Ethical Hacking
VIPIN RAWAT
M.TECH (CSE)
ETHICAL HACKING
•Process of legally hacking the information that is considered
to be confidential .
▫Uses same techniques & tactics used by the hackers
▫An expert hired by an organization, to attempt to attack their
network and computer system, the same way a hacker would.
▫Uses same techniques & tactics used by the hackers
ETHICAL HACKER AND HACKER
ETHICAL HACKER
1. Done legally with permission of the respective
organization.
HACKER
1. Done illegally without the consent of the
respective organization
Types of hacker
 There are mainly three types of hacker
 •White Hat Hackers 
 ▫Professional term for ethical hackers(good work)
 •Black Hat Hackers 
 ▫Professional term for malicious hackers.(useless
work)
 •Gray Hat Hackers  (both above)
 ▫Combination of both, hack to learn
 ▫Self-proclaimed ethical hackers
History of hackers
 Hacking in the past 40 years
 1960s –MIT’s artificial intelligence lab, became
staging grounds for hackers.
 •1970s –John Draper makes a long-distance call
for free
 1980s –Kevin Mtnick, secretly monitors the email
of MCI and Digital Equipment security officials
 1990s –Hackers break Web sites, including the
U.S. Department of Justice, U.S. Air Force, CIA,
Trick :>facebook ,gmail,and A/C
pin & password.and online account
There are only three method used
 Keylogging
 Phishing
 Social enggineering
 KEYLOGGER
keylogger basicaly a software it is save the all key
stroke….
Phishing
 Phishing the way of attempting to acquire
sensitive information such as usernames,
passwords and credit card details
How to create a phishing page?
Hi friends we are create a facebook fake
login page..
open welcome to facebook and then
view open source page ..now copy the
code(crtl+c) and then paste the code
notepad.(Ctrl+v)
now save victim.html and enjoy the
facebook fake page.
Facebook fake login page
How to show the friends
facebook password?
 Now we are show the
hidden password ..as
like..********this
 now fb page right
click and open the
inspect element.
 Then
password<hidden>
 Now change
pass<text>
How to open the one and more fb
a/c at a same time and same
browser?
I want to say that how to
open the multiple fb
a/c at the same time
> Now open the google
chrome and go the
setting ..and add the
new user then enjoy
the multiple id at the
same time…
SQL Injection
SQL (Structured Query Language)
Standard SQL commands such as “Select” “Insert”,
“Update”, “Delete”, “Create”, and “Drop”.
TRICK:> website hacking by
SQL injection
 First of open the collage and other website
administrater (admin) login
 Admin
 password
 Example:>we copy the query and now
paste admin and password..
 $username = 1' or '1' = '1
 $password = 1' or '1' = '1
 Open website and see all data
HACK WHATSAPP ACCOUNT
 Follow my given path:-
 First of go to phone memory then
 Whatsapp folder
 Then whatsApp database
 Then copy the msgstore-2016-11-
23.db.crypt8.

To decrypt what sapp encrypted data so go
http://whatcrypt.com/?cmd=_decrypt#.WDVIiBoRv
n0
ANDROID TRICKS
 1. Phone Information, Usage and Battery – *#*#4636#*#*
2. IMEI Number – *#06#
3. Enter Service Menu On Newer Phones – *#0*#
4. Detailed Camera Information –*#*#34971539#*#*
5. Backup All Media Files –*#*#273282*255*663282*#*#*
6. Wireless LAN Test –*#*#232339#*#*
7. Enable Test Mode for Service –*#*#197328640#*#*
8. Back-light Test – *#*#0842#*#*
9. Test the Touch screen –*#*#2664#*#*
10. Vibration Test – *#*#0842#*#*
11. FTA Software Version –*#*#1111#*#*
12. Complete Software and Hardware Info – *#12580*369#
13. Diagnostic Configuration –*#9090#
14. USB Logging Control –*#872564#
15. System Dump Mode – *#9900#
16. HSDPA/HSUPA Control Menu –*#301279#
17. View Phone Lock Status –*#7465625#
18. Reset the Data Partition to Factory State – *#*#7780#*#*
@
THANK YOU

Basic ethical hacking for seminar presentation

  • 1.
  • 2.
    ETHICAL HACKING •Process oflegally hacking the information that is considered to be confidential . ▫Uses same techniques & tactics used by the hackers ▫An expert hired by an organization, to attempt to attack their network and computer system, the same way a hacker would. ▫Uses same techniques & tactics used by the hackers
  • 3.
    ETHICAL HACKER ANDHACKER ETHICAL HACKER 1. Done legally with permission of the respective organization. HACKER 1. Done illegally without the consent of the respective organization
  • 4.
    Types of hacker There are mainly three types of hacker  •White Hat Hackers   ▫Professional term for ethical hackers(good work)  •Black Hat Hackers   ▫Professional term for malicious hackers.(useless work)  •Gray Hat Hackers  (both above)  ▫Combination of both, hack to learn  ▫Self-proclaimed ethical hackers
  • 5.
    History of hackers Hacking in the past 40 years  1960s –MIT’s artificial intelligence lab, became staging grounds for hackers.  •1970s –John Draper makes a long-distance call for free  1980s –Kevin Mtnick, secretly monitors the email of MCI and Digital Equipment security officials  1990s –Hackers break Web sites, including the U.S. Department of Justice, U.S. Air Force, CIA,
  • 6.
    Trick :>facebook ,gmail,andA/C pin & password.and online account There are only three method used  Keylogging  Phishing  Social enggineering  KEYLOGGER keylogger basicaly a software it is save the all key stroke….
  • 7.
    Phishing  Phishing theway of attempting to acquire sensitive information such as usernames, passwords and credit card details
  • 8.
    How to createa phishing page? Hi friends we are create a facebook fake login page.. open welcome to facebook and then view open source page ..now copy the code(crtl+c) and then paste the code notepad.(Ctrl+v) now save victim.html and enjoy the facebook fake page.
  • 9.
  • 10.
    How to showthe friends facebook password?  Now we are show the hidden password ..as like..********this  now fb page right click and open the inspect element.  Then password<hidden>  Now change pass<text>
  • 11.
    How to openthe one and more fb a/c at a same time and same browser? I want to say that how to open the multiple fb a/c at the same time > Now open the google chrome and go the setting ..and add the new user then enjoy the multiple id at the same time…
  • 12.
    SQL Injection SQL (StructuredQuery Language) Standard SQL commands such as “Select” “Insert”, “Update”, “Delete”, “Create”, and “Drop”.
  • 13.
    TRICK:> website hackingby SQL injection  First of open the collage and other website administrater (admin) login  Admin  password  Example:>we copy the query and now paste admin and password..  $username = 1' or '1' = '1  $password = 1' or '1' = '1  Open website and see all data
  • 14.
    HACK WHATSAPP ACCOUNT Follow my given path:-  First of go to phone memory then  Whatsapp folder  Then whatsApp database  Then copy the msgstore-2016-11- 23.db.crypt8. 
  • 16.
    To decrypt whatsapp encrypted data so go http://whatcrypt.com/?cmd=_decrypt#.WDVIiBoRv n0
  • 17.
    ANDROID TRICKS  1.Phone Information, Usage and Battery – *#*#4636#*#* 2. IMEI Number – *#06# 3. Enter Service Menu On Newer Phones – *#0*# 4. Detailed Camera Information –*#*#34971539#*#* 5. Backup All Media Files –*#*#273282*255*663282*#*#* 6. Wireless LAN Test –*#*#232339#*#* 7. Enable Test Mode for Service –*#*#197328640#*#* 8. Back-light Test – *#*#0842#*#*
  • 18.
    9. Test theTouch screen –*#*#2664#*#* 10. Vibration Test – *#*#0842#*#* 11. FTA Software Version –*#*#1111#*#* 12. Complete Software and Hardware Info – *#12580*369# 13. Diagnostic Configuration –*#9090# 14. USB Logging Control –*#872564# 15. System Dump Mode – *#9900# 16. HSDPA/HSUPA Control Menu –*#301279# 17. View Phone Lock Status –*#7465625# 18. Reset the Data Partition to Factory State – *#*#7780#*#*
  • 19.