ETHICAL HACKING




BY …..
         Miss. Pallavi S. Sonone (CSE Dept. PLIT, Buldana)
Hacking Include’s…….
ď‚§   Password Cracking
ď‚§   Trojans
ď‚§   Phishing
ď‚§   Facebook Hacking
ď‚§   Sniffers
ď‚§   IP Tracking
ď‚§   Website Hacking
ď‚§   Cross Site Scripting
ď‚§   Proxies
ď‚§   Remote Testers
ď‚§   Port Hacking
ď‚§   Mobile Phone Hacking
ď‚§   WiFi Hacking
ď‚§   Social Engineering
ď‚§   ATM Machine Hacking
IP Address:

  This address is unique for different devices.

e.g.
       172.16.254.1
       225.168.1.20
TORRENTs UNBLOCKING:


ď‚§ How Torrents Blocked?



 -Disable Torrent Clients

-Block Download of .torrent extension files
COOKIES:

ď‚§ It is a text file stored on our computer sort by
  the website on user machine.

ď‚§ -Cookies logged us automatically(On
  google.com)

ď‚§ -allows to customize background image(On
  google.com)
TYPES Of Cookies:


ď‚§ Session/ Temporary Cookies:
ď‚§ Persistent Cookies:
ď‚§ First-Party Cookies:
ď‚§ Third-Party Cookies:
ď‚§ Unsatisfactory Cookies:
TROJANs:

ď‚§ Trojans are RATs or Remote Administration
  Tools that give an attacker remote control or
  remote access to the victims computer.
Protection:

ď‚§ Trojan should start automatically (Whenever
  windows boots)

ď‚§ Trojan has to open a port


ď‚§ Trojan has to be loaded into memory
SPOOFING:

Spoofing means
         “Hacking Other’s Email, SMS or Call”

There Are Three Types Of SPOOFING:
  1) EMAIL Spoofing:
  2)SMS Spoofing:
  3) Call Spoofing:
PASSWORD CRACKING:

Include’s…
ď‚§ Online Account
ď‚§ Admin/Windows Login Password Cracking
ď‚§ File/Application Cracking
ď‚§ BIOS Cracking
ď‚§ Network Cracking(FTP, SQL, Coporate email)
ď‚§ Wifi Passwords
ď‚§ Mobile Login Cracking
MAFIABOY:
DOS ATTACK:

ď‚§ To bring down an entire network


ď‚§ -Each system connected to internet has
  limited bandwidth available.

ď‚§ [If our computer has bandwidth of 2mbps &
  the criminal sends 100mbps of data then our
  computer will crack]
TYPES OF DOS ATTACK:

1.Ping Of Death:
2.TearDrop:


1]Ping Of Death:

65,536 bytes is the size of data packet.

(Not Larger Attack)
.
2 TearDrop:
Data is broken down into smaller
chunks of data
e.g. 4000 Bytes
     Chunk A 1-1500 bytes
     Chunk B 1500-3000 bytes
     Chunk C 3000-4000 bytes

DOS attack is extremely dangerous
STEGNOGRAPHY:

Hiding of any file or data into the other file

TYPES OF STEGNOGRAPHY:

1. Image STEGNOGRAPHY
2. Text STEGNOGRAPHY
3. Spam(Mimic) STEGNOGRAPHY
ROAD SIGN HACKING:
ATM MACHINE HACKING:
BEST SECURITY PRACTICES:
1. Install a FIREWALL: Zone Alarm (Free
   Download)
2. Use an Antivirus: Update it Weakly
3. Use an ANTISPYWARE: PrevX, SpySweeper
4. Update your OS: Every 15 days
5. Choose a Strong Password
6. Avoid Public computer to bank or shop
   Online.
7. Secure your WiFi: Enable WEP, WPA or WPA2
8. Encrypt your Data/Folders/Drivers: Truecrypt
9. Use Digital signature/PGP Encrypted Email
….

Ethical Hacking

  • 1.
    ETHICAL HACKING BY ….. Miss. Pallavi S. Sonone (CSE Dept. PLIT, Buldana)
  • 2.
    Hacking Include’s…….  Password Cracking  Trojans  Phishing  Facebook Hacking  Sniffers  IP Tracking  Website Hacking  Cross Site Scripting  Proxies  Remote Testers  Port Hacking  Mobile Phone Hacking  WiFi Hacking  Social Engineering  ATM Machine Hacking
  • 3.
    IP Address: This address is unique for different devices. e.g. 172.16.254.1 225.168.1.20
  • 4.
    TORRENTs UNBLOCKING: ď‚§ HowTorrents Blocked? -Disable Torrent Clients -Block Download of .torrent extension files
  • 5.
    COOKIES: ď‚§ It isa text file stored on our computer sort by the website on user machine. ď‚§ -Cookies logged us automatically(On google.com) ď‚§ -allows to customize background image(On google.com)
  • 6.
    TYPES Of Cookies: ď‚§Session/ Temporary Cookies: ď‚§ Persistent Cookies: ď‚§ First-Party Cookies: ď‚§ Third-Party Cookies: ď‚§ Unsatisfactory Cookies:
  • 7.
    TROJANs: ď‚§ Trojans areRATs or Remote Administration Tools that give an attacker remote control or remote access to the victims computer.
  • 8.
    Protection: ď‚§ Trojan shouldstart automatically (Whenever windows boots) ď‚§ Trojan has to open a port ď‚§ Trojan has to be loaded into memory
  • 9.
    SPOOFING: Spoofing means “Hacking Other’s Email, SMS or Call” There Are Three Types Of SPOOFING: 1) EMAIL Spoofing: 2)SMS Spoofing: 3) Call Spoofing:
  • 10.
    PASSWORD CRACKING: Include’s…  OnlineAccount  Admin/Windows Login Password Cracking  File/Application Cracking  BIOS Cracking  Network Cracking(FTP, SQL, Coporate email)  Wifi Passwords  Mobile Login Cracking
  • 11.
  • 12.
    DOS ATTACK: ď‚§ Tobring down an entire network ď‚§ -Each system connected to internet has limited bandwidth available. ď‚§ [If our computer has bandwidth of 2mbps & the criminal sends 100mbps of data then our computer will crack]
  • 13.
    TYPES OF DOSATTACK: 1.Ping Of Death: 2.TearDrop: 1]Ping Of Death: 65,536 bytes is the size of data packet. (Not Larger Attack)
  • 14.
    . 2 TearDrop: Data isbroken down into smaller chunks of data e.g. 4000 Bytes Chunk A 1-1500 bytes Chunk B 1500-3000 bytes Chunk C 3000-4000 bytes DOS attack is extremely dangerous
  • 15.
    STEGNOGRAPHY: Hiding of anyfile or data into the other file TYPES OF STEGNOGRAPHY: 1. Image STEGNOGRAPHY 2. Text STEGNOGRAPHY 3. Spam(Mimic) STEGNOGRAPHY
  • 16.
  • 17.
  • 18.
    BEST SECURITY PRACTICES: 1.Install a FIREWALL: Zone Alarm (Free Download) 2. Use an Antivirus: Update it Weakly 3. Use an ANTISPYWARE: PrevX, SpySweeper 4. Update your OS: Every 15 days 5. Choose a Strong Password 6. Avoid Public computer to bank or shop Online. 7. Secure your WiFi: Enable WEP, WPA or WPA2 8. Encrypt your Data/Folders/Drivers: Truecrypt 9. Use Digital signature/PGP Encrypted Email
  • 19.