logging in or signing up information security and ethical hacking seminar ppt sahilrai85 Download Post to : URL : Related Presentations : Share Add to Flag Embed Email Send to Blogs and Networks Add to Channel Uploaded from authorPOINT lite Insert YouTube videos in PowerPont slides with aS Desktop Copy embed code: Embed: Flash iPad Copy Does not support media & animations WordPress Embed Customize Embed URL: Copy Thumbnail: Copy The presentation is successfully added In Your Favorites. Views: 1908 Category: Education License: All Rights Reserved Like it (4) Dislike it (0) Added: February 25, 2012 This Presentation is Public Favorites: 3 Presentation Description information security and ethical hacking ppt this ppt registered by appin bhilwar and made information security expert sudhir rai all rights reserved ... Comments Posting comment... By: katariya.milan123 (6 month(s) ago) i reatty want download this ppt so, i request you to give me permision to download this ppt Saving..... Post Reply Close Saving..... Edit Comment Close By: katariya.milan123 (6 month(s) ago) i want to download to this ppt Saving..... Post Reply Close Saving..... Edit Comment Close By: mehras007 (7 month(s) ago) i want to download it give me permission man...................... Saving..... Post Reply Close Saving..... Edit Comment Close Premium member Presentation Transcript PowerPoint Presentation: What is Information S ecurity Information security means protecting information and information systems from unauthorized access.PowerPoint Presentation: Why Need to Information S ecurity Because information is very important for every company, firm or person. If your information disclosed or hacked, Everyone know it is very harm full for him. So every company needs its information secure from unauthorized access. Protect information/systems/networks from damage by viruses, spyware, and other malicious code.PowerPoint Presentation: Ethical Hacking Ethical Hacking Organizations are increasingly, evaluating the success or failure of their current security measures through use of ethical hacking processes and techniques . Many security experts encourage organizations to hire ethical hackers to test their networks. Pathfinder aims to grab these for you . Hacking Simulation Games To understand the world of hacking learn to hack simulation games, crack the passwords, follow a map, choose server to enter a system and within time limit, take money, send virus, delete/steal files before you are tracked downPowerPoint Presentation: Introduction to Cyber crime Computer Crime, E-Crime, Hi-Tech Crime or Electronic Crime is where a computer is the target of crime or is the means adopted to commit a crime. Most of these crimes are not new. Criminals simply revise different ways to undertake standard criminal activities such as fraud , theft , blackmail , and forgery , often involving the Internet. Cyber criminals are leveraging innovation at a pace which many target organizations and security vendors can not possibly match.PowerPoint Presentation: India ranks 5 in reporting cyber crime cases India ranks fifth among countries reporting the maximum number of cyber crimes, the latest report released by Internet Crime Complaint Centre of the United States has said . Cyber crimes record 50% rise in India. The United States led the tally of victims complaints, while India remained at fifth by reporting 0.36% of the global complaints received at IC3 which was about 1,000 complaints, the data said . Majority of the fraudsters on the information highway, this year, resorted to the trick of selling products online but not delivering it to buyers who had already made payments. It remained the most adopted method to cheat during the year with 33% of internet crimes of this nature being reported, according to the report.PowerPoint Presentation: Recent Cyber Cases Andhra Pradesh Govt websites hacked Feb 17, 2012 , Some Bangladeshi hacking groups are suspected to be behind the incident . 20,000 Indian websites come under attack from Bangladesh hackers More than 120 website hacked by DR-MTMRD hacking group in O ct 2011. 5 Million of Android phone infected by virus The malware is embedded into various apps in the Android Market and once downloaded, launch services that send information from the device, such as MAC Address, SIM Serial, IMEI, and IMSI, back to the malicious host.PowerPoint Presentation: Types of Cyber Crimes Credit card frauds Cyber pornography Sale of illegal articles Online gambling Software piracy Copyright infringement Trademarks violations T heft of source code Email spoofing Forgery Phishing Defamation Cyber stalking (section 509 IPC) Cyber terrorismPowerPoint Presentation: Windows HackingBad Guys Can Easily Crack/Recover OS Password With :: Bad Guys Can Easily Crack/Recover OS Password With : Back Door Back Track Oph Crack Offline Password Cracker Hiren Multi Boot Disk Active Password Changer ERD Commander Kon Boot Hacker can recover or crack windows password with any live CD or Pen drive.PowerPoint Presentation: Admin Password Cracking Recovering or Cracking Windows User Login PasswordsPowerPoint Presentation: Windows login password W hen you create a new user account with password in windows, It will be store in SAM file . SAM ( S ecurity A ccounts M anager) is the part of Windows NT that manages the database of usernames, passwords and permissions. SAM file location at : C:\Windows\System32\ConfigPowerPoint Presentation: W hen you start the windows, SAM file becomes inaccessible to operating systems. Password always save as hexadecimal formats also called hashes. If password convert in hashes, you can not simply convert again in plain text. Windows login password (contd…)PowerPoint Presentation: Lets see Windows NT how to save user password New user when creating an account on windows Like a user name : (Sheela) password : (barbie.doll) Password convert in to Hashes It will stored on SAM in hashes formats you can not read , rename or delete .PowerPoint Presentation: Oph crack his own data base of hases and their coresponding charactrs Password stored in hashes format ecudkgzfqnn Windows Password Cracked by Booting the Computer from the Windows Live Disk Matching password with his own database OPH crack examplePowerPoint Presentation: Maintaining Access A backdoor in a computer system is a method of bypassing normal authentication , securing remote access to a computer, maintaining access to plaintext, and so on, while attempting to remain undetected. The backdoor may take the form of an installed program or may subvert the system through a rootkit . Use the Commands in the Command Prompt : net user administrator * Or net user hacker /add Windows HackingPowerPoint Presentation: Creating Backdoors Also at the same place you can find one more Utility “cmd.exe” which is of Command Prompt. Now what to do for having Command prompt in place of Sticky Keys. If I will replace “sethc.exe” with “cmd.exe” then when I will press Shift key for 5 times, I will get Command Prompt in place of Sticky Keys. Windows hackingPowerPoint Presentation: Creating Backdoors But what is benefit of these commands ?? I cannot use these commands because Computer is locked and asking for the password, which has been changed by the Administrator. But what if I can get Command Prompt at the Login Screen ?? Press Shift key for 5 times, you will get a POP UP Window, asking for enabling or disabling Sticky Keys. Now try to press Shift key for 5 times at the Login Screen, oops I got the same result. Utility for Sticky Keys: s ethc.exe Location: C:\Windows\System32\sethc.exePowerPoint Presentation: Sending Anonymous Mail Sending fake mail: In this technic user can easily send fake mail by other user Email id.PHISHING : PHISHING VICTIM PC ATTACKER PC Attacker send fake login link to victim As it : http://www.example/gmail.com In phishing attacker manipulate the general parson login with modify fake page, when victim login with fake page his password redirect to hacker . Creating a replica of an existing Web page to fool a user into submitting personal, financial, or password dataPowerPoint Presentation: When victim login with fake link attacker job done. User: ***** Pass: ***** User: sheela Pass: barbie.doll User password redirect to attacker systems Miss sheela is hacked User name – sheela Pass- barbie.dolPowerPoint Presentation: What is SQL SQL is a structure query language It can be store our website data base in websites, user name password table contents and maintains users entry’s …..PowerPoint Presentation: SQL INJECTION ATTACK A simple SQL injection attack: A SQL injection attack exploits vulnerabilities in a web server database that allows the attacker to gain access to the database and read, modify, or delete information.PowerPoint Presentation: An example of a SQL injection attack is making the login condition “TRUE” by giving the identical value to a web page. These values can be inserted into a login as follows: • Username: 1′ or ’1′=’1 • Password: 1′ or ’1′= ’1PowerPoint Presentation: Try to login with sql injection User name: 1 ′ or ’1′= ’1 Password : 1 ′ or ’1′=’1 Done to deface administrator panel Easley And stolen , delete , change administrator data …….PowerPoint Presentation: Steganography Steganography ( computer science ) The art and science of hiding a message in a medium, such as a digital picture or audio file. is the hiding of a secret message within an ordinary message and the extraction of it at its destinationMobile Hacking : Mobile Hacking CDMA Mobile cloning A llowing the (ESN) of the mobile phone to be modified. In mobile cloning hacker copy (ESN) and (MIN) no and write this any other computer chip or devise and easy to clone any cdma mobile numbers ESN (electronic serial number ) MIN ( mobile identification number) Cloned sim cardPowerPoint Presentation: Information Security Market S cenario Information security demand increasing 17.5% per year... Best way of bright future for technical students. The demand for information security professionals is grown 20% in 2011. It is expected to grow 22% in the year 2012.PowerPoint Presentation: An earlier misconception was that the security industry existed to make people scared and then sell them something to protect them from what they were afraid of. But now thinking has been changed as it actually exists because of what people are prepared to buy. In 2008 , T he world information security product and service market was approximately $64.5 bn. Leading information security markets are found throughout the industrialized world, such as the US, Canada, France, Italy, Germany, Japan and the United Kingdom. In 2010, In 2012 , T he global IT security market ( includes security software & security appliances) grew at a Annual Growth Rate of 15.5%. Information security demand in the US is projected to increase 17.5 % per year i.e. increase of $38.3 bn .PowerPoint Presentation: A A World of Opportunities The Asia-Pacific region is anticipated to account for the majority of Information Security solutions market by 2012. In this world of Opportunities you will see almost every sector emphasizing on Information Security Banking Sector Corporate Sector Automobile Sector Aviation Industry IT Industry Educational Institutions Government Sector Cyber Crime Investigation C ells Global Security Agencies Information System Security AssociationPowerPoint Presentation: Become A Security Expert Cyber security professional Information Security Professional IS Executive Information System Auditor Security Advisors Software developers IT specialists IT system executives IT consultants Assistant Software Engineer Software Test Engineer R&D Executive Security Consultant System Engineer Network Engineer Network Administrator and many more… sector . The Appin Pathfinder prepares you for numerous career opportunities. If you've ever wondered what you can become, here are some answers. These are the career profiles chosen by students immediately after their schools and are earning huge packages despite of their age and less experience. Thousands of our students have been placed with many top companies in IT and securityPowerPoint Presentation: app in k nowl edge solut ionPowerPoint Presentation: Contact us :Appin Technology Lab www.appinonline.comPowerPoint Presentation: MODULE 1: Introduction MODULE 2: Desktop & Server Security Windows Linux MODULE 3: Data Security Cryptography Steganography MODULE 4: Network Security Mobile Security VPN Security Wi-Fi Security Router Security Intrusion Detection & Prevention MODULE 6 : Hacking Attack Malwares Back- T rack Art of Googling MODULE 8: IS Management System Security Auditing Critical Control Lead Auditor MODULE 9: Cyber Laws & IT Acts E-Governance Indian Cyber Law IT Act 2000-2008 ISEH V7 C ourse Highlights MODULE 5: VAPT Vulnerability Assessment Penetration Testing MODULE 7: Cyber Forensics Cyber Crime Cyber Security Mobile ForensicsPowerPoint Presentation: Thank You You do not have the permission to view this presentation. In order to view it, please contact the author of the presentation.