Hacking-Ethical and non Ethical

Views:
 
Category: Education
     
 

Presentation Description

Hacking is the art of exploitation which is breaking the computer password or showing the best knowledge of computers or systems and networks to break the security law in professional way Hackers are those who breaches the security of malicious system or un-authentication access to the system to protect and finding the weakness of the system click here to download the file https://adf.ly/ZepVr

Comments

By: gopiredyy (88 month(s) ago)

please sent this ppt to my email id [email protected]

Presentation Transcript

PowerPoint Presentation:

facebook hacking facebook- Facebook is a most popular social networking websites which allows registered users to create profiles ,upload photos and chat with online friends. Facebook uses the PHP and SQL page extension to create their website. facebook hacking techniques- There are two techniques of hacking facebook 1. Hi-tech Method ( Phishing Attack) 2. Social Engineering

PowerPoint Presentation:

Phishing Attack- Phishing is the act of attempting to acquire information such as username and passwords ( to create a phishing page i.e. facebook, g-mail, bank credit cards page) by masquerading as a trustworthy entity in an electronic communication. Steps for hacking with phishing page- 1. Create your domain on web hosting site. 2. Open facebook now right click> view page source > copy 3. Open notepad> paste html code> find action on the code 4. Now in action type “ phish.php” and save as “index.html” 5. You need a php script . In script at location type http://www.facebook.com and save this “phish.php” 6. Now upload “phish.php” & “index.html” on your web hosting server in “public.html” now the web hosting site or ftp server generate a link when you copy this link and paste in the url and hit enter it will show a fake page or phishing page which is look like a facebook login page. When someone will try to login in this fake page then his account will be hacked. Password and e-mail of victim stored in the “log.txt” file in “public.html”.

PowerPoint Presentation:

Facebook

PowerPoint Presentation:

HACKING

PowerPoint Presentation:

Windows Hacking- Windows hacking is the practice of modifying windows operating system to accomplish a goal outside of the of the creator original purpose. Windows hacking is most common among teenagers and young adults , although there are many older hackers as well. Where The Windows Password Stores- windows users password stored in LM hash & NTLM hash formats in the SAM file. SAM file is Security Accounts Manager file. Figure shows the SAM file Location. Windows hacking Techniques- Brute Force Attack- It is a trial-and-error method used to hack user’s passwords with using the Cain & Abel software. Oph crack Cd- it is a live boot cd which crack the password of windows user when insert the oph cd during the time of booting process. With CMD- steps are given. > open cmd with administrator > type in cmd “ net user username * “ (without inverted commas. In username type your PC (e.g. ghost-PC) name . > type a password: > confirm password: The command runs successfully

PowerPoint Presentation:

Hacking with cmd 1 2 3 4 5

PowerPoint Presentation:

Hacking with oph crack 1 2 3 4

PowerPoint Presentation:

Key Stroke loggers Hacking- key stroke loggers are actually tools which record every movement of the keys in the keyboard. There are software and hardware keystroke loggers that records the movement of keys directly. For maintaining access and privilege escalation the hacker who is now inside the target network will upload the keystroke logging softwares in to the system . How It Works- Key logger is a virus when a hacker install it in your (victim) system then it (virus) captures every keystroke (and all the function which is done by the victim) & send it to the email id of the hacker in images and texts format. Runs in invisible mode. Some Key Logger Software- 1. Ardamax Key Logger 2. Ghost Key Logger 3. Golden Key Logger 4. Stealth Key Logger 5. Actual Spy Key Logger

PowerPoint Presentation:

Website Hacking- Hacking is an art to break into the password protected sections of the website. After entering into the website, the hacker can do anything. He can either change the content of the website or he can also add his own material into it. Or he can also change the password of your password protected areas of the site Apply Blind SQL Injection – SQL means structured query language . It is used for web application hacking method. Steps For Hacking- * Open the website u want to hack. Provide wrong username-password. (e.g : Username - me and Password - ' or 1=1 --) An error occured saying wrong username-password. Now be prepared ur work starts from here... Right click anywhere on that page =>> go to view source. * There u can see the html codings with javascripts. * Before this login information copy the url of the site in which you are. >>>>>>>>>>>>>>>

PowerPoint Presentation:

>>>>>>>>>>>>>>> continue website hacking. Then delete the java script from the above that validates ur informaiton in the server.(Do this very carefully, ur success to hack the site depends upon this i.e how efficiently u delete the Javascripts that validate ur account information then look for...code ..: input name="password" type="password" => replace there instead of . See there if maxlength of password is less than 11 then increase it to 11 (e.g : if then write Just go to file => save as and save it any where within the hardisk with ext.html(e.g :c:hack.html) Close your webpage and go to the webpage u save in your harddisk(e.g : c:hack.html) Open it. * U see that some changes in current page as compared to original One. Don't worry. * Provide any username[e.g:hacker] and password[e.g:' or 1=1 --] Congrats!U hav cracked the above website and entered into the account of 1st user saved in the server's database Check The vulnerability Of Websites- There are some software for checking vulnerabilities of the sites. 1. Acunetix 2. Black Widow 3. Web Ripper

PowerPoint Presentation:

Trojan Viruses- A Trojan horse is a destructive program that masquerades as a benign application. The term comes from a Greek story of the Trojan war in which the Greeks fie a giant wooden horse to their foes, the Trojans, ostensibly as a peace offering. But after the Trojans drag the horse inside their city walls, Greek soldiers sneak out of the horse`s hollow belly and open the city gates, allowing their compatriots to pour in and capture TROY. There are many genere of Trojans like- password sending/capturing FTP Trojans Keystroke captures Trojans Remote access Trojans Destructive Trojans Proxy Trojans Some Of Trojan Virus Software- 1. Beast 2. Girlfriend 3. Donald Dick 4. Back Attack 5. Snow Door

PowerPoint Presentation:

HACKING hack I’m feeling unlucky

PowerPoint Presentation:

Google Hacking- Google is one of the most famous search engines used in the Internet. Using some kind of specialized keywords for searching we can find many such information that is put in publicly. For example if we use some keywords like for internal use only followed by the targets domain name we may get many such useful information. How It use- Just using the google dorks in search engine and search the database. Some Of The Google Dorks- filetype:sql password filetype:url +inurl:"ftp://" +inurl:";@" filetype:xls username password email htpasswd htpasswd / htgroup htpasswd / htpasswd.bak intext:"enable password 7"

PowerPoint Presentation:

Cyber Security- Cyber security is the body of technologies, processes and practices designedto protect networks, computers, programs and data from attack, damage or unauthorized access Cyber Law- The Information Technology Act, 2000 aims to provide for the legal framework so that legal sanctity is accorded to all electronic records and other activities carried out by electronic means.

PowerPoint Presentation:

Protect Ourselves From hacking- Update your Antivirus. Check the URL correctly. Keep touch with new software Use strong Passwords for your id . Advantages of hacking Helps in closing the open holes in the system network Provides security to banking and financial establishments Prevents website defacements An evolving technique Disadvantages of hacking All depends upon the trustworthiness of the ethical hacker Hiring professionals is expensive Application Of hacking- Certified Ethical Hacker (CEH) works for company . Some Cyber Security Agencies like IB ,FBI, RAW & Delhi Police etc are required CEH.

PowerPoint Presentation:

THANK YOU <?php echo "QUERY" ; ?>

authorStream Live Help