HACK YOUR
WAY INTO!!
$ whoami
Akshay Pandurangi - @a_pandurangi
Cyber Security Analyst
Just a InfoSec learner!
Few Acknowledgements
WHAT IS HACKING?
“Hacking” used to describe when a clever individual put
computer parts (or anything really) together in a novel,
unintended way that resulted in something cool or useful.
It was used with a positive connotation. For example, Steve
Wozniak, one of the original founders of Apple, was an
exceptional hacker.
WHAT PEOPLE THINK
ABOUT HACKING?
“hacking” – a blanket term readily
used to encompass a whole range of
attacks, from crashing a server to
more sophisticated infiltration, such
as stealing passwords.
“hacking” is more frequently used to
described discovering and taking
advantage of a weakness in a
computer system or network.
NO, THIS ISN’T HACKING!
HACKER?
A person who enjoys learning the details of computer
systems and how to stretch their capabilities
One who programs enthusiastically or who enjoys
programming rather than just theorizing about programming.
All hacker are NOT BAD GUYS!
Some of them are VIGILANTE!!!
HACKERS OF A DIFFERENT CLASSES
There are a large number of hacker classifications
defining who hackers are and why they are hacking in
the first place.
WHITE HAT
These guys do everything by the book. They have full, contractual
permission to try and compromise a system. There are rules – white hats
follow them.
BLACK HAT
These hackers are Bond villains. Black hat hacking is an illegal activity for
some form of personal gain.
GREY HAT
Everything in-between. Most commonly, these guys hack something with
whatever intentions… they leave identification mark!!
HOW DO HACKERS HACK THE STUFF!
HOW DO HACKERS HACK THE STUFF!
Here is a step-by-step process for the easiest method to hack:
1. Ask the operator for the password.
2. Sign in.
Seriously, Social Engineering is the key.
Its the practice of manipulating people into divulging information.
While a user may not intentionally give away the password, some
guile, a little knowledge of human nature, and a touch of trickery are
more than enough to get the access you need.
Ok, ok, that’s cheating… but it works! Let’s have a look at the sample
video.
REWARDS OF SOCIAL ENGINEERING
KNOWING THE TARGET!
Facebook, Instagram & Twitter are Social Engineer's best
friends!
Collecting the socially available information from Public
Resources
pipl
sync.me
email-lookup by golookup
DEMO
Let’s try them!
LET’S PLAY WITH EMAILS@HACKING
It’s a technique where the sender of an email has been
changed to appear as someone else.
This is done by simply forging the header of an email and
changing the address in the “from” field.
Requirement: access to a mail server with an open SMTP
That’s it! So simple, isn’t it?
DEMO
Spoofing is the real beauty!
PHISH THE TARGET
Build a replica of a website and make your victim to access it
If its looks fair enough as the actual website and earns your
victim’s trust…Boom! You won!!
Wait until victim logs-in and victim’s credentials now also
belongs to you.
Requirements: Replica of a target web-app & a Hosting space.
Basic knowledge of PHP will be handy.
DEMO
Spoofing is the real beauty!
SECURITY MANTRA: LEARN IT, TO AVOID IT!

Hack your way into

  • 1.
  • 2.
    $ whoami Akshay Pandurangi- @a_pandurangi Cyber Security Analyst Just a InfoSec learner! Few Acknowledgements
  • 4.
    WHAT IS HACKING? “Hacking”used to describe when a clever individual put computer parts (or anything really) together in a novel, unintended way that resulted in something cool or useful. It was used with a positive connotation. For example, Steve Wozniak, one of the original founders of Apple, was an exceptional hacker.
  • 5.
    WHAT PEOPLE THINK ABOUTHACKING? “hacking” – a blanket term readily used to encompass a whole range of attacks, from crashing a server to more sophisticated infiltration, such as stealing passwords. “hacking” is more frequently used to described discovering and taking advantage of a weakness in a computer system or network.
  • 6.
  • 7.
    HACKER? A person whoenjoys learning the details of computer systems and how to stretch their capabilities One who programs enthusiastically or who enjoys programming rather than just theorizing about programming. All hacker are NOT BAD GUYS! Some of them are VIGILANTE!!!
  • 8.
    HACKERS OF ADIFFERENT CLASSES There are a large number of hacker classifications defining who hackers are and why they are hacking in the first place. WHITE HAT These guys do everything by the book. They have full, contractual permission to try and compromise a system. There are rules – white hats follow them. BLACK HAT These hackers are Bond villains. Black hat hacking is an illegal activity for some form of personal gain. GREY HAT Everything in-between. Most commonly, these guys hack something with whatever intentions… they leave identification mark!!
  • 9.
    HOW DO HACKERSHACK THE STUFF!
  • 10.
    HOW DO HACKERSHACK THE STUFF! Here is a step-by-step process for the easiest method to hack: 1. Ask the operator for the password. 2. Sign in. Seriously, Social Engineering is the key. Its the practice of manipulating people into divulging information. While a user may not intentionally give away the password, some guile, a little knowledge of human nature, and a touch of trickery are more than enough to get the access you need. Ok, ok, that’s cheating… but it works! Let’s have a look at the sample video.
  • 11.
    REWARDS OF SOCIALENGINEERING
  • 12.
    KNOWING THE TARGET! Facebook,Instagram & Twitter are Social Engineer's best friends! Collecting the socially available information from Public Resources pipl sync.me email-lookup by golookup
  • 13.
  • 14.
    LET’S PLAY WITHEMAILS@HACKING It’s a technique where the sender of an email has been changed to appear as someone else. This is done by simply forging the header of an email and changing the address in the “from” field. Requirement: access to a mail server with an open SMTP That’s it! So simple, isn’t it?
  • 15.
  • 16.
    PHISH THE TARGET Builda replica of a website and make your victim to access it If its looks fair enough as the actual website and earns your victim’s trust…Boom! You won!! Wait until victim logs-in and victim’s credentials now also belongs to you. Requirements: Replica of a target web-app & a Hosting space. Basic knowledge of PHP will be handy.
  • 17.
  • 18.
    SECURITY MANTRA: LEARNIT, TO AVOID IT!