, grammar
adjectives.ppt for class 1 to 6, grammar
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 8 - CẢ NĂM - FRIENDS PLUS - NĂM HỌC 2023-2024 (B...
 

Awareness against hacking

  • 1. Awareness against Hacking Author’s Name: Dipnarayan Das Author’s Email: dipnarayan.das35@gmail.com
  • 2. How to create Virtual Lab
  • 3. Virtual Box VirtualBox is a powerful x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. It is freely available as Open Source Software under the terms of the GNU General Public License (GPL).
  • 4. Contd… Version: New April 17th, 2018 VirtualBox 5.1.36 released! New October 18th, 2017 VirtualBox 5.2 released!
  • 5. Contd… Platforms: Presently, VirtualBox runs on Windows, Linux, Macintosh, and Solaris hosts and supports a large number of guest operating systems including but not limited to Windows (NT 4.0, 2000, XP, Server 2003, Vista, Windows 7, Windows 8, Windows 10), DOS/Windows 3.x, Linux (2.4, 2.6, 3.x and 4.x), Solaris and OpenSolaris, OS/2, and OpenBSD.
  • 7. Kali Linux Kali Linux is the new generation of the industry-leading BackTrack Linux penetration testing and security auditing Linux distribution. Kali Linux is a complete re-build of BackTrack from the ground up, adhering completely to Debian development standards.
  • 8. Parrot Universe Parrot is a GNU/Linux distribution based on Debian Testing and designed with Security, Development and Privacy in mind. It includes a full portable laboratory for security and digital forensics experts, but it also includes all you need to develop your own software or protect your privacy while surfing the net.
  • 10. Fig 1. Kali Linux Customized Fig 2. Kali Linux Standard
  • 11. Fig 3. Parrot Menu Options Fig 4. Parrot Editor Panel
  • 13. Cryptography Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice- versa. It is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography not only protects data from theft or alteration, but can also be used for user authentication.
  • 14. Caesar cipher In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence. The action of a Caesar cipher is to replace each plaintext letter with a different one a fixed number of places down the alphabet. The cipher illustrated here uses a left shift of three, so that (for example) each occurrence of E in the plaintext becomes B in the cipher text.
  • 15. Continue… In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence. Decryption shift Candidate plaintext 0 exxegoexsrgi 1 dwwdfndwrqfh 2 cvvcemcvqpeg 3 buubdlbupodf 4 attackatonce 5 zsszbjzsnmbd 6 yrryaiyrmlac ... 23 haahjrhavujl 24 gzzgiqgzutik 25 fyyfhpfytshj
  • 16. Caesar Encryption & Decryption c2d = dict(zip("abcdefghijklmnopqrstuvwxyz",range(26))) d2c = dict(zip(range(26),"abcdefghijklmnopqrstuvwxyz")) for i in range(26): key_c = i ciphertext = "wshpualeapzhalytbzlkpujyfwavnyhwofaohaylmlyzavhtlzzhnlilmvyllujyfwapvuvyhmalykljyfwapvuhukpzhtlzzhnl puhmvytaohapzlhzpsfylhkhislifobthuz" # encipher plaintext = "" for c in ciphertext: if c: plaintext += d2c[ (c2d[c] + key_c)%26 ] else: plaintext += c print(plaintext) print("n") ''' Answer: Key is 19 Text is "PLAIN TEXT IS A TERM USED IN CRYPTOGRAPHY THAT REFERS TO A MESSAGE BEFORE ENCRYPTION OR AFTER DECRYPTION AND IS A MESSAGE IN A FORM THAT IS EASILY READABLE BY HUMANS" '''
  • 18. Hacking Tools Trojan Horse is a method that enables the cracker to set up a way to intrude on a computer or a system, by having his/her code installed with useful software on the machine, network, or system. The cracker can enter the system through that back door later on. Examples of this useful software are programs that mimic login screens, viruses that fool the user to download programs, and other applications. Snooper is an application that enables the cracker to capture secure information while it is in transit within a computer or a network. For example, information transported between web pages for form applications transitions and stages, and the transportation of information from a form to the server. A worm is an application that looks for weaknesses in a system or a network, and reproduces itself on that system till the system crashes. A virus on the other hand, is attached to software, and is spread once the software is executed. The danger of a virus can be as harmless as a sound, or a picture, or as harmful as a worm, that changes the binary setting of the computer, and crashes the system. Further light will be shed on how each of viruses and worms act when accessing a system. Vulnerability Scanner is a tool that is used to check if a computer on a network has a known weakness. There are also port scanners that enable the cracker to determine the open port that can be accessed through to the computer. Packet Sniffing can be used for network monitoring, and for troubleshooting. It can be a powerful tool to gather information that helps compromise the network.
  • 20. Hacking Thwarting Some of the methods and techniques that are used to reduce the effects of hackers and malicious software are developed by different companies. Companies vary in their ideas of what is the weakest point in a network that should be protected from hackers. Each software tool has its negatives and positives, and below, is a discussion of some of the tools that are used to lessen the intrusion of a hacker or virus to a network system.
  • 21. IDS (Intrusion Detection System) In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence.
  • 22. Performance Analysis In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence.
  • 23. Computer Performance Analysis In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence.
  • 24. Website Spam Detection In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code or Caesar shift, is one of the simplest and most widely known encryption techniques. It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet. For example, with a left shift of 3, D would be replaced by A, E would become B, and so on. The method is named after Julius Caesar, who used it in his private correspondence.
  • 26. Overview of Xblades.exe What Is Xblades.exe? Xblades.exe is a type of EXE file associated with X- Blades developed by Gaijin Entertainment for the Windows Operating System. The latest known version of Xblades.exe is 1.0.0.0, which was produced for Windows XP. This EXE file carries a popularity rating of 1 stars and a security rating of "UNKNOWN". What Are EXE Files? EXE ("executable") files, such as xblades.exe, are files that contain step-by-step instructions that a computer follows to carry out a function. When you "double-click" an EXE file, your computer automatically executes these instructions designed by a software developer (eg. Gaijin Entertainment) to run a program (eg. X-Blades) on your PC. Every software application on your PC uses an executable file - your web browser, word processor, spreadsheet program, etc. - making it one of the most useful kinds of files in the Windows operating system. Without executable files like xblades.exe, you wouldn't be able to use any programs on your PC.
  • 30. Continue… You are the target victim
  • 31. Thank you For any query or any report, viewer can contact with my email.