ETHICAL HACKING




BY …..
         Miss. Pallavi S. Sonone (CSE Dept. PLIT, Buldana)
Hacking Include’s…….
   Password Cracking
   Trojans
   Phishing
   Facebook Hacking
   Sniffers
   IP Tracking
   Website Hacking
   Cross Site Scripting
   Proxies
   Remote Testers
   Port Hacking
   Mobile Phone Hacking
   WiFi Hacking
   Social Engineering
   ATM Machine Hacking
IP Address:

  This address is unique for different devices.

e.g.
       172.16.254.1
       225.168.1.20
TORRENTs UNBLOCKING:


 How Torrents Blocked?



 -Disable Torrent Clients

-Block Download of .torrent extension files
COOKIES:

 It is a text file stored on our computer sort by
  the website on user machine.

 -Cookies logged us automatically(On
  google.com)

 -allows to customize background image(On
  google.com)
TYPES Of Cookies:


 Session/ Temporary Cookies:
 Persistent Cookies:
 First-Party Cookies:
 Third-Party Cookies:
 Unsatisfactory Cookies:
TROJANs:

 Trojans are RATs or Remote Administration
  Tools that give an attacker remote control or
  remote access to the victims computer.
Protection:

 Trojan should start automatically (Whenever
  windows boots)

 Trojan has to open a port


 Trojan has to be loaded into memory
SPOOFING:

Spoofing means
         “Hacking Other’s Email, SMS or Call”

There Are Three Types Of SPOOFING:
  1) EMAIL Spoofing:
  2)SMS Spoofing:
  3) Call Spoofing:
PASSWORD CRACKING:

Include’s…
 Online Account
 Admin/Windows Login Password Cracking
 File/Application Cracking
 BIOS Cracking
 Network Cracking(FTP, SQL, Coporate email)
 Wifi Passwords
 Mobile Login Cracking
MAFIABOY:
DOS ATTACK:

 To bring down an entire network


 -Each system connected to internet has
  limited bandwidth available.

 [If our computer has bandwidth of 2mbps &
  the criminal sends 100mbps of data then our
  computer will crack]
TYPES OF DOS ATTACK:

1.Ping Of Death:
2.TearDrop:


1]Ping Of Death:

65,536 bytes is the size of data packet.

(Not Larger Attack)
.
2 TearDrop:
Data is broken down into smaller
chunks of data
e.g. 4000 Bytes
     Chunk A 1-1500 bytes
     Chunk B 1500-3000 bytes
     Chunk C 3000-4000 bytes

DOS attack is extremely dangerous
STEGNOGRAPHY:

Hiding of any file or data into the other file

TYPES OF STEGNOGRAPHY:

1. Image STEGNOGRAPHY
2. Text STEGNOGRAPHY
3. Spam(Mimic) STEGNOGRAPHY
ROAD SIGN HACKING:
ATM MACHINE HACKING:
BEST SECURITY PRACTICES:
1. Install a FIREWALL: Zone Alarm (Free
   Download)
2. Use an Antivirus: Update it Weakly
3. Use an ANTISPYWARE: PrevX, SpySweeper
4. Update your OS: Every 15 days
5. Choose a Strong Password
6. Avoid Public computer to bank or shop
   Online.
7. Secure your WiFi: Enable WEP, WPA or WPA2
8. Encrypt your Data/Folders/Drivers: Truecrypt
9. Use Digital signature/PGP Encrypted Email
….

Ethical Hacking

  • 1.
    ETHICAL HACKING BY ….. Miss. Pallavi S. Sonone (CSE Dept. PLIT, Buldana)
  • 2.
    Hacking Include’s…….  Password Cracking  Trojans  Phishing  Facebook Hacking  Sniffers  IP Tracking  Website Hacking  Cross Site Scripting  Proxies  Remote Testers  Port Hacking  Mobile Phone Hacking  WiFi Hacking  Social Engineering  ATM Machine Hacking
  • 3.
    IP Address: This address is unique for different devices. e.g. 172.16.254.1 225.168.1.20
  • 4.
    TORRENTs UNBLOCKING:  HowTorrents Blocked? -Disable Torrent Clients -Block Download of .torrent extension files
  • 5.
    COOKIES:  It isa text file stored on our computer sort by the website on user machine.  -Cookies logged us automatically(On google.com)  -allows to customize background image(On google.com)
  • 6.
    TYPES Of Cookies: Session/ Temporary Cookies:  Persistent Cookies:  First-Party Cookies:  Third-Party Cookies:  Unsatisfactory Cookies:
  • 7.
    TROJANs:  Trojans areRATs or Remote Administration Tools that give an attacker remote control or remote access to the victims computer.
  • 8.
    Protection:  Trojan shouldstart automatically (Whenever windows boots)  Trojan has to open a port  Trojan has to be loaded into memory
  • 9.
    SPOOFING: Spoofing means “Hacking Other’s Email, SMS or Call” There Are Three Types Of SPOOFING: 1) EMAIL Spoofing: 2)SMS Spoofing: 3) Call Spoofing:
  • 10.
    PASSWORD CRACKING: Include’s…  OnlineAccount  Admin/Windows Login Password Cracking  File/Application Cracking  BIOS Cracking  Network Cracking(FTP, SQL, Coporate email)  Wifi Passwords  Mobile Login Cracking
  • 11.
  • 12.
    DOS ATTACK:  Tobring down an entire network  -Each system connected to internet has limited bandwidth available.  [If our computer has bandwidth of 2mbps & the criminal sends 100mbps of data then our computer will crack]
  • 13.
    TYPES OF DOSATTACK: 1.Ping Of Death: 2.TearDrop: 1]Ping Of Death: 65,536 bytes is the size of data packet. (Not Larger Attack)
  • 14.
    . 2 TearDrop: Data isbroken down into smaller chunks of data e.g. 4000 Bytes Chunk A 1-1500 bytes Chunk B 1500-3000 bytes Chunk C 3000-4000 bytes DOS attack is extremely dangerous
  • 15.
    STEGNOGRAPHY: Hiding of anyfile or data into the other file TYPES OF STEGNOGRAPHY: 1. Image STEGNOGRAPHY 2. Text STEGNOGRAPHY 3. Spam(Mimic) STEGNOGRAPHY
  • 16.
  • 17.
  • 18.
    BEST SECURITY PRACTICES: 1.Install a FIREWALL: Zone Alarm (Free Download) 2. Use an Antivirus: Update it Weakly 3. Use an ANTISPYWARE: PrevX, SpySweeper 4. Update your OS: Every 15 days 5. Choose a Strong Password 6. Avoid Public computer to bank or shop Online. 7. Secure your WiFi: Enable WEP, WPA or WPA2 8. Encrypt your Data/Folders/Drivers: Truecrypt 9. Use Digital signature/PGP Encrypted Email
  • 19.