This document provides an overview of hacking and cybersecurity topics. It lists things that will be learned including hacking basics, ethical hacking rules, Tor, reconnaissance techniques, mobile hacking, SQL injection, XSS attacks, reverse engineering, LFI/RFI, and prevention techniques. It then discusses hacking, types of hackers, rules for ethical hackers, and demonstrates reconnaissance and tracing techniques. Specific hacking methods like SQL injection, XSS, and how they work are explained. The document concludes with prevention techniques and examples of defaced websites.
The concept of online anonymity refers to keeping the identity of communicators hidden. Online privacy is more than just encrypting and decrypting data; it also includes the concealment of identity. The Dark Web is a section of the Internet that achieves the highest levels of anonymity and security. Dark Web, which, unlike the normal web, requires specialized access procedures, is regarded as the "Evil Twin of the Internet" since more than 57 percent of its area is occupied with unlawful content.
What is a Hacker (part 1): Types, tools and techniquesKlaus Drosch
The popular definition of a hacker is someone who uses their technical abilities to gain unauthorized access to computers. In reality hackers are as diverse as people in general, having expert technical abilities does not have to make you a criminal; it can make you a hero.
Ever wonder, "how can I make my home internet more secure" or "how can I make sure my kids are safely browsing the internet"? Join this cat meme filled presentation on how to secure your home's internet; everything from securing your wireless network to tools that you can use to help keep you and your family safe while surfing the web.
This is the presentation from Null/OWASP/g4h Bangalore December MeetUp by Vandana Verma.
technology.inmobi.com/events/null-owasp-g4h-december-meetup
Outline:
Security news from November and December 2014.
The concept of online anonymity refers to keeping the identity of communicators hidden. Online privacy is more than just encrypting and decrypting data; it also includes the concealment of identity. The Dark Web is a section of the Internet that achieves the highest levels of anonymity and security. Dark Web, which, unlike the normal web, requires specialized access procedures, is regarded as the "Evil Twin of the Internet" since more than 57 percent of its area is occupied with unlawful content.
What is a Hacker (part 1): Types, tools and techniquesKlaus Drosch
The popular definition of a hacker is someone who uses their technical abilities to gain unauthorized access to computers. In reality hackers are as diverse as people in general, having expert technical abilities does not have to make you a criminal; it can make you a hero.
Ever wonder, "how can I make my home internet more secure" or "how can I make sure my kids are safely browsing the internet"? Join this cat meme filled presentation on how to secure your home's internet; everything from securing your wireless network to tools that you can use to help keep you and your family safe while surfing the web.
This is the presentation from Null/OWASP/g4h Bangalore December MeetUp by Vandana Verma.
technology.inmobi.com/events/null-owasp-g4h-december-meetup
Outline:
Security news from November and December 2014.
Ethical hacking for information securityJayanth Vinay
In this paper I discussed about the security flaws and Attacks performed by Various Hackers at various situations and protection Methodologies are mentioned.
Do you think your home-based enterprise is too small to attract attention of hackers and cyber criminals? A hacker would be sitting behind you and follow your password over your shoulder as you are using a public Wi-Fi at Starbucks! Did you know that a pacemaker could be hacked to get personal and medical information to exploit against you for vandalism or monetary gain? The more you are unsuspecting and off-the-guard, the more you are prone to fall prey to devious schemes of cyber attacks. That’s why we created this presentation to present you everything you need to know to detect signs of cyber attacks including
- all possible risks of cyber attacks
- what’s your chances of getting hit by a hacker,
- who is targeting you
- What hackers can do?
- what type of information they are trying to steal
- Are you an Instagram addict? Get to know how your favorite social networking sites and other web-based services are exposing you to hackers
- Different types of cyber attacks
- Different types of baits, techniques and tools used by hackers
- How each type of cyber attacks works
- Do you know group of password crackers are at work in cracking your netbanking password? Check out if your password is strong and hard to crack
- What tools are they using to crack your password?
- How to verify all those banking email communications are NOT FROM YOUR BANK, but cyber attackers? Look out for these signs to distinguish between a phishing and a genuine email message.
- Are you choosing the right browser? Is your browser a staple target of hackers – here is how to choose the right browser before you get online
- Is your router doubling as a gateway for hackers to pass your information? Here is how to spot and prevent cyber attacks carried out through the router
- How to identify if you are opening a genuine or fake website? Here is how you can safeguard yourself before revealing your personal or financial data on a genuine-looking
fake website.
And many more scary facts and trends of cyber attacks covered in this presentation which can be a small handy 101 guide to keep you alert and safe online. In addition to the information and tips, we have a powerful and really effective tool to help you dodge and combat against hackers as you use Internet. If you needed an active watchdog to monitor, block and guard you from all types of online malicious activities in the background, then you cannot possibly give this a miss to find the best online safety partner for you.
Surf through the slides to find out everything you need to know and never thought you actually need… and let us know what you think. We are waiting!
Network Security, What is security?
Why do we need security?
Who is vulnerable? Common security attacks and countermeasures, Firewalls & Intrusion Detection Systems
Denial of Service Attacks
TCP Attacks
Packet Sniffing
Social Problems
Stealth Mango and the Prevalence of Mobile SurveillancewarePriyanka Aash
In this talk, we will unveil the new in-house capabilities of a nation state actor who has been observed deploying both Android and iOS surveillance tooling, known as Stealth Mango and Tangelo. The actor behind these offensive capabilities has successfully compromised the devices of government officials and military personnel in numerous countries with some directly impacting Western interests. Our research indicates this capability has been created by freelance developers who primarily release commodity spouse-ware but moonlight by selling their own custom surveillanceware to state actors. One such state actor has been observed deploying Stealth Mango and this presentation will unveil the depth and breadth of their campaigns, detailing not only how we watched them grow and develop, test, QA, and deploy their offensive tooling, but also how operation security mistakes ultimately led to their attribution.
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...Intellipaat
In this session on White Hat vs Black Hat vs Grey Hat, you will learn what are White hat, grey hat, and black hat hackers, the difference between Black Hat, White Hat, Grey Hat, Cybersecurity, how to get started. This is a must-watch session for everyone who wishes to learn cybersecurity and make a career in it.
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...REVULN
Phishing, an old and traditional attack, is still a thing.
Hundreds of phishing website are launched every day and it threats people around the world. Anti-Phishing Working Group (APWG) says that APWG detected 150,000+ phishing websites for the 3rd quarter of 2018.
Sometimes phishing actors make OPSEC failures and, thanks to that, researchers can obtain a phishing kit (a kit to deploy a phishing website).
We have collected 18,000+ phishing kits based on OSINT and analyzed mechanisms of phishing websites and phishing actors themselves.
In this presentation, we will show the following findings.
- How to collect phishing kits based on OSINT data.
- Analysis of phishing actors:
- Who develops a phishing kit, How to distribute it, etc.
- Including a methodology to find out a phishing actor based on information (email, username and signature) inside a phishing kit.
- We will show an analysis of Indonesian phishing actors who target Asian countries.
- Especially focusing on an actor named DevilScream/Z1Coder who develops an infamous phishing kit“16shop”.
Finally, we will show countermeasures we have taken against phishing websites and actors.
Information Security & Data Security about the internet, daily life usages. The behavior of employees and contractors with access to data affects information systems and assets. The human factor (what employees do or don’t do) is the biggest threat to information systems and assets.
This is a multi-faceted workshop that explores new concepts in web security. After a solid grounding in well-known exploits like cross-site scripting (XSS) and cross-site request forgeries (CSRF), I'll demonstrate how traditional exploits are being used together and with other technologies like Ajax to launch sophisticated attacks that penetrate firewalls, target users, and spread like worms. I'll then discuss some ideas for the future, such as evaluating trends to identify suspicious activity and understanding human tendencies and behavior to help provide a better, more secure user experience.
HACKING DIVERSITY
We talk a lot about why diversity is important and we are all familiar with the woeful inclusion stats. In this talk we will discuss why diversity is important from both the perspective of an organization’s bottom line and the individual contributor.
Ethical hacking for information securityJayanth Vinay
In this paper I discussed about the security flaws and Attacks performed by Various Hackers at various situations and protection Methodologies are mentioned.
Do you think your home-based enterprise is too small to attract attention of hackers and cyber criminals? A hacker would be sitting behind you and follow your password over your shoulder as you are using a public Wi-Fi at Starbucks! Did you know that a pacemaker could be hacked to get personal and medical information to exploit against you for vandalism or monetary gain? The more you are unsuspecting and off-the-guard, the more you are prone to fall prey to devious schemes of cyber attacks. That’s why we created this presentation to present you everything you need to know to detect signs of cyber attacks including
- all possible risks of cyber attacks
- what’s your chances of getting hit by a hacker,
- who is targeting you
- What hackers can do?
- what type of information they are trying to steal
- Are you an Instagram addict? Get to know how your favorite social networking sites and other web-based services are exposing you to hackers
- Different types of cyber attacks
- Different types of baits, techniques and tools used by hackers
- How each type of cyber attacks works
- Do you know group of password crackers are at work in cracking your netbanking password? Check out if your password is strong and hard to crack
- What tools are they using to crack your password?
- How to verify all those banking email communications are NOT FROM YOUR BANK, but cyber attackers? Look out for these signs to distinguish between a phishing and a genuine email message.
- Are you choosing the right browser? Is your browser a staple target of hackers – here is how to choose the right browser before you get online
- Is your router doubling as a gateway for hackers to pass your information? Here is how to spot and prevent cyber attacks carried out through the router
- How to identify if you are opening a genuine or fake website? Here is how you can safeguard yourself before revealing your personal or financial data on a genuine-looking
fake website.
And many more scary facts and trends of cyber attacks covered in this presentation which can be a small handy 101 guide to keep you alert and safe online. In addition to the information and tips, we have a powerful and really effective tool to help you dodge and combat against hackers as you use Internet. If you needed an active watchdog to monitor, block and guard you from all types of online malicious activities in the background, then you cannot possibly give this a miss to find the best online safety partner for you.
Surf through the slides to find out everything you need to know and never thought you actually need… and let us know what you think. We are waiting!
Network Security, What is security?
Why do we need security?
Who is vulnerable? Common security attacks and countermeasures, Firewalls & Intrusion Detection Systems
Denial of Service Attacks
TCP Attacks
Packet Sniffing
Social Problems
Stealth Mango and the Prevalence of Mobile SurveillancewarePriyanka Aash
In this talk, we will unveil the new in-house capabilities of a nation state actor who has been observed deploying both Android and iOS surveillance tooling, known as Stealth Mango and Tangelo. The actor behind these offensive capabilities has successfully compromised the devices of government officials and military personnel in numerous countries with some directly impacting Western interests. Our research indicates this capability has been created by freelance developers who primarily release commodity spouse-ware but moonlight by selling their own custom surveillanceware to state actors. One such state actor has been observed deploying Stealth Mango and this presentation will unveil the depth and breadth of their campaigns, detailing not only how we watched them grow and develop, test, QA, and deploy their offensive tooling, but also how operation security mistakes ultimately led to their attribution.
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...Intellipaat
In this session on White Hat vs Black Hat vs Grey Hat, you will learn what are White hat, grey hat, and black hat hackers, the difference between Black Hat, White Hat, Grey Hat, Cybersecurity, how to get started. This is a must-watch session for everyone who wishes to learn cybersecurity and make a career in it.
Manabu Niseki, Hirokazu Kodera - Catch Phish If You Can: A Case Study of Phis...REVULN
Phishing, an old and traditional attack, is still a thing.
Hundreds of phishing website are launched every day and it threats people around the world. Anti-Phishing Working Group (APWG) says that APWG detected 150,000+ phishing websites for the 3rd quarter of 2018.
Sometimes phishing actors make OPSEC failures and, thanks to that, researchers can obtain a phishing kit (a kit to deploy a phishing website).
We have collected 18,000+ phishing kits based on OSINT and analyzed mechanisms of phishing websites and phishing actors themselves.
In this presentation, we will show the following findings.
- How to collect phishing kits based on OSINT data.
- Analysis of phishing actors:
- Who develops a phishing kit, How to distribute it, etc.
- Including a methodology to find out a phishing actor based on information (email, username and signature) inside a phishing kit.
- We will show an analysis of Indonesian phishing actors who target Asian countries.
- Especially focusing on an actor named DevilScream/Z1Coder who develops an infamous phishing kit“16shop”.
Finally, we will show countermeasures we have taken against phishing websites and actors.
Information Security & Data Security about the internet, daily life usages. The behavior of employees and contractors with access to data affects information systems and assets. The human factor (what employees do or don’t do) is the biggest threat to information systems and assets.
This is a multi-faceted workshop that explores new concepts in web security. After a solid grounding in well-known exploits like cross-site scripting (XSS) and cross-site request forgeries (CSRF), I'll demonstrate how traditional exploits are being used together and with other technologies like Ajax to launch sophisticated attacks that penetrate firewalls, target users, and spread like worms. I'll then discuss some ideas for the future, such as evaluating trends to identify suspicious activity and understanding human tendencies and behavior to help provide a better, more secure user experience.
HACKING DIVERSITY
We talk a lot about why diversity is important and we are all familiar with the woeful inclusion stats. In this talk we will discuss why diversity is important from both the perspective of an organization’s bottom line and the individual contributor.
A presentation I am giving this evening, as a guest speaker, invited by the Wisconsin Union Directorate, on the topics of cybersecurity, hacking, and privacy. The presentation covers some timely topics, such as: Hacking, Botnets, Deep Web, Target Stores Data Breach, Bitcoin and Ransomware. The presentation is designed to educate, stimulate conversation and entertain and is open to all students, faculty and staff of UW-Madison, who are interested in learning more about computer security and IT threats.
I published a paper on "Ethical Hacking And Hacking Attacks". The purpose of the paper is to tell that what is hacking, who are hackers, their types and some hacking attacks performed by them. In the paper I also discussed that how these attacks are performed.
An ethical hacker breaks into the security system of a website or computer on the instructions of his employer only to strengthen its security and prevent from hackers
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
PowerPoint Presentation On Ethical Hacking in Brief (Simple) Easy To Understand for all MCA BCA Btech Mtech and all Student who want a best powerpoint or seminar presentation on Ethical Hacking
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...Qazi Anwar
Hacking
History Of Hacking
Types of Hacking
The Most World’s famous Hackers
Types Of Hackers
Scope Of Ethical Hackers
Cyber Laws for Hacking and their Punishments in Pakistan
How to Prevent Hacking
Italy Agriculture Equipment Market Outlook to 2027harveenkaur52
Agriculture and Animal Care
Ken Research has an expertise in Agriculture and Animal Care sector and offer vast collection of information related to all major aspects such as Agriculture equipment, Crop Protection, Seed, Agriculture Chemical, Fertilizers, Protected Cultivators, Palm Oil, Hybrid Seed, Animal Feed additives and many more.
Our continuous study and findings in agriculture sector provide better insights to companies dealing with related product and services, government and agriculture associations, researchers and students to well understand the present and expected scenario.
Our Animal care category provides solutions on Animal Healthcare and related products and services, including, animal feed additives, vaccination
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Gen Z and the marketplaces - let's translate their needsLaura Szabó
The product workshop focused on exploring the requirements of Generation Z in relation to marketplace dynamics. We delved into their specific needs, examined the specifics in their shopping preferences, and analyzed their preferred methods for accessing information and making purchases within a marketplace. Through the study of real-life cases , we tried to gain valuable insights into enhancing the marketplace experience for Generation Z.
The workshop was held on the DMA Conference in Vienna June 2024.
Instagram has become one of the most popular social media platforms, allowing people to share photos, videos, and stories with their followers. Sometimes, though, you might want to view someone's story without them knowing.
3. Things We Will Learn
Hacking / Ethical Hacking Basics
Rules for Ethical Hacker
Tor
Reconnaissance Techniques
Mobile Hacking
SQLi
XSS Attacks
Reverse Engineering
LFI/RFI
Prevention Techniques & Security Tips
3
4. Hacking
There is Nothing Like White/Black/Evil/Ethical Hacking/Hacker.
What is the Difference Between Ethical Hacker & Cyber Security Expert?
What does the Term Hacker Mean?
A Person Who Takes Unauthorized Access of Any Data/Device.
What Hackers Do?
Find Bugs & Vulnerabilities & Using Those Vulnerabilities, They Exploit, Takes Unauthorized Access,
Steal Data &/ Manipulates The Data
What is the Prerequisite For To Be An Hacker?
A Person Should Have Immense Knowledge of Computers. (Basic to Advance)
4
5. Types of Hackers 5
Black Hat White Hat Gray Hat
Suicide
Hackers
Activist Script Kiddies Sponsored
8. Rules for Ethical Hacker
1. Set Your Goals Straight.
1. Think Like Intruder
2. Ask for Permission.
1. Get Proper Permission
3. Work Ethically, Work Professionally.
1. Stick To Your Goals
4. Always Keep Records.
1. Well Maintain Records
5. Respect The Privacy of Others.
1. Do Not Misuse The Information
6. Pick One Tool & Stick With it.
1. Quality
7. Provide Timely Progress Updates.
1. Organization Should Aware What You Are
Doing
8
9. Let’s Watch Some Videos
What is Hacking?
Beware of Hackers While Uploading Photos
Nothing is Free on Internet. We’re PAYING PASSIVELY AND UNINTENSIONALLY.
How Much Cyber Security & Incident Response Team Matters?
Is Any Body Safe on Internet? No, Not Even The Directors of FBI & CIA….!!
9
10. How Hacking Can Control A Country?
Step 1: Shutting Down Transport Systems
Step 2: Disable Financial Systems
Step 3: Turning off Public Utilities System
10
12. Why Cybercrimes Happen?
Lack of Knowledge in Cyber Security
70% of Vulnerabilities Exists at Application Layer nor the Network
30000 Websites Hacked Daily to Distribute Malware
96% of Tested Apps Have Vulnerabilities
86% of All Website Have At Least 1 Serious Vulnerability
12
13. Types of Internet
There Are Two Types Of Internet
Clearnet
Clearnet Is A Term Typically Referring To The Unencrypted, Or Non-darknet, Non-tor Internet. This
Traditional World Wide Web Has Relatively Low-base Anonymity, With Most Websites Routinely Identifying
Users By Their IP Address.
Darknet
A Darknet (Or Dark Net) Is An Overlay Network That Can Only Be Accessed With Specific Software,
Configurations, Or Authorization, Often Using Non-standard Communications Protocols And Ports. Two Typical
Darknet Types Are Friend-to-friend Networks (Usually Used For File Sharing With A Peer-to-
peer Connection) And Privacy Networks Such As Tor.
Dark Web
The Dark Web Is The World Wide Web Content That Exists On Darknets, Overlay Networks Which Use The
Public Internet But Require Specific Software, Configurations Or Authorization To Access.
13
15. Tor
Tor Stands for The Onion Router
It Encrypts The Data Multiple Times & Decrypted as it Travel Through The Network a Layer at
A Time: Like Peeling an Onion.
Tor is Entirely Separated Internet With its Own Browser.
The Domain/Extension of Tor Websites is .onion
Tor is Probably The Most Popular and Widely Used Free Software to Achieve Anonymity on
The Internet
Tor Has large User Base, The Project is Well Supported.
It Routes The Data Through Network Called “Circuit”
Data is Encrypted as it Passes Through Nodes (Until The Last Hop).
15
16. Let’s Explore Deep / Dark Web
The Hidden Wiki! Can Potentially Find Everything From Here!
http://kpvz7ki2v5agwt35.onion/wiki/index.php/Main_Page
The Silk Road Where U Can Buy Drugs =O
http://ianxz6zefk72ulzz.onion/index.php
More
16
20. SQL Injection - Google Dorking
A Google Dork Query, Sometimes Just Referred To As A Dork, Is A Search String That Uses
Advanced Search Operators To Find Information That Is Not Readily Available On A Website.
Google Dorking, Also Known As Google Hacking, Can Return Information That Is Difficult To Locate
Through Simple Search Queries. That Description Includes Information That Is Not Intended For Public
Viewing But That Has Not Been Adequately Protected.
As A Passive Attack Method, Google Dorking Can Return Usernames And Passwords, Email Lists,
Sensitive Documents, Personally Identifiable Financial Information (Pifi) And Website Vulnerabilities.
That Information Can Be Used For Any Number Of Illegal Activities, Including Cyberterrorism, Industrial
Espionage, Identity Theft And Cyberstalking.
20
23. How SQLi Works?
• The Most Common injection : put %' or '0'='0
• for example: $query = "SELECT first_name, last_name FROM users WHERE user_id = '$id';";
• after injecting the injection, the above query be like
• $query = "SELECT first_name, last_name FROM users WHERE user_id = ' %' or '0'='0 ';";
• Result of the first query when wrong id applied:
• SELECT first_name, last_name FROM users WHERE user_id = false;“
• Result of the second query when wrong id & injection applied:
• SELECT first_name, last_name FROM users WHERE user_id = false or true;“
• SELECT first_name, last_name FROM users WHERE user_id = true;“
23
24. XSS Attack
Cross-site scripting (XSS) is a code injection attack that allows an attacker to execute malicious
JavaScript in another user's browser.
Types: Reflected, Stored & DOM Based
Cookie theft
The attacker can access the victim's cookies associated with the website using document.cookie, send
them to his own server, and use them to extract sensitive information like session IDs.
Keylogging
The attacker can register a keyboard event listener using addEventListener and then send all of the
user's keystrokes to his own server, potentially recording sensitive information such as passwords and
credit card numbers.
Phishing
The attacker can insert a fake login form into the page using DOM manipulation, set the
form's action attribute to target his own server, and then trick the user into submitting sensitive
information.
24
27. Prevention Techniques
Secure Programming : Use Different Terminologies, Use Prepared / Parameterized Query, Escape
Sequences, Regular Expression, etc.
Install Software From Trusted Sources.
View App Permissions Before Installing Any App in Android.
Never Use MoD/Cracked Applications / Software.
Never Patch / Crack App / Software.
Use Firefox’s Private Window.
Use Search Engine Other Than Google, Bing & Yahoo.
Never Root (Android) / Jailbreak (iDevices).
Use Hibernator Apps & Ram Cleaner Apps.
Use Two – Factor or 2 – Step Verification.
From Last Update of Whatsaap Also Supports 2 – Step Verification.
Write Email ID Differently in Internet.
Write Like This: neeradtheprogrammer1997 [at] gmail [dot] com
Never Link Your Mobile Number in Social Networking Websites.
27
29. Prevention Techniques
Disable Google Timeline.
Since it Records Your Common Routine Path, Your Home Address, Your Office Address, All Movements, All Places
You Visited, Photos Taken @ Various Places.
Check Your Email @ These Website after Known Data Breach / Hack:
https://haveibeenpwned.com/
https://isleaked.com/
Your Password’s Length Should be >8, It Should Contain At Least One Capital, One Small, One Numeric,
One Special Characters.
Your Password Should NOT Contain Your Details (Name, Surname, Birth Date), Easily Predictable Words,
etc.
Always Update Your Browser, OS, Antivirus + Antimalware.
Avoid “Keep me logged in” or “Remember me”.
Never Click Links From Whatsapp / Facebook Like:
You can already get Internet Free Without WI-FI with WhatsApp and it is by means of invitations, here I give
you an invitation! > download link
Never Spread This Kind of Messages & Delete it Immediately.
29
30. Prevention Techniques
Use Free WiFi With Caution.
Never Reply Suspicious E-Mails.
Like: Your ATM is locked. Share your PIN and card number for security verification
Check Email Address of The Sender, Verify Locally (Calling / Visiting Bank Support)
Remember, None of Any Bank Never Ask You For Pin / Passwords.
Be Aware While Filling Forms
Check HTTPS
Check What Information Asks For
Setup Honeypots (For Business)
30
31. Prevention Techniques
Always Like / Send Friend Request to Verified Accounts – Case Study : Bindaas
Never Tag Anyone – Case Study: GFSU – Credit Card
If Tagged, Use Remove Tag Option
31
32. Prevention Techniques
Never Post Personal, Current Mood Information, Travelling, Check – In Information,
Listening, Watching Information, etc.
Or Select Your Custom Audience (Privacy)
Identify Fake Apps in Playstore & Other Markets
View User Ratings & Comments
32
34. Last Video of Session
After Lots of Practical Session & Theory, Let’s Watch A Video.
We Will See What Hackers Actually Do & How Terrifying It Is.
34
35. At Last, Some Defaced Websites
http://www.asrmaintl.com/
http://www.eaglegear.net/
http://www.gorsitech.com/
http://abdulind.com/
http://www.iph.com.pk/
http://www.zisir.com/mcs.html
http://www.paktradingco.com/mcs.html
http://www.gimamedical.com/mcs.html
http://www.mehramaind.com/mcs.html
http://www.pphi.org.pk/admin/voucher.php
http://www.nimlhr.gov.pk/nimPhotoGallery/staff/mcs.html
35