SlideShare uma empresa Scribd logo
1 de 34
Ethical Hacking
Contents:
• Introduction
• Mobile hacking
• Blocking Sites
• Proxy Servers
• Password Cracking
• Facebook TRicks
• Anonymous Surfing
• Warnings
Introduction:
: Ethical hacking and ethical hacker are
terms that describe hacking performed to
help a company or individual identify
potential threats on the computer or
network.
: An ethical hacker attempts to hack their
way past the system security, finding any
weak points in the security that could be
exploited by other hackers.
: The organization uses what the ethical
hacker finds to improve the system
security.
Rules &Regulations:
• You have permission to probe the network and attempt to
identify potential security risks. It is recommended that if
you are the person performing the tests that you get
written consent.
• You respect the individual's or company's privacy and only
go looking for security issues.
• You report all security vulnerabilities you detect to the
company, not leaving anything open for you or someone
else to come in at a later time.
• You let the software developer or hardware manufacturer
know of any security vulnerabilities you locate in their
software or hardware if not already known by the company.
-SCRIPT KIDDIES
-WHITE HAT HACKERS
-BLACK HAT HACKERS
-GRAY HAT HACKERS
Types of Hackers:
Blocking Sites:
• This may be an Interesting one to know ..How
actually an Admin puts a Restriction on
popular sites/Social Networking Sites/Adult
sites……..
Steps:
• Firstly browse the following route:
• C:windowssystem32driversetc
• Find the file Named as ”Hosts”
• Under "127.0.0.1 localhost" Add 127.0.0.2
www.xyz.com , and that site will no longer be
accessable.
• DONE !
Steps:
For every site after that you want to add, just add "1" to
the last number in the internal ip (127.0.0.2) and then
the addy like before.
ie:
127.0.0.3 www.yahoo.com
127.0.0.4 www.msn.com
127.0.0.5 www.google.com
Mobile Hacking
Steps to follows:
-Go to https://www.mobivox.com
-Make a free account up there.
During registration don’t forget to enter the victims
mobile number.
-Once the confirmations is being made, then
Go that site again and click on “DIRECT WEB CALL”.
-Fill up the common details related to it….
-THAT’S IT.
Proxy Servers:
• These Servers Allows the User to provide a
network to a Blocked Sites.
• Bascially ,Top rated Proxy Server:
• Hidemyass.com
Some Popular PROXY Servers:
www.meebo.com/
www.iloveim.com/
www.the-cloak.com/
www.cantblock.me
www.mb35.info
www.cloaking.me
www.proxybrowsing.com
www.behidden.com
www.yourfreedom.net
www.hujiko.com
www.anonymizer.ru
www.schoolproxylists.cn/
www.xysurfing.com/
www.googlefaker.com/
www.internetoxy.com/
Password Cracking:
• CMD
• Free SOFTWARES
1. GO TO START –> RUN –> TYPE IN CMD
2. ENTER COMMAND: CD
WINDOWSSYSTEM32
3. MKDIR NEWPASS
4. COPY LOGON.SCR NEWPASSLOGON.SCR
5. COPY CMD.EXE NEWPASSCMD.EXE
6. DEL LOGON.SCR
7. RENAME CMD.EXE LOGON.SCR
CMD IN WINDOWS XP/7
Note:
• So basically you are telling windows is to
backup the command program and the screen
saver file.
• Then we edited the settings so when
windows loads the screen saver, we will get an
unprotected dos prompt without logging in.
When this appears enter this command :-
net user username password
Example:
• If the admin username is ‘CyberSix’ and you want
change the password to ‘cyber6’ Then type in the
following command :-
net user CyberSix cyber6
• This will change the administrator password to
cyber6.
• Thats it you have sucessfully hacked the Window
XP Administrator Password now you can Log in,
using the hacked Window XP Administrator
Password and do whatever you want to do.
Bacic technique Used in Win7
• Open Cmd(Command Prompt).
• Net user username*
• Put a password.
• Again put Password for confirmation..
• Done…
• Bascially , Cmd is somewhere Not
authorised to used it…SO don’t worry….steps
are simple….
Steps:
-Open Notepad
Type: www.cmdcommand.com
-save File as .bat
-Double Click on it…
CMD Opens………………………………………….
Free Softwares:
-Ophcrack
-UbuntuOS
There are many Softwares available in the Google
Search Engine You may find. But I think the Above two
which I listed were Perfect One..
Everything about these softwares that is how to
install, and how to work upon it, all were given in
their official Sites. So Feel Free !!
Anonymous Surfing:
-There are various methods to achieve the Anonymous surfing.
-Use Trusted VPN (Virtual Private Network),such as Cyberghost,
Proxpn, Hotspot Shield or use Proxy Servers and so on.
-The best and Most secured way is to use the Tor browser. Most
secured and Trusted one.
Simply stating: If you are using the Tor Browser, You didn’t have
to worry about the Admin who is monitoring you .This is
because, it hides your IP address even MAC too and assigns our
IP address with the unknown IP address of an unknown location
which ever it gets through Tor Network, which you might say as
a Proxy servers address. So its hard for him to trace out the
location. It doesn’t matter if you are using Cyberoam captive
portal. It’s a highly Secured one.
Facebook Tracing:
Step 1) Go to your Facebook Profile Page.
Step 2) Now Press Ctrl + U from your keyboard for
see source code of your profile page.
Step 3) Now press Ctrl + F from your keyboard to
open search box.
Step 4) Now search this code {"list":
Step 5) You find some Facebook Profile Ids are
like shown below. Click on example image for
zoom.
Steps:
•
Step 6) There are some Facebook Profile Ids of your friends
who visited recently.
Step 7) The first one ID's are showing visits the most
number of time.
Step 8) Now if your want to findout, Open a new tab Enter
below link :
www.facebook.com/Facebook Profile Id
For Example : www.facebook.com/100001257992988
• DONE…..
How to Cancel Friends Request:
1. Go to account settings.
2. Select `download a copy
3. Choose `expanded archive` from the next page opened and
enter your password and click continue.
4. Select `start my archive`.
5. After a few hours you'll get the download link in your email.
5. Download the file `facebook` and unzip it.
6. Open the folder html and then `friend_requests.html`.
7. You can see the list of your friend requests and pending
lists.
Now goto their accounts and click`cancel request.
That's all You are done now. Your account is safe.
Fake Facebook_ID
-WE (BOYS) always in search of a SEXY girl in
Facebook….
STOP
Would u know is she Really Exist?? OR Is it a Girl only?
There is a solution to find the Truth..
Sounds Crazy..
Lets have a look..
Trick:
-Firstly
Open the Profile Pic of a Victim…
-Right click on it…
-Copy the image URL(Uniform Resource Locator)
-Paste the link into Google images….
-Press ENTER…
YIPEEE.
That’s done….IF the searched Item found to be in
some site it means it’s a fake…Otherwise if its give an
Error….Means Victim isnt Fake…………….
Warnings:
• Hello Guys, whatever I showed up in the Slides
are just up to the Knowledge Purpose only.
Just Keep that one thing in mind..
• That’s it.
Hope you like my slides !
See you guys ..
Have a nice time !!
Thanking you.
:D
For more tricks ,Keep Following. !

Ethical hacking

Mais conteúdo relacionado

Mais procurados

Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2mubeenm50
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Securitysumit dimri
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N GHafizra Mas
 
Password hacking
Password hackingPassword hacking
Password hackingAbhay pal
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security Lokender Yadav
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_pptNarayanan
 
Preventions of Email Hacking
Preventions of Email HackingPreventions of Email Hacking
Preventions of Email HackingUsman Khan
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern timesjeshin jose
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking PresentationLaura Platt
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksSrikanth VNV
 
Hacking Tutorial in Telugu
Hacking Tutorial in TeluguHacking Tutorial in Telugu
Hacking Tutorial in TeluguSravani Reddy
 
security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...ABHAY PATHAK
 
National information security education & awareness program
National information security education & awareness programNational information security education & awareness program
National information security education & awareness programNeel Kamal
 
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusTrojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusABHAY PATHAK
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingarohan6
 

Mais procurados (20)

Hackers
HackersHackers
Hackers
 
Hacking version 2
Hacking version 2Hacking version 2
Hacking version 2
 
Ethical Hacking and Network Security
Ethical Hacking and Network SecurityEthical Hacking and Network Security
Ethical Hacking and Network Security
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
 
Hacking
HackingHacking
Hacking
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_ppt
 
Preventions of Email Hacking
Preventions of Email HackingPreventions of Email Hacking
Preventions of Email Hacking
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
Hacking Tutorial in Telugu
Hacking Tutorial in TeluguHacking Tutorial in Telugu
Hacking Tutorial in Telugu
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Hacking
HackingHacking
Hacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...
 
National information security education & awareness program
National information security education & awareness programNational information security education & awareness program
National information security education & awareness program
 
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virusTrojan and Virus,Trojan horse,virus,how to make and defend the virus
Trojan and Virus,Trojan horse,virus,how to make and defend the virus
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 

Destaque

Practical Cyber Attacking Tutorial
Practical Cyber Attacking TutorialPractical Cyber Attacking Tutorial
Practical Cyber Attacking TutorialYam Peleg
 
Sales Email Tracking 101
Sales Email Tracking 101Sales Email Tracking 101
Sales Email Tracking 101ToutApp, Inc.
 
Threats due to information technology icai
Threats due to information technology icaiThreats due to information technology icai
Threats due to information technology icaiMayank Garg
 
VMRay intro video
VMRay intro videoVMRay intro video
VMRay intro videoChad Loeven
 
Ajit-Legiment_Techniques
Ajit-Legiment_TechniquesAjit-Legiment_Techniques
Ajit-Legiment_Techniquesguest66dc5f
 
The (In)Security of Topology Discovery in Software Defined Networks
The (In)Security of Topology Discovery in Software Defined NetworksThe (In)Security of Topology Discovery in Software Defined Networks
The (In)Security of Topology Discovery in Software Defined NetworksTalal Alharbi
 
Welcome to the United States: An Acculturation Conversation
Welcome to the United States: An Acculturation ConversationWelcome to the United States: An Acculturation Conversation
Welcome to the United States: An Acculturation ConversationSuzanne M. Sullivan
 
Automated JavaScript Deobfuscation - PacSec 2007
Automated JavaScript Deobfuscation - PacSec 2007Automated JavaScript Deobfuscation - PacSec 2007
Automated JavaScript Deobfuscation - PacSec 2007Stephan Chenette
 
Code obfuscation, php shells & more
Code obfuscation, php shells & moreCode obfuscation, php shells & more
Code obfuscation, php shells & moreMattias Geniar
 
A combined approach to search for evasion techniques in network intrusion det...
A combined approach to search for evasion techniques in network intrusion det...A combined approach to search for evasion techniques in network intrusion det...
A combined approach to search for evasion techniques in network intrusion det...eSAT Journals
 
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon Yang
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon YangPractical IoT Exploitation (DEFCON23 IoTVillage) - Lyon Yang
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon YangLyon Yang
 
Topics in network security
Topics in network securityTopics in network security
Topics in network securityNasir Bhutta
 
Quotes on education in telugu
Quotes on education in teluguQuotes on education in telugu
Quotes on education in teluguK.SURYA SAGAR
 
Bsides to 2016-penetration-testing
Bsides to 2016-penetration-testingBsides to 2016-penetration-testing
Bsides to 2016-penetration-testingHaydn Johnson
 
SENIOR MATERIAL ENGINEER WITH 5 YEARS OF EXPERIENCE
SENIOR MATERIAL ENGINEER WITH 5 YEARS OF EXPERIENCESENIOR MATERIAL ENGINEER WITH 5 YEARS OF EXPERIENCE
SENIOR MATERIAL ENGINEER WITH 5 YEARS OF EXPERIENCESangeetha Sankaramahadev
 
Web attacks using obfuscated script
Web attacks using  obfuscated scriptWeb attacks using  obfuscated script
Web attacks using obfuscated scriptAmol Kamble
 
On deobfuscation in practice
On deobfuscation in practiceOn deobfuscation in practice
On deobfuscation in practiceDmitry Schelkunov
 
తెలుగు సూక్తులు
తెలుగు సూక్తులుతెలుగు సూక్తులు
తెలుగు సూక్తులుK.SURYA SAGAR
 

Destaque (20)

Practical Cyber Attacking Tutorial
Practical Cyber Attacking TutorialPractical Cyber Attacking Tutorial
Practical Cyber Attacking Tutorial
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Hacking education
Hacking educationHacking education
Hacking education
 
Sales Email Tracking 101
Sales Email Tracking 101Sales Email Tracking 101
Sales Email Tracking 101
 
Threats due to information technology icai
Threats due to information technology icaiThreats due to information technology icai
Threats due to information technology icai
 
VMRay intro video
VMRay intro videoVMRay intro video
VMRay intro video
 
Ajit-Legiment_Techniques
Ajit-Legiment_TechniquesAjit-Legiment_Techniques
Ajit-Legiment_Techniques
 
The (In)Security of Topology Discovery in Software Defined Networks
The (In)Security of Topology Discovery in Software Defined NetworksThe (In)Security of Topology Discovery in Software Defined Networks
The (In)Security of Topology Discovery in Software Defined Networks
 
Welcome to the United States: An Acculturation Conversation
Welcome to the United States: An Acculturation ConversationWelcome to the United States: An Acculturation Conversation
Welcome to the United States: An Acculturation Conversation
 
Automated JavaScript Deobfuscation - PacSec 2007
Automated JavaScript Deobfuscation - PacSec 2007Automated JavaScript Deobfuscation - PacSec 2007
Automated JavaScript Deobfuscation - PacSec 2007
 
Code obfuscation, php shells & more
Code obfuscation, php shells & moreCode obfuscation, php shells & more
Code obfuscation, php shells & more
 
A combined approach to search for evasion techniques in network intrusion det...
A combined approach to search for evasion techniques in network intrusion det...A combined approach to search for evasion techniques in network intrusion det...
A combined approach to search for evasion techniques in network intrusion det...
 
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon Yang
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon YangPractical IoT Exploitation (DEFCON23 IoTVillage) - Lyon Yang
Practical IoT Exploitation (DEFCON23 IoTVillage) - Lyon Yang
 
Topics in network security
Topics in network securityTopics in network security
Topics in network security
 
Quotes on education in telugu
Quotes on education in teluguQuotes on education in telugu
Quotes on education in telugu
 
Bsides to 2016-penetration-testing
Bsides to 2016-penetration-testingBsides to 2016-penetration-testing
Bsides to 2016-penetration-testing
 
SENIOR MATERIAL ENGINEER WITH 5 YEARS OF EXPERIENCE
SENIOR MATERIAL ENGINEER WITH 5 YEARS OF EXPERIENCESENIOR MATERIAL ENGINEER WITH 5 YEARS OF EXPERIENCE
SENIOR MATERIAL ENGINEER WITH 5 YEARS OF EXPERIENCE
 
Web attacks using obfuscated script
Web attacks using  obfuscated scriptWeb attacks using  obfuscated script
Web attacks using obfuscated script
 
On deobfuscation in practice
On deobfuscation in practiceOn deobfuscation in practice
On deobfuscation in practice
 
తెలుగు సూక్తులు
తెలుగు సూక్తులుతెలుగు సూక్తులు
తెలుగు సూక్తులు
 

Semelhante a Ethical hacking

Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupBrian Pichman
 
Hacking with experts (by anurag dwivedi)
Hacking with experts (by anurag dwivedi)Hacking with experts (by anurag dwivedi)
Hacking with experts (by anurag dwivedi)Esteban Bedoya
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKINGNAWAZ KHAN
 
How to remove pro search.me
How to remove pro search.meHow to remove pro search.me
How to remove pro search.me森泉 小
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024Brian Pichman
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleBrian Pichman
 
Basic ethical hacking for seminar presentation
Basic ethical hacking for seminar presentationBasic ethical hacking for seminar presentation
Basic ethical hacking for seminar presentationVipin Rawat @ daya
 
Cyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptxCyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptxDrMajidMumtaz
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security PracticeBrian Pichman
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxBrian Pichman
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfxererenhosdominaram
 
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers -
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers - [ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers -
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers - Zoltan Balazs
 
Overview of information security
Overview of information securityOverview of information security
Overview of information securityAskao Ahmed Saad
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Onlinecat509
 
Sucuri Webinar: How to identify and clean a hacked Joomla! website
Sucuri Webinar: How to identify and clean a hacked Joomla! websiteSucuri Webinar: How to identify and clean a hacked Joomla! website
Sucuri Webinar: How to identify and clean a hacked Joomla! websiteSucuri
 

Semelhante a Ethical hacking (20)

Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Hacking with experts (by anurag dwivedi)
Hacking with experts (by anurag dwivedi)Hacking with experts (by anurag dwivedi)
Hacking with experts (by anurag dwivedi)
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
How to remove pro search.me
How to remove pro search.meHow to remove pro search.me
How to remove pro search.me
 
CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
Basic ethical hacking for seminar presentation
Basic ethical hacking for seminar presentationBasic ethical hacking for seminar presentation
Basic ethical hacking for seminar presentation
 
Cyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptxCyber_Security_Seminar_PPTs_to Upload.pptx
Cyber_Security_Seminar_PPTs_to Upload.pptx
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
 
Hacking mail server
Hacking mail serverHacking mail server
Hacking mail server
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers -
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers - [ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers -
[ENG] OHM2013 - The Quest for the Client-Side Elixir Against Zombie Browsers -
 
Overview of information security
Overview of information securityOverview of information security
Overview of information security
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Staying Safe on the Computer and Online
Staying Safe on the Computer and OnlineStaying Safe on the Computer and Online
Staying Safe on the Computer and Online
 
Sucuri Webinar: How to identify and clean a hacked Joomla! website
Sucuri Webinar: How to identify and clean a hacked Joomla! websiteSucuri Webinar: How to identify and clean a hacked Joomla! website
Sucuri Webinar: How to identify and clean a hacked Joomla! website
 

Último

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Último (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Ethical hacking

  • 2. Contents: • Introduction • Mobile hacking • Blocking Sites • Proxy Servers • Password Cracking • Facebook TRicks • Anonymous Surfing • Warnings
  • 3. Introduction: : Ethical hacking and ethical hacker are terms that describe hacking performed to help a company or individual identify potential threats on the computer or network. : An ethical hacker attempts to hack their way past the system security, finding any weak points in the security that could be exploited by other hackers. : The organization uses what the ethical hacker finds to improve the system security.
  • 4. Rules &Regulations: • You have permission to probe the network and attempt to identify potential security risks. It is recommended that if you are the person performing the tests that you get written consent. • You respect the individual's or company's privacy and only go looking for security issues. • You report all security vulnerabilities you detect to the company, not leaving anything open for you or someone else to come in at a later time. • You let the software developer or hardware manufacturer know of any security vulnerabilities you locate in their software or hardware if not already known by the company.
  • 5. -SCRIPT KIDDIES -WHITE HAT HACKERS -BLACK HAT HACKERS -GRAY HAT HACKERS Types of Hackers:
  • 6.
  • 7. Blocking Sites: • This may be an Interesting one to know ..How actually an Admin puts a Restriction on popular sites/Social Networking Sites/Adult sites……..
  • 8. Steps: • Firstly browse the following route: • C:windowssystem32driversetc • Find the file Named as ”Hosts” • Under "127.0.0.1 localhost" Add 127.0.0.2 www.xyz.com , and that site will no longer be accessable. • DONE !
  • 9. Steps: For every site after that you want to add, just add "1" to the last number in the internal ip (127.0.0.2) and then the addy like before. ie: 127.0.0.3 www.yahoo.com 127.0.0.4 www.msn.com 127.0.0.5 www.google.com
  • 11. Steps to follows: -Go to https://www.mobivox.com -Make a free account up there. During registration don’t forget to enter the victims mobile number. -Once the confirmations is being made, then Go that site again and click on “DIRECT WEB CALL”. -Fill up the common details related to it…. -THAT’S IT.
  • 12.
  • 13. Proxy Servers: • These Servers Allows the User to provide a network to a Blocked Sites. • Bascially ,Top rated Proxy Server: • Hidemyass.com
  • 14. Some Popular PROXY Servers: www.meebo.com/ www.iloveim.com/ www.the-cloak.com/ www.cantblock.me www.mb35.info www.cloaking.me www.proxybrowsing.com www.behidden.com www.yourfreedom.net www.hujiko.com www.anonymizer.ru www.schoolproxylists.cn/ www.xysurfing.com/ www.googlefaker.com/ www.internetoxy.com/
  • 15.
  • 17. 1. GO TO START –> RUN –> TYPE IN CMD 2. ENTER COMMAND: CD WINDOWSSYSTEM32 3. MKDIR NEWPASS 4. COPY LOGON.SCR NEWPASSLOGON.SCR 5. COPY CMD.EXE NEWPASSCMD.EXE 6. DEL LOGON.SCR 7. RENAME CMD.EXE LOGON.SCR CMD IN WINDOWS XP/7
  • 18. Note: • So basically you are telling windows is to backup the command program and the screen saver file. • Then we edited the settings so when windows loads the screen saver, we will get an unprotected dos prompt without logging in. When this appears enter this command :- net user username password
  • 19. Example: • If the admin username is ‘CyberSix’ and you want change the password to ‘cyber6’ Then type in the following command :- net user CyberSix cyber6 • This will change the administrator password to cyber6. • Thats it you have sucessfully hacked the Window XP Administrator Password now you can Log in, using the hacked Window XP Administrator Password and do whatever you want to do.
  • 20. Bacic technique Used in Win7 • Open Cmd(Command Prompt). • Net user username* • Put a password. • Again put Password for confirmation.. • Done… • Bascially , Cmd is somewhere Not authorised to used it…SO don’t worry….steps are simple….
  • 21. Steps: -Open Notepad Type: www.cmdcommand.com -save File as .bat -Double Click on it… CMD Opens………………………………………….
  • 22. Free Softwares: -Ophcrack -UbuntuOS There are many Softwares available in the Google Search Engine You may find. But I think the Above two which I listed were Perfect One.. Everything about these softwares that is how to install, and how to work upon it, all were given in their official Sites. So Feel Free !!
  • 23. Anonymous Surfing: -There are various methods to achieve the Anonymous surfing. -Use Trusted VPN (Virtual Private Network),such as Cyberghost, Proxpn, Hotspot Shield or use Proxy Servers and so on. -The best and Most secured way is to use the Tor browser. Most secured and Trusted one. Simply stating: If you are using the Tor Browser, You didn’t have to worry about the Admin who is monitoring you .This is because, it hides your IP address even MAC too and assigns our IP address with the unknown IP address of an unknown location which ever it gets through Tor Network, which you might say as a Proxy servers address. So its hard for him to trace out the location. It doesn’t matter if you are using Cyberoam captive portal. It’s a highly Secured one.
  • 24.
  • 25.
  • 26. Facebook Tracing: Step 1) Go to your Facebook Profile Page. Step 2) Now Press Ctrl + U from your keyboard for see source code of your profile page. Step 3) Now press Ctrl + F from your keyboard to open search box. Step 4) Now search this code {"list": Step 5) You find some Facebook Profile Ids are like shown below. Click on example image for zoom.
  • 27. Steps: • Step 6) There are some Facebook Profile Ids of your friends who visited recently. Step 7) The first one ID's are showing visits the most number of time. Step 8) Now if your want to findout, Open a new tab Enter below link : www.facebook.com/Facebook Profile Id For Example : www.facebook.com/100001257992988 • DONE…..
  • 28. How to Cancel Friends Request: 1. Go to account settings. 2. Select `download a copy 3. Choose `expanded archive` from the next page opened and enter your password and click continue. 4. Select `start my archive`. 5. After a few hours you'll get the download link in your email. 5. Download the file `facebook` and unzip it. 6. Open the folder html and then `friend_requests.html`. 7. You can see the list of your friend requests and pending lists. Now goto their accounts and click`cancel request. That's all You are done now. Your account is safe.
  • 29. Fake Facebook_ID -WE (BOYS) always in search of a SEXY girl in Facebook…. STOP Would u know is she Really Exist?? OR Is it a Girl only? There is a solution to find the Truth.. Sounds Crazy.. Lets have a look..
  • 30. Trick: -Firstly Open the Profile Pic of a Victim… -Right click on it… -Copy the image URL(Uniform Resource Locator) -Paste the link into Google images…. -Press ENTER… YIPEEE. That’s done….IF the searched Item found to be in some site it means it’s a fake…Otherwise if its give an Error….Means Victim isnt Fake…………….
  • 31. Warnings: • Hello Guys, whatever I showed up in the Slides are just up to the Knowledge Purpose only. Just Keep that one thing in mind.. • That’s it.
  • 32. Hope you like my slides ! See you guys .. Have a nice time !! Thanking you. :D
  • 33. For more tricks ,Keep Following. ! 