2. Hacking Include’s…….
Password Cracking
Trojans
Phishing
Facebook Hacking
Sniffers
IP Tracking
Website Hacking
Cross Site Scripting
Proxies
Remote Testers
Port Hacking
Mobile Phone Hacking
WiFi Hacking
Social Engineering
ATM Machine Hacking
3. IP Address:
This address is unique for different devices.
e.g.
172.16.254.1
225.168.1.20
4. TORRENTs UNBLOCKING:
How Torrents Blocked?
-Disable Torrent Clients
-Block Download of .torrent extension files
5. COOKIES:
It is a text file stored on our computer sort by
the website on user machine.
-Cookies logged us automatically(On
google.com)
-allows to customize background image(On
google.com)
7. TROJANs:
Trojans are RATs or Remote Administration
Tools that give an attacker remote control or
remote access to the victims computer.
8. Protection:
Trojan should start automatically (Whenever
windows boots)
Trojan has to open a port
Trojan has to be loaded into memory
9. SPOOFING:
Spoofing means
“Hacking Other’s Email, SMS or Call”
There Are Three Types Of SPOOFING:
1) EMAIL Spoofing:
2)SMS Spoofing:
3) Call Spoofing:
12. DOS ATTACK:
To bring down an entire network
-Each system connected to internet has
limited bandwidth available.
[If our computer has bandwidth of 2mbps &
the criminal sends 100mbps of data then our
computer will crack]
13. TYPES OF DOS ATTACK:
1.Ping Of Death:
2.TearDrop:
1]Ping Of Death:
65,536 bytes is the size of data packet.
(Not Larger Attack)
14. .
2 TearDrop:
Data is broken down into smaller
chunks of data
e.g. 4000 Bytes
Chunk A 1-1500 bytes
Chunk B 1500-3000 bytes
Chunk C 3000-4000 bytes
DOS attack is extremely dangerous
15. STEGNOGRAPHY:
Hiding of any file or data into the other file
TYPES OF STEGNOGRAPHY:
1. Image STEGNOGRAPHY
2. Text STEGNOGRAPHY
3. Spam(Mimic) STEGNOGRAPHY
18. BEST SECURITY PRACTICES:
1. Install a FIREWALL: Zone Alarm (Free
Download)
2. Use an Antivirus: Update it Weakly
3. Use an ANTISPYWARE: PrevX, SpySweeper
4. Update your OS: Every 15 days
5. Choose a Strong Password
6. Avoid Public computer to bank or shop
Online.
7. Secure your WiFi: Enable WEP, WPA or WPA2
8. Encrypt your Data/Folders/Drivers: Truecrypt
9. Use Digital signature/PGP Encrypted Email