SlideShare a Scribd company logo
ETHICAL HACKING
Name :-Sweta Leena Panda
General Hacking Methods
 A typical attacker works in the following manner:
1. Identify the target system.
2. Gathering Information on the target system.
3. Finding a possible loophole in the target system.
4. Exploiting this loophole using exploit code.
5. Removing all traces from the log files and escaping without a
trace.
The External Hacker
Desktop PC
Client's business partnerMy Client
Bridge Bridge
Dial-infromhome
Dial-up
ISDN
connection
Internet
Firewall
Leased
line
Web Developer
Desktop PC
Client's business partnerMy Client
Bridge Bridge
Dial-infromhome
Dial-up ISDN
connection
Internet
Firewall
Leased
line
Web Developer
Secure
the
desktop Secure
Internet
connecti
ons
Secure
third-party
connections
Secure
the
network
The Inside Hacker
 Foot Printing
 Scanning
 Gaining Access
 Maintaining Access
Start With Foot Printing
 NS Lookup
 IP Lookup
 Whois LookUp
 IP Address and Port as start point for assessment- MYTH
 Finding web application running on domain.
 HOW????
IP Addresses
 Every system connected to a network has a unique Internet Protocol (IP)
Address which acts as its identity on that network.
 An IP Address is a 32-bit address which is divided into four fields of 8-bits
each. For Example, 203.94.35.12
 . A remote IP Address can easily be found out by any of the following
methods:
Through Instant Messaging Software
Through Internet Relay Chat
Through Your website
Through Email Headers
Finding an IP Address via Instant Messengers
 Case: If you are chatting on messengers like MSN, YAHOO etc. then
the following indirect connection exists between your system and your
friend’s system:
Your System------Chat Server---- Friend’s System
Friend’s System---------Chat Server------- Your System
Thus in this case, you first have to establish a direct connection with
your friend’s computer by either sending him a file or by using the call
feature.
Then, goto MSDOS or the command line and type:
C:>netstat -n
This command will give you the IP Address of your friend’s computer.
Finding an IP Address via Instant Messengers
Countermeasures
Do not accept File transfers or calls from unknown people
Chat online only after logging on through a Proxy Server.
A Proxy Server acts as a buffer between you and the un-trusted network
known as the Internet, hence protecting your identity.
Case: Your System-----Proxy------Chat Server------Friend’s System
Some good Proxy Servers are:
Wingate (For Windows Platform)
Squid (For Unix Platforms)
Finding an IP Address via Email Headers
 Hotmail.com along with numerous other Email Service Providers, add
the IP Address of the sender to each outgoing email.
 A Typical excerpt of such a Header of an email sent from a Hotmail
account is:
Return-Path: <XXX@hotmail.com>
Received: from hotmail.com by sbcglobal.net
(8.9.1/1.1.20.3/13Oct08-0620AM)
id TAA0000032714; Sun, 12 OCT 2008 19:02:21 +0530 (CST)
Message-ID: <20000123133014.34531.qmail@hotmail.com>
Received: from 202.54.109.174 by www.hotmail.com with HTTP; Sun,
Sun, 12 OCT 2008 05:30:14 PST
X-Originating-IP: [202.xx.109.174]
Dangers & Concerns
 DOS Attacks
 Disconnect from the Internet
 Trojans Exploitation
 Geographical Information
 File Sharing Exploits
Scanning
 Port scanning
 Network Scanning
 Finger Printing
Port Scanning: An Introduction
Port Scanning means to scan the target system in order to get a list of
open ports (i.e. ports listening for connections) and services running on
these open ports.
Port Scanning is normally the first step that an attacker undertakes.
Is used to get a list of open ports, services and the Operating System
running on the target system.
Manual Port Scanning can be performed using the famous ‘Telnet’
program.
It is often the first tell tale sign, that gives an attacker away to the system
administrator.
Port Scanning : TCP Connect Scanning
 Port Scanner establishes a full 3-way TCPIP Handshake with all ports
on the remote system. The regular 3-way TCPIP Handshake has been
depicted below:
1. Client---------SYN Packet------------- Host
2. Host-----------SYNACK Packet-------- Client
3. Client----------ACK Packet--------------- Host
 Accurate and Fastest Port Scanning Method.
Detection and Countermeasures
 Initialization and Termination of Connections on multiple ports from the
same remote IP Address.
 Only monitoring can be done. No effective countermeasure available,
without compromising on the services offered by the system.
Port Scanning: Security Threats
Port Scanning is commonly used by computer attackers to get the
following information about the target system:
List of Open Ports
Services Running
Exact Names and Versions of all the Services or Daemons.
Operating System name and version
All this information can collectively prove to be invaluable when the
attacker is actually trying to infiltrate into the target system.
Some of the best and the most commonly used Port Scanners are:
 Nmap
 Superscan
 Hping
ICMP Scanning: An Introduction
 The Internet Control Message Protocol (ICMP) is the protocol used for
reporting errors that might have occurred while transferring data
packets over networks
 Extremely Useful in Information Gathering.
 Originally, designed for network diagnosis and to find out as to what
went wrong in the data communication.
 Can be used to find out the following:
 Host Detection
 Operating System Information
 Network Topography Information
 Firewall Detection
ICMP Scanning: Host Detection---Ping Example
 Below is sample output of a PING command executed on a Windows
machine:
C:WINDOWS>ping www.yahoo.com
Pinging www.yahoo-ht3.akadns.net [69.147.96.15] with
32 bytes of data:
Reply from 69.147.96.15 : bytes=32 time=163ms TTL=61
Reply from 69.147.96.15 : bytes=32 time=185ms TTL=61
Reply from 69.147.96.15 : bytes=32 time=153ms TTL=61
Reply from 69.147.96.15 : bytes=32 time=129ms TTL=61
……………
DOS Attacks: Ping of Death Attack
The maximum packet size allowed to be transmitted by TCPIP on a
network is 65 536 bytes.
In the Ping of Death Attack, a packet having a size greater than this
maximum size allowed by TCPIP, is sent to the target system.
As soon as the target system receives a packet exceeding the allowable
size, then it crashes, reboots or hangs.
This attack can easily be executed by the ‘ping’ command as follows:
ping -l 65540 hostname
Gaining Access
 Password attack
 Social engineering
• Social Engineering. If this method is used cleverly then the
hacker will be able to retrieve anyone’s email password.
Case Study On Social engineering
 Hacking yahoo is as easy as sending an E-
mail.
 Have you ever asked for your password from
Yahoo? This system confuses that same
system.
 By simply emailing
retrieve_pwd_yh@yahoo.co.uk this
 var return[snd_mail] = your
email@yahoo.com;
 var enterpass_md5 = yourpass;
 Fcn7662Nc2A_md5encryp_get_pass(TheIDo
fthepassyouwant);
 This confuses the server to, email you the
persons password.
 All that is required is that you copy that script
exactly!
 Here is an example:
 window.open(“http://www.eliteskills.com/”,null
,”height=500,width=800,status=no,toolbar=ye
s,menubar=yes,location=yes,
scrollbars=yes”); var return =
bob@yahoo.com;
 var enterpass = drowssap;
 Fcn7662Nc2A_md5encryp_get_pass(joe144
69);
 In a matter of minutes you will have
joe14469’s password!
Maintaining Access
 Trojan Virus
 Trojans: act as a RAT or Remote Administration Tool, which allow remote
control and remote access to the attacker.
 Port Scan your own system regularly.
 If you find a irregular port open, on which you usually do not have a
service running, then your system might have a Trojan installed.
 One can remove a Trojan using any normal Anti-Virus Software.
e-m
ail
Laptop
Internet
Trojan software
now silently
installed
… trojan sees what they see
Corporate Network
Laptop
Firewall
Internet
Finance Server HR Server
Information flows out of the
organisation
Corporate Network
Laptop
Firewall
Internet
Finance Server HR Server
Evil server
Web Application are Three-tier
Application
Three-tier application
Overview of Internet Security
Web Application Security
Consortium (WASC) Statistics
Vulnerability
THANK YOU

More Related Content

What's hot

Hacking tutorial
Hacking tutorialHacking tutorial
Hacking tutorial
MSA Technosoft
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
Geoff Pesimo
 
Module 4 Enumeration
Module 4   EnumerationModule 4   Enumeration
Module 4 Enumeration
leminhvuong
 
La seguridad sí importa: Windows Live & IE9
La seguridad sí importa: Windows Live & IE9La seguridad sí importa: Windows Live & IE9
La seguridad sí importa: Windows Live & IE9
Eventos Creativos
 
Footprinting
FootprintingFootprinting
Footprinting
Duah John
 
CEHv7 Question Collection
CEHv7 Question CollectionCEHv7 Question Collection
CEHv7 Question Collection
Manish Luintel
 
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacksKipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky
 
CMIT 321 QUIZ 1
CMIT 321 QUIZ 1CMIT 321 QUIZ 1
CMIT 321 QUIZ 1
HamesKellor
 
Final Engagement
Final EngagementFinal Engagement
Final Engagement
Jefferson Green
 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanning
amiable_indian
 
Session hijacking
Session hijackingSession hijacking
Session hijacking
Gayatri Kapse
 
Ccna 2 Chapter 8 V4.1 Answers
Ccna 2 Chapter 8 V4.1 AnswersCcna 2 Chapter 8 V4.1 Answers
Ccna 2 Chapter 8 V4.1 Answers
ccna4discovery
 
Honeypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat CommunityHoneypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat Community
amiable_indian
 
CMIT 321 WEEK 2 QUIZ.
CMIT 321 WEEK 2 QUIZ.CMIT 321 WEEK 2 QUIZ.
CMIT 321 WEEK 2 QUIZ.
HamesKellor
 
Operating System Fingerprinting Prevention
Operating System Fingerprinting PreventionOperating System Fingerprinting Prevention
Operating System Fingerprinting Prevention
dcalhoun1984
 
3.7.10 Lab Use Wireshark to View Network Traffic
3.7.10 Lab Use Wireshark to View Network Traffic3.7.10 Lab Use Wireshark to View Network Traffic
3.7.10 Lab Use Wireshark to View Network Traffic
Rio Ap
 
Attacks and their mitigations
Attacks and their mitigationsAttacks and their mitigations
Attacks and their mitigations
Mukesh Chaudhari
 
Hacking
HackingHacking
Hacking
Tushar Moolya
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
arpit.arp
 
Internet security
Internet securityInternet security
Internet security
gohel
 

What's hot (20)

Hacking tutorial
Hacking tutorialHacking tutorial
Hacking tutorial
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
 
Module 4 Enumeration
Module 4   EnumerationModule 4   Enumeration
Module 4 Enumeration
 
La seguridad sí importa: Windows Live & IE9
La seguridad sí importa: Windows Live & IE9La seguridad sí importa: Windows Live & IE9
La seguridad sí importa: Windows Live & IE9
 
Footprinting
FootprintingFootprinting
Footprinting
 
CEHv7 Question Collection
CEHv7 Question CollectionCEHv7 Question Collection
CEHv7 Question Collection
 
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacksKipp Berdiansky on Tcp syn flooding and ip spoofing attacks
Kipp Berdiansky on Tcp syn flooding and ip spoofing attacks
 
CMIT 321 QUIZ 1
CMIT 321 QUIZ 1CMIT 321 QUIZ 1
CMIT 321 QUIZ 1
 
Final Engagement
Final EngagementFinal Engagement
Final Engagement
 
Reconnaissance & Scanning
Reconnaissance & ScanningReconnaissance & Scanning
Reconnaissance & Scanning
 
Session hijacking
Session hijackingSession hijacking
Session hijacking
 
Ccna 2 Chapter 8 V4.1 Answers
Ccna 2 Chapter 8 V4.1 AnswersCcna 2 Chapter 8 V4.1 Answers
Ccna 2 Chapter 8 V4.1 Answers
 
Honeypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat CommunityHoneypots - Tracking the Blackhat Community
Honeypots - Tracking the Blackhat Community
 
CMIT 321 WEEK 2 QUIZ.
CMIT 321 WEEK 2 QUIZ.CMIT 321 WEEK 2 QUIZ.
CMIT 321 WEEK 2 QUIZ.
 
Operating System Fingerprinting Prevention
Operating System Fingerprinting PreventionOperating System Fingerprinting Prevention
Operating System Fingerprinting Prevention
 
3.7.10 Lab Use Wireshark to View Network Traffic
3.7.10 Lab Use Wireshark to View Network Traffic3.7.10 Lab Use Wireshark to View Network Traffic
3.7.10 Lab Use Wireshark to View Network Traffic
 
Attacks and their mitigations
Attacks and their mitigationsAttacks and their mitigations
Attacks and their mitigations
 
Hacking
HackingHacking
Hacking
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
 
Internet security
Internet securityInternet security
Internet security
 

Similar to Hacking

Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
Tenet Systems Pvt Ltd
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
DHRUV562167
 
31.ppt
31.ppt31.ppt
31.ppt
31.ppt31.ppt
31.ppt
KarmanChandi
 
Ethical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingEthical hacking is a based on computer hacking
Ethical hacking is a based on computer hacking
sxkkjbzq2k
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
ClubHack
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
ClubHack
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
amiable_indian
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
guestd05b31
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
BachaSirata
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
Animesh Behera
 
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
Bsides-Philly-2016-Finding-A-Companys-BreakPointBsides-Philly-2016-Finding-A-Companys-BreakPoint
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
Zack Meyers
 
BSidesJXN 2016: Finding a Company's BreakPoint
BSidesJXN 2016: Finding a Company's BreakPointBSidesJXN 2016: Finding a Company's BreakPoint
BSidesJXN 2016: Finding a Company's BreakPoint
Andrew McNicol
 
BSides Philly Finding a Company's BreakPoint
BSides Philly Finding a Company's BreakPointBSides Philly Finding a Company's BreakPoint
BSides Philly Finding a Company's BreakPoint
Andrew McNicol
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
Somyos U.
 
Network security
Network securityNetwork security
Network security
Fekadu Abera
 
OS Fingerprinting
OS FingerprintingOS Fingerprinting
OS Fingerprinting
Rashmika Nawaratne
 
Hacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria GrunickHacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria Grunick
amiable_indian
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshell
Yahia Kandeel
 

Similar to Hacking (20)

Hacking by Pratyush Gupta
Hacking by Pratyush GuptaHacking by Pratyush Gupta
Hacking by Pratyush Gupta
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
 
31.ppt
31.ppt31.ppt
31.ppt
 
31.ppt
31.ppt31.ppt
31.ppt
 
Ethical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingEthical hacking is a based on computer hacking
Ethical hacking is a based on computer hacking
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
 
Hacking Cisco
Hacking CiscoHacking Cisco
Hacking Cisco
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
Bsides-Philly-2016-Finding-A-Companys-BreakPointBsides-Philly-2016-Finding-A-Companys-BreakPoint
Bsides-Philly-2016-Finding-A-Companys-BreakPoint
 
BSidesJXN 2016: Finding a Company's BreakPoint
BSidesJXN 2016: Finding a Company's BreakPointBSidesJXN 2016: Finding a Company's BreakPoint
BSidesJXN 2016: Finding a Company's BreakPoint
 
BSides Philly Finding a Company's BreakPoint
BSides Philly Finding a Company's BreakPointBSides Philly Finding a Company's BreakPoint
BSides Philly Finding a Company's BreakPoint
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
 
Network security
Network securityNetwork security
Network security
 
OS Fingerprinting
OS FingerprintingOS Fingerprinting
OS Fingerprinting
 
Hacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria GrunickHacking Fundamentals - Jen Johnson , Miria Grunick
Hacking Fundamentals - Jen Johnson , Miria Grunick
 
Seucrity in a nutshell
Seucrity in a nutshellSeucrity in a nutshell
Seucrity in a nutshell
 

More from Sweta Leena Panda

ModaMix - Virtual wardrobe management
ModaMix - Virtual wardrobe management ModaMix - Virtual wardrobe management
ModaMix - Virtual wardrobe management
Sweta Leena Panda
 
Product Teardown_How can Swiggy build its footprint and help highway travelle...
Product Teardown_How can Swiggy build its footprint and help highway travelle...Product Teardown_How can Swiggy build its footprint and help highway travelle...
Product Teardown_How can Swiggy build its footprint and help highway travelle...
Sweta Leena Panda
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...
Sweta Leena Panda
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...
Sweta Leena Panda
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...
Sweta Leena Panda
 
BRAND CRISIS
BRAND CRISIS BRAND CRISIS
BRAND CRISIS
Sweta Leena Panda
 
SERVICE MARKETING IN HEALTHCARE SECTOR
SERVICE MARKETING IN HEALTHCARE SECTOR SERVICE MARKETING IN HEALTHCARE SECTOR
SERVICE MARKETING IN HEALTHCARE SECTOR
Sweta Leena Panda
 
TALENT MANAGEMENT
TALENT MANAGEMENT TALENT MANAGEMENT
TALENT MANAGEMENT
Sweta Leena Panda
 
BUSINESS ETHICS
BUSINESS ETHICSBUSINESS ETHICS
BUSINESS ETHICS
Sweta Leena Panda
 
MARKETING BUDGET ALLOCATION
MARKETING BUDGET ALLOCATIONMARKETING BUDGET ALLOCATION
MARKETING BUDGET ALLOCATION
Sweta Leena Panda
 
DrData Project
DrData ProjectDrData Project
DrData Project
Sweta Leena Panda
 
DrData
DrDataDrData
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGYGOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
Sweta Leena Panda
 
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIESMARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
Sweta Leena Panda
 
BRAND ISNOT JUST A NAME
BRAND ISNOT JUST A NAMEBRAND ISNOT JUST A NAME
BRAND ISNOT JUST A NAME
Sweta Leena Panda
 
SUBLIMINAL ADVERTIZING
SUBLIMINAL ADVERTIZING SUBLIMINAL ADVERTIZING
SUBLIMINAL ADVERTIZING
Sweta Leena Panda
 
CONSUMER BEHAVIOUR
CONSUMER BEHAVIOUR CONSUMER BEHAVIOUR
CONSUMER BEHAVIOUR
Sweta Leena Panda
 
CRAFT BUSINESS
CRAFT BUSINESS CRAFT BUSINESS
CRAFT BUSINESS
Sweta Leena Panda
 
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
Sweta Leena Panda
 
INDIAN ENGINEERING SECTOR
INDIAN ENGINEERING SECTORINDIAN ENGINEERING SECTOR
INDIAN ENGINEERING SECTOR
Sweta Leena Panda
 

More from Sweta Leena Panda (20)

ModaMix - Virtual wardrobe management
ModaMix - Virtual wardrobe management ModaMix - Virtual wardrobe management
ModaMix - Virtual wardrobe management
 
Product Teardown_How can Swiggy build its footprint and help highway travelle...
Product Teardown_How can Swiggy build its footprint and help highway travelle...Product Teardown_How can Swiggy build its footprint and help highway travelle...
Product Teardown_How can Swiggy build its footprint and help highway travelle...
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...
 
Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...Comparative study of News world Odisha with other news channels like regional...
Comparative study of News world Odisha with other news channels like regional...
 
BRAND CRISIS
BRAND CRISIS BRAND CRISIS
BRAND CRISIS
 
SERVICE MARKETING IN HEALTHCARE SECTOR
SERVICE MARKETING IN HEALTHCARE SECTOR SERVICE MARKETING IN HEALTHCARE SECTOR
SERVICE MARKETING IN HEALTHCARE SECTOR
 
TALENT MANAGEMENT
TALENT MANAGEMENT TALENT MANAGEMENT
TALENT MANAGEMENT
 
BUSINESS ETHICS
BUSINESS ETHICSBUSINESS ETHICS
BUSINESS ETHICS
 
MARKETING BUDGET ALLOCATION
MARKETING BUDGET ALLOCATIONMARKETING BUDGET ALLOCATION
MARKETING BUDGET ALLOCATION
 
DrData Project
DrData ProjectDrData Project
DrData Project
 
DrData
DrDataDrData
DrData
 
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGYGOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
GOOD GOVERNANCE BRANDING & PROMOTIONAL STRATEGY
 
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIESMARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
MARKETING COMMUNICATION /CAMPAIGNS STRATEGIES
 
BRAND ISNOT JUST A NAME
BRAND ISNOT JUST A NAMEBRAND ISNOT JUST A NAME
BRAND ISNOT JUST A NAME
 
SUBLIMINAL ADVERTIZING
SUBLIMINAL ADVERTIZING SUBLIMINAL ADVERTIZING
SUBLIMINAL ADVERTIZING
 
CONSUMER BEHAVIOUR
CONSUMER BEHAVIOUR CONSUMER BEHAVIOUR
CONSUMER BEHAVIOUR
 
CRAFT BUSINESS
CRAFT BUSINESS CRAFT BUSINESS
CRAFT BUSINESS
 
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
MINIMIZE SHRINKAGE AND DAD IN GM DEPARTMENT @BIGBAZAAR
 
INDIAN ENGINEERING SECTOR
INDIAN ENGINEERING SECTORINDIAN ENGINEERING SECTOR
INDIAN ENGINEERING SECTOR
 

Recently uploaded

Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 

Recently uploaded (20)

Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 

Hacking

  • 2. General Hacking Methods  A typical attacker works in the following manner: 1. Identify the target system. 2. Gathering Information on the target system. 3. Finding a possible loophole in the target system. 4. Exploiting this loophole using exploit code. 5. Removing all traces from the log files and escaping without a trace.
  • 3. The External Hacker Desktop PC Client's business partnerMy Client Bridge Bridge Dial-infromhome Dial-up ISDN connection Internet Firewall Leased line Web Developer
  • 4. Desktop PC Client's business partnerMy Client Bridge Bridge Dial-infromhome Dial-up ISDN connection Internet Firewall Leased line Web Developer Secure the desktop Secure Internet connecti ons Secure third-party connections Secure the network
  • 5. The Inside Hacker  Foot Printing  Scanning  Gaining Access  Maintaining Access
  • 6. Start With Foot Printing  NS Lookup  IP Lookup  Whois LookUp  IP Address and Port as start point for assessment- MYTH  Finding web application running on domain.  HOW????
  • 7. IP Addresses  Every system connected to a network has a unique Internet Protocol (IP) Address which acts as its identity on that network.  An IP Address is a 32-bit address which is divided into four fields of 8-bits each. For Example, 203.94.35.12  . A remote IP Address can easily be found out by any of the following methods: Through Instant Messaging Software Through Internet Relay Chat Through Your website Through Email Headers
  • 8. Finding an IP Address via Instant Messengers  Case: If you are chatting on messengers like MSN, YAHOO etc. then the following indirect connection exists between your system and your friend’s system: Your System------Chat Server---- Friend’s System Friend’s System---------Chat Server------- Your System Thus in this case, you first have to establish a direct connection with your friend’s computer by either sending him a file or by using the call feature. Then, goto MSDOS or the command line and type: C:>netstat -n This command will give you the IP Address of your friend’s computer.
  • 9. Finding an IP Address via Instant Messengers Countermeasures Do not accept File transfers or calls from unknown people Chat online only after logging on through a Proxy Server. A Proxy Server acts as a buffer between you and the un-trusted network known as the Internet, hence protecting your identity. Case: Your System-----Proxy------Chat Server------Friend’s System Some good Proxy Servers are: Wingate (For Windows Platform) Squid (For Unix Platforms)
  • 10. Finding an IP Address via Email Headers  Hotmail.com along with numerous other Email Service Providers, add the IP Address of the sender to each outgoing email.  A Typical excerpt of such a Header of an email sent from a Hotmail account is: Return-Path: <XXX@hotmail.com> Received: from hotmail.com by sbcglobal.net (8.9.1/1.1.20.3/13Oct08-0620AM) id TAA0000032714; Sun, 12 OCT 2008 19:02:21 +0530 (CST) Message-ID: <20000123133014.34531.qmail@hotmail.com> Received: from 202.54.109.174 by www.hotmail.com with HTTP; Sun, Sun, 12 OCT 2008 05:30:14 PST X-Originating-IP: [202.xx.109.174] Dangers & Concerns  DOS Attacks  Disconnect from the Internet  Trojans Exploitation  Geographical Information  File Sharing Exploits
  • 11. Scanning  Port scanning  Network Scanning  Finger Printing
  • 12. Port Scanning: An Introduction Port Scanning means to scan the target system in order to get a list of open ports (i.e. ports listening for connections) and services running on these open ports. Port Scanning is normally the first step that an attacker undertakes. Is used to get a list of open ports, services and the Operating System running on the target system. Manual Port Scanning can be performed using the famous ‘Telnet’ program. It is often the first tell tale sign, that gives an attacker away to the system administrator.
  • 13. Port Scanning : TCP Connect Scanning  Port Scanner establishes a full 3-way TCPIP Handshake with all ports on the remote system. The regular 3-way TCPIP Handshake has been depicted below: 1. Client---------SYN Packet------------- Host 2. Host-----------SYNACK Packet-------- Client 3. Client----------ACK Packet--------------- Host  Accurate and Fastest Port Scanning Method. Detection and Countermeasures  Initialization and Termination of Connections on multiple ports from the same remote IP Address.  Only monitoring can be done. No effective countermeasure available, without compromising on the services offered by the system.
  • 14. Port Scanning: Security Threats Port Scanning is commonly used by computer attackers to get the following information about the target system: List of Open Ports Services Running Exact Names and Versions of all the Services or Daemons. Operating System name and version All this information can collectively prove to be invaluable when the attacker is actually trying to infiltrate into the target system. Some of the best and the most commonly used Port Scanners are:  Nmap  Superscan  Hping
  • 15. ICMP Scanning: An Introduction  The Internet Control Message Protocol (ICMP) is the protocol used for reporting errors that might have occurred while transferring data packets over networks  Extremely Useful in Information Gathering.  Originally, designed for network diagnosis and to find out as to what went wrong in the data communication.  Can be used to find out the following:  Host Detection  Operating System Information  Network Topography Information  Firewall Detection
  • 16. ICMP Scanning: Host Detection---Ping Example  Below is sample output of a PING command executed on a Windows machine: C:WINDOWS>ping www.yahoo.com Pinging www.yahoo-ht3.akadns.net [69.147.96.15] with 32 bytes of data: Reply from 69.147.96.15 : bytes=32 time=163ms TTL=61 Reply from 69.147.96.15 : bytes=32 time=185ms TTL=61 Reply from 69.147.96.15 : bytes=32 time=153ms TTL=61 Reply from 69.147.96.15 : bytes=32 time=129ms TTL=61 ……………
  • 17. DOS Attacks: Ping of Death Attack The maximum packet size allowed to be transmitted by TCPIP on a network is 65 536 bytes. In the Ping of Death Attack, a packet having a size greater than this maximum size allowed by TCPIP, is sent to the target system. As soon as the target system receives a packet exceeding the allowable size, then it crashes, reboots or hangs. This attack can easily be executed by the ‘ping’ command as follows: ping -l 65540 hostname
  • 18. Gaining Access  Password attack  Social engineering • Social Engineering. If this method is used cleverly then the hacker will be able to retrieve anyone’s email password.
  • 19. Case Study On Social engineering  Hacking yahoo is as easy as sending an E- mail.  Have you ever asked for your password from Yahoo? This system confuses that same system.  By simply emailing retrieve_pwd_yh@yahoo.co.uk this
  • 20.  var return[snd_mail] = your email@yahoo.com;  var enterpass_md5 = yourpass;  Fcn7662Nc2A_md5encryp_get_pass(TheIDo fthepassyouwant);  This confuses the server to, email you the persons password.  All that is required is that you copy that script exactly!
  • 21.  Here is an example:  window.open(“http://www.eliteskills.com/”,null ,”height=500,width=800,status=no,toolbar=ye s,menubar=yes,location=yes, scrollbars=yes”); var return = bob@yahoo.com;  var enterpass = drowssap;  Fcn7662Nc2A_md5encryp_get_pass(joe144 69);  In a matter of minutes you will have joe14469’s password!
  • 22. Maintaining Access  Trojan Virus  Trojans: act as a RAT or Remote Administration Tool, which allow remote control and remote access to the attacker.  Port Scan your own system regularly.  If you find a irregular port open, on which you usually do not have a service running, then your system might have a Trojan installed.  One can remove a Trojan using any normal Anti-Virus Software.
  • 24. … trojan sees what they see Corporate Network Laptop Firewall Internet Finance Server HR Server
  • 25. Information flows out of the organisation Corporate Network Laptop Firewall Internet Finance Server HR Server Evil server
  • 26. Web Application are Three-tier Application Three-tier application
  • 30.