SlideShare uma empresa Scribd logo
1 de 12
Lecture 18
HACKING (CONTINUED)
WHY DO PEOPLE HACK ?
JUST FOR FUN.
SHOW OF THEIR KNOWLEDGE.
HACK OTHER SYSTEM SECRETLY.
DESTROY ENEMY’S COMPUTER NETWORK
DURING THE WAR.
FOR PROFIT PEOPLE PAYS A CRACKER.
CRACK FOR SAKE OF CURIOCITY.
THE PSYCOLOGY OF HACKERS
ALL INFORMATION SHOULD BE FREE.
ACCESS TO COMPUTER SHOULD BE
UNLIMITED AND FREE.
IT CAN CHANGE LIFE FOR BETTER.
IT CAN CREATE BEAUTY ON COMPUTER.
TYPES OF HACKING
THERE ARE MANY TYPES OF HACKING
LIKE
• PASSWORD HACKING
• SOFTWARE HACKING
• NET HACKING
PASSWORD HACKING
 TWO TYPES
1. BRUTE FORCE
• IN THAT CASE HACKERS TRY OUT ALL THE
COMBINATION OF ALL KEYBOARD LETTERS .IT HAS
GRATER SUCCESS BUT IT TAKES LONG TIME
2. DICTIONARY BASED
• IN THAT THEY ARE USE PREDEFINE PASSWORD.IT IS
UNSUCCESSFUL METHOD
SOFTWARE HACKING
IN THAT HACKERS CHANGES THE LOOK &
EXCUTION WAY OF THAT SOFTWARE
 CHANG THE DEMO VERSION INTO FULL
VERSION BY DECODING THE SOURCE CODE
IP ADDRESS
IP ADDRESS IS THE ADDRESS OF YOUR
COMPUTER IN THE INTERNET
IT IS UNIQ
LIKE 192.168.23.45
PORT
 IT IS NOT PHYSICAL PORT BUT IT IS LOGICAL PORT IN YOUR
COMPUTER
 IT IS JUST LIKE HOLE ONTO THE SYSTEM.THROUGH HACKER
CAN ENTER
 THERE ARE THOUSANDS OF PORTS INTO COMPUTER
 THE PETICULAR SERVICE IS RUNNING ON PERTICULAR PORT
 LIKE
PORT 21 : FTP
PORT 23 : TELNET
PORT 80 : HTTP
PORT 25 : MAIL
HACKING TOOLS
THERE ARE MANY TOOLS ARE AVILABLE
• SCANNERS
• TELNET
• FTP
• LAN WATCH
SCANNERS
 IT IS NOT A PHOTO SCANNER
 SCANNER IS PROGRAM THAT AUTOMATICALLY
DETECTS SECURITY WEAKNESS IN REMOTE HOST
 PORT SCANNERS ARE USED IN HACKING
 PORT SCANNER CAN GIVE THE WHOLE LIST OF OPEN
PORT ON THAT SYSTEM AND WHICH SERVICE IS
RUNNING ON THAT
 IT CAN USE ALMOST ALL OPERATING SYSTEM
 EX. SATAN,NMAP
TELNET
TELNET IS ULTIMATE HACKING TOOL
 IT IS TERMINAL EMULATION PROGRAM THAT
ALLOWS US TO CONNECT TO REMOTE SYSTEM
 YOU HAVE TO FOLLOW THIS STEP TO USE
TELNET
C:WINDOWSTELNET [IP ADDRESS] PORT
FTP
 FTP IS ONE TYPE OF PROTOCOL BUT SOME TIME IT IS
USED AS HACKING TOOL
 PORT 21 FOR THE FTP
 FOR CONNECTING FTP WE NEED SOME FTP S/W
KNOWN AS FTP CLIENT
 FOR CONNECTING FTP SERVER YOU HAVE TO
HAMMER THAT SERVER
 COMMAND:
C:WINDOWSFTP [IP ADDRESS]:PORT

Mais conteúdo relacionado

Mais procurados

Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking PresentationAmbikaMalgatti
 
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-statesSecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-statesMikko Hypponen
 
The Basics of Ethical Hacking
The Basics of Ethical HackingThe Basics of Ethical Hacking
The Basics of Ethical HackingVamshi TG
 
Introduction of computer security
Introduction of computer securityIntroduction of computer security
Introduction of computer securitySoundaryaB2
 
A survey of ethical hacking process and security
A survey of ethical hacking process and securityA survey of ethical hacking process and security
A survey of ethical hacking process and securityAhmad El Tawil
 
Cyber security review paper
Cyber security review paperCyber security review paper
Cyber security review paperMaheshSwami19
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network securityVikram Khanna
 
David Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer MalwareDavid Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer MalwarePro Mrkt
 
Umbrella roaming-customer-facing
Umbrella roaming-customer-facingUmbrella roaming-customer-facing
Umbrella roaming-customer-facingRicardo Mendizabal
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingdjkhatri
 

Mais procurados (20)

My presentation
My presentationMy presentation
My presentation
 
Hacking
HackingHacking
Hacking
 
Network Security
Network SecurityNetwork Security
Network Security
 
Hacking
HackingHacking
Hacking
 
Ethical hacking Presentation
Ethical hacking PresentationEthical hacking Presentation
Ethical hacking Presentation
 
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-statesSecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
SecTor 2011 Keynote: Online Attacks and Espionage by Nation-states
 
The Basics of Ethical Hacking
The Basics of Ethical HackingThe Basics of Ethical Hacking
The Basics of Ethical Hacking
 
Introduction of computer security
Introduction of computer securityIntroduction of computer security
Introduction of computer security
 
A survey of ethical hacking process and security
A survey of ethical hacking process and securityA survey of ethical hacking process and security
A survey of ethical hacking process and security
 
Cyber security review paper
Cyber security review paperCyber security review paper
Cyber security review paper
 
Firewalls in network security
Firewalls in network securityFirewalls in network security
Firewalls in network security
 
Ps1
Ps1Ps1
Ps1
 
Network security
Network securityNetwork security
Network security
 
Hacking final
Hacking finalHacking final
Hacking final
 
David Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer MalwareDavid Emm | The What, How, Who and Why of Computer Malware
David Emm | The What, How, Who and Why of Computer Malware
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Honeypot2
Honeypot2Honeypot2
Honeypot2
 
Hacking intro
Hacking introHacking intro
Hacking intro
 
Umbrella roaming-customer-facing
Umbrella roaming-customer-facingUmbrella roaming-customer-facing
Umbrella roaming-customer-facing
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Destaque (20)

PPIT Lecture 06
PPIT Lecture 06PPIT Lecture 06
PPIT Lecture 06
 
Materi ajar eksponensial
Materi ajar eksponensialMateri ajar eksponensial
Materi ajar eksponensial
 
Arm
Arm Arm
Arm
 
Silabus eksponen
Silabus eksponenSilabus eksponen
Silabus eksponen
 
Welcome
WelcomeWelcome
Welcome
 
Never give up
Never give upNever give up
Never give up
 
Spsnj case study 2014
Spsnj case study 2014Spsnj case study 2014
Spsnj case study 2014
 
Leadership
LeadershipLeadership
Leadership
 
Latihan soal
Latihan soalLatihan soal
Latihan soal
 
Presentation3
Presentation3Presentation3
Presentation3
 
Welcome
WelcomeWelcome
Welcome
 
Elements of music: Dynamics and Tone Color
Elements of music: Dynamics and Tone ColorElements of music: Dynamics and Tone Color
Elements of music: Dynamics and Tone Color
 
The calendar of events october 13 - october 19
The calendar of events october 13 - october 19The calendar of events october 13 - october 19
The calendar of events october 13 - october 19
 
Personal branding project
Personal branding projectPersonal branding project
Personal branding project
 
Elements of Music: Form Notes
Elements of Music: Form NotesElements of Music: Form Notes
Elements of Music: Form Notes
 
Elements of music: Tone Color
Elements of music: Tone ColorElements of music: Tone Color
Elements of music: Tone Color
 
Events1
Events1Events1
Events1
 
Music video timeline part 2
Music video timeline part 2Music video timeline part 2
Music video timeline part 2
 
Roads (en)
Roads (en)Roads (en)
Roads (en)
 
The walking dead 01
The walking dead 01The walking dead 01
The walking dead 01
 

Semelhante a PPIT Lecture 18 (20)

Hacking
Hacking Hacking
Hacking
 
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHMPROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
PROJECT REPORT ON CRYPTOGRAPHIC ALGORITHM
 
Backtrack Manual Part8
Backtrack Manual Part8Backtrack Manual Part8
Backtrack Manual Part8
 
Ijtra150171
Ijtra150171Ijtra150171
Ijtra150171
 
BlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deceptionBlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deception
 
Network security
Network securityNetwork security
Network security
 
Hacker
HackerHacker
Hacker
 
ETHICAL HACKING BY HRITIK JAGE
ETHICAL HACKING BY HRITIK JAGEETHICAL HACKING BY HRITIK JAGE
ETHICAL HACKING BY HRITIK JAGE
 
cyber sequirety Terms.pptx
cyber sequirety Terms.pptxcyber sequirety Terms.pptx
cyber sequirety Terms.pptx
 
Hacking tutorial
Hacking tutorialHacking tutorial
Hacking tutorial
 
Hacking and Types of Hacker.
Hacking and Types of Hacker.Hacking and Types of Hacker.
Hacking and Types of Hacker.
 
Introduction to ceh
Introduction  to cehIntroduction  to ceh
Introduction to ceh
 
Chapter 7 security tools i
Chapter 7   security tools iChapter 7   security tools i
Chapter 7 security tools i
 
Cyber Security Fundamentals
Cyber Security FundamentalsCyber Security Fundamentals
Cyber Security Fundamentals
 
Netdefender
NetdefenderNetdefender
Netdefender
 
Hacking In Detail
Hacking In DetailHacking In Detail
Hacking In Detail
 
Ceh v5 module 05 system hacking
Ceh v5 module 05 system hackingCeh v5 module 05 system hacking
Ceh v5 module 05 system hacking
 
G3t R00t at IUT
G3t R00t at IUTG3t R00t at IUT
G3t R00t at IUT
 
Tor Tracer
Tor TracerTor Tracer
Tor Tracer
 
HES2011 - Sebastien Tricaud - Capture me if you can
HES2011 - Sebastien Tricaud - Capture me if you canHES2011 - Sebastien Tricaud - Capture me if you can
HES2011 - Sebastien Tricaud - Capture me if you can
 

Mais de Kashif Sohail

Mais de Kashif Sohail (10)

PPIT Lecture 20
PPIT Lecture 20PPIT Lecture 20
PPIT Lecture 20
 
PPIT Lecture 10
PPIT Lecture 10PPIT Lecture 10
PPIT Lecture 10
 
PPIT Lecture 9
PPIT Lecture 9PPIT Lecture 9
PPIT Lecture 9
 
PPIT Lecture 8
PPIT Lecture 8PPIT Lecture 8
PPIT Lecture 8
 
PPIT Lecture 7
PPIT Lecture 7PPIT Lecture 7
PPIT Lecture 7
 
PPIT Lecture 4
PPIT Lecture 4PPIT Lecture 4
PPIT Lecture 4
 
PPIT Lecture 5
PPIT Lecture 5PPIT Lecture 5
PPIT Lecture 5
 
PPIT Lecture 2
PPIT Lecture 2PPIT Lecture 2
PPIT Lecture 2
 
PPIT Lecture 1
PPIT Lecture 1PPIT Lecture 1
PPIT Lecture 1
 
Introduction to Human Resource Management - HRM Dessler 12e Chapter 01
Introduction to Human Resource Management - HRM Dessler 12e Chapter 01Introduction to Human Resource Management - HRM Dessler 12e Chapter 01
Introduction to Human Resource Management - HRM Dessler 12e Chapter 01
 

Último

Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentationvaddepallysandeep122
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Software Coding for software engineering
Software Coding for software engineeringSoftware Coding for software engineering
Software Coding for software engineeringssuserb3a23b
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 

Último (20)

Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Software Coding for software engineering
Software Coding for software engineeringSoftware Coding for software engineering
Software Coding for software engineering
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 

PPIT Lecture 18

  • 2. WHY DO PEOPLE HACK ? JUST FOR FUN. SHOW OF THEIR KNOWLEDGE. HACK OTHER SYSTEM SECRETLY. DESTROY ENEMY’S COMPUTER NETWORK DURING THE WAR. FOR PROFIT PEOPLE PAYS A CRACKER. CRACK FOR SAKE OF CURIOCITY.
  • 3. THE PSYCOLOGY OF HACKERS ALL INFORMATION SHOULD BE FREE. ACCESS TO COMPUTER SHOULD BE UNLIMITED AND FREE. IT CAN CHANGE LIFE FOR BETTER. IT CAN CREATE BEAUTY ON COMPUTER.
  • 4. TYPES OF HACKING THERE ARE MANY TYPES OF HACKING LIKE • PASSWORD HACKING • SOFTWARE HACKING • NET HACKING
  • 5. PASSWORD HACKING  TWO TYPES 1. BRUTE FORCE • IN THAT CASE HACKERS TRY OUT ALL THE COMBINATION OF ALL KEYBOARD LETTERS .IT HAS GRATER SUCCESS BUT IT TAKES LONG TIME 2. DICTIONARY BASED • IN THAT THEY ARE USE PREDEFINE PASSWORD.IT IS UNSUCCESSFUL METHOD
  • 6. SOFTWARE HACKING IN THAT HACKERS CHANGES THE LOOK & EXCUTION WAY OF THAT SOFTWARE  CHANG THE DEMO VERSION INTO FULL VERSION BY DECODING THE SOURCE CODE
  • 7. IP ADDRESS IP ADDRESS IS THE ADDRESS OF YOUR COMPUTER IN THE INTERNET IT IS UNIQ LIKE 192.168.23.45
  • 8. PORT  IT IS NOT PHYSICAL PORT BUT IT IS LOGICAL PORT IN YOUR COMPUTER  IT IS JUST LIKE HOLE ONTO THE SYSTEM.THROUGH HACKER CAN ENTER  THERE ARE THOUSANDS OF PORTS INTO COMPUTER  THE PETICULAR SERVICE IS RUNNING ON PERTICULAR PORT  LIKE PORT 21 : FTP PORT 23 : TELNET PORT 80 : HTTP PORT 25 : MAIL
  • 9. HACKING TOOLS THERE ARE MANY TOOLS ARE AVILABLE • SCANNERS • TELNET • FTP • LAN WATCH
  • 10. SCANNERS  IT IS NOT A PHOTO SCANNER  SCANNER IS PROGRAM THAT AUTOMATICALLY DETECTS SECURITY WEAKNESS IN REMOTE HOST  PORT SCANNERS ARE USED IN HACKING  PORT SCANNER CAN GIVE THE WHOLE LIST OF OPEN PORT ON THAT SYSTEM AND WHICH SERVICE IS RUNNING ON THAT  IT CAN USE ALMOST ALL OPERATING SYSTEM  EX. SATAN,NMAP
  • 11. TELNET TELNET IS ULTIMATE HACKING TOOL  IT IS TERMINAL EMULATION PROGRAM THAT ALLOWS US TO CONNECT TO REMOTE SYSTEM  YOU HAVE TO FOLLOW THIS STEP TO USE TELNET C:WINDOWSTELNET [IP ADDRESS] PORT
  • 12. FTP  FTP IS ONE TYPE OF PROTOCOL BUT SOME TIME IT IS USED AS HACKING TOOL  PORT 21 FOR THE FTP  FOR CONNECTING FTP WE NEED SOME FTP S/W KNOWN AS FTP CLIENT  FOR CONNECTING FTP SERVER YOU HAVE TO HAMMER THAT SERVER  COMMAND: C:WINDOWSFTP [IP ADDRESS]:PORT