SlideShare a Scribd company logo
WHAT IS HACKING? Hacking – the art of Exploitation A methodology of testing and securing networks and computers from vulnerabilities   Ethical hacking is also known as  penetration testing ,  intrusion testing  and  red teaming
HACKER Also termed as  White Hat A good guy performing  vulnerability assessment and securing from the bad guys ( Crackers ) Often mistaken for a cracker
Understand the difference HACKING VS  CRACKING
Hacker vs.   Cracker Crackers Bad guy Break them Deploys to destruct Destructs and gains  unauthorized control For fun or bad intentions Hackers Good guy Hackers Build things Deploys to Secure  Helps secure the network  and computers For help or educational purposes
Some others.... Phreakers : Phone system manipulators Script Kiddies:   Non-expert who breaks into computer systems by using pre-packaged automated tools written by others
SNEAK AT SOME MOST PREVAILING ATTACKS
Reasons Behind Cracking Just for Fun Steal information Crack others secretly Notify thoughts to the mass Destroy enemy’s computer Show off
Five Phases of an Attack Reconnaissance Scanning Gaining Access Maintaining Access Covering Attacks and Hiding
Reconnaissance Social Engineering Physical Break-In Dumpster Diving DNS Websites, Search Engines, Usenets
Scanning Network Mapping TraceRouting FIN probe Port Scanning
Penetration Password Attacks Stack overflow Attacks Web Application Attacks SQL Attacks Sniffing Spoofing Session Hijacking
Maintaining Access Back Door Kits Trojan Horses Programs Other Malicious scripts
Covering Tracks and Hiding Altering Event logs Creating Hidden files or Directories Tunneling Using TCP/IP headers to carry Data
WHAT DO YOU MEAN BY “ MOST SECURED SYSTEM ”
A System sealed inside a thick  box and locked?? A System unplugged from all cables and Disconnected from the internet?? A system patched with latest updates anti virus and firewall   ??
“ The whole concept of secured System in itself is a flawed concept”
Common Causes of Cracking   Ignorance Ignorance Ignorance Ignorance Ignorance
Most Common Attacks
DOS (Denial Of Service) It is an attempt to make a computer resource unavailable to its intended users Typically targets High profile webservers
PoD (Ping Of Death) It is a type of attack on a computer that involves sending a malformed or otherwise malicious  ping  to a computer Sending a ping of this size often crashes the target computer
SQL Injection Now a Days This Attack method is HOT
DEMO
Phishing Phishing is an  e-mail fraud  method in which the perpetrator sends out email in an attempt to  gather  personal and financial information from recipients The messages appear to come from well known and trustworthy Web sites.
DEMO
 
How to Secure yourselves A good Antivirus A good Firewall A good Spyware or Trojanbuster Use of Genuine Software Avoid ignoring even simple things
Prajwal Panchmahalkar Team :  Matriux  , n|u   [email_address] [email_address]
THANKS TO ALL
 

More Related Content

PPTX
Ethical hacking
Rishabha Garg
 
PPTX
Web defacement
student
 
PPT
Basic Introduction to hacking
Sainath Volam
 
PPT
Ethical hacking
zing12345
 
PPTX
Website attack n defacement n its control measures
أحلام انصارى
 
PPT
Hacking Kishor
kishor sharma
 
PPTX
Computer securety
rushil ahmed
 
PPT
Hacking
Purohit Rock
 
Ethical hacking
Rishabha Garg
 
Web defacement
student
 
Basic Introduction to hacking
Sainath Volam
 
Ethical hacking
zing12345
 
Website attack n defacement n its control measures
أحلام انصارى
 
Hacking Kishor
kishor sharma
 
Computer securety
rushil ahmed
 
Hacking
Purohit Rock
 

What's hot (20)

PPTX
Introduction To Ethical Hacking
Neel Kamal
 
PPSX
Ethical Hacking
Adnan Mansha
 
PPTX
Hacking Vs Cracking in Computer Networks
Srikanth VNV
 
PPTX
Ethical hacking
United Group Of Institution
 
PPTX
Cybersecurity cyberlab1
rayborg
 
PPTX
Ethical hacking
arohan6
 
PPT
Ethical hacking
Harshit Upadhyay
 
PPTX
Introduction to Ethical Hacking (Basics)
Sumit Satam
 
PPT
Keyloggers and Spywares
Ankit Mistry
 
PPT
Ict H A C K I N G
Hafizra Mas
 
PPTX
Hacking
vkradhika
 
ODP
Ethical hacking ppt
himanshujoshi238
 
PPTX
2. rats (trojans) (cyber awareness series)
Isaac Feliciano
 
PPTX
Cybersecurity Essentials - Part 1
Shobhit Sharma
 
PPTX
Virus and hacker (2)mmm
andynova
 
PPTX
Hacking
Nadeem Ahmad
 
PPTX
Black hat hackers
Santosh Kumar
 
PPTX
Internet security
at1211
 
PPTX
National information security education & awareness program
Neel Kamal
 
Introduction To Ethical Hacking
Neel Kamal
 
Ethical Hacking
Adnan Mansha
 
Hacking Vs Cracking in Computer Networks
Srikanth VNV
 
Cybersecurity cyberlab1
rayborg
 
Ethical hacking
arohan6
 
Ethical hacking
Harshit Upadhyay
 
Introduction to Ethical Hacking (Basics)
Sumit Satam
 
Keyloggers and Spywares
Ankit Mistry
 
Ict H A C K I N G
Hafizra Mas
 
Hacking
vkradhika
 
Ethical hacking ppt
himanshujoshi238
 
2. rats (trojans) (cyber awareness series)
Isaac Feliciano
 
Cybersecurity Essentials - Part 1
Shobhit Sharma
 
Virus and hacker (2)mmm
andynova
 
Hacking
Nadeem Ahmad
 
Black hat hackers
Santosh Kumar
 
Internet security
at1211
 
National information security education & awareness program
Neel Kamal
 
Ad

Similar to Security (20)

PPTX
Hacking Presentation v2 By Raffi
Shawon Raffi
 
PDF
Introduction of hacking and cracking
Harshil Barot
 
PPT
All about Hacking
Madhusudhan G
 
PPTX
Ethical Hacking Redefined
Pawan Patil
 
PDF
Ethical Hacking
Syed Irshad Ali
 
PPTX
Introduction to the Ethical hacking.pptx
SahilSwe
 
PPT
presentation of professionalism harwares.ppt
JayPatil820512
 
PPT
ETHICAL HACKING
Sweta Leena Panda
 
PPT
31.ppt
KarmanChandi
 
PPTX
Ethical hacking : Its methodologies and tools
chrizjohn896
 
PPTX
Ethical Hacking.pptx
MadhuKumar114889
 
PPTX
Ethical hacking
Punit Goswami
 
PPTX
Cyper security & Ethical hacking
Cmano Kar
 
PPT
Ethical hacking
Ravi Rajput
 
PPTX
Ethical hacking Chapter 1 - Overview.pptx
Nargis Parveen
 
PPSX
Hacking
Ranjan Som
 
PDF
Hackingppt 160730081605
RAKESH SHARMA
 
PPT
Introduction to hackers
Harsh Sharma
 
PPTX
Hacking ppt
Rashed Sayyed
 
Hacking Presentation v2 By Raffi
Shawon Raffi
 
Introduction of hacking and cracking
Harshil Barot
 
All about Hacking
Madhusudhan G
 
Ethical Hacking Redefined
Pawan Patil
 
Ethical Hacking
Syed Irshad Ali
 
Introduction to the Ethical hacking.pptx
SahilSwe
 
presentation of professionalism harwares.ppt
JayPatil820512
 
ETHICAL HACKING
Sweta Leena Panda
 
31.ppt
KarmanChandi
 
Ethical hacking : Its methodologies and tools
chrizjohn896
 
Ethical Hacking.pptx
MadhuKumar114889
 
Ethical hacking
Punit Goswami
 
Cyper security & Ethical hacking
Cmano Kar
 
Ethical hacking
Ravi Rajput
 
Ethical hacking Chapter 1 - Overview.pptx
Nargis Parveen
 
Hacking
Ranjan Som
 
Hackingppt 160730081605
RAKESH SHARMA
 
Introduction to hackers
Harsh Sharma
 
Hacking ppt
Rashed Sayyed
 
Ad

More from Prajwal Panchmahalkar (16)

PPTX
Matriux Leandros - BSidesLV 2013
Prajwal Panchmahalkar
 
PDF
Energy Aware Shortest Path Minded SPIN
Prajwal Panchmahalkar
 
PPTX
Energy Aware Fault Tolerant SPMS Protocol in Wireless Sensor Networks
Prajwal Panchmahalkar
 
PPTX
Fault tolerant energy aware data dissemination protocol in WSN
Prajwal Panchmahalkar
 
PPTX
Energy aware efficient geographic routing in lossy wireless Networks
Prajwal Panchmahalkar
 
PDF
An analysis of a facebook spam exploited through browser addons
Prajwal Panchmahalkar
 
PPTX
Maanav Jugaad - Social Engineering
Prajwal Panchmahalkar
 
PPT
[null]Iso 27001 a business view
Prajwal Panchmahalkar
 
PPT
[null] Iso 27001 a business view by Sripathi
Prajwal Panchmahalkar
 
PPT
[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar
Prajwal Panchmahalkar
 
PDF
Facebook Attacks By dinesh
Prajwal Panchmahalkar
 
PPT
Brute force
Prajwal Panchmahalkar
 
PDF
Network concepts
Prajwal Panchmahalkar
 
ODP
Null who and_where (1)
Prajwal Panchmahalkar
 
PPT
W3AF|null
Prajwal Panchmahalkar
 
Matriux Leandros - BSidesLV 2013
Prajwal Panchmahalkar
 
Energy Aware Shortest Path Minded SPIN
Prajwal Panchmahalkar
 
Energy Aware Fault Tolerant SPMS Protocol in Wireless Sensor Networks
Prajwal Panchmahalkar
 
Fault tolerant energy aware data dissemination protocol in WSN
Prajwal Panchmahalkar
 
Energy aware efficient geographic routing in lossy wireless Networks
Prajwal Panchmahalkar
 
An analysis of a facebook spam exploited through browser addons
Prajwal Panchmahalkar
 
Maanav Jugaad - Social Engineering
Prajwal Panchmahalkar
 
[null]Iso 27001 a business view
Prajwal Panchmahalkar
 
[null] Iso 27001 a business view by Sripathi
Prajwal Panchmahalkar
 
[null]Metapwn - Pwn at a puff by Prajwal Panchmahalkar
Prajwal Panchmahalkar
 
Facebook Attacks By dinesh
Prajwal Panchmahalkar
 
Network concepts
Prajwal Panchmahalkar
 
Null who and_where (1)
Prajwal Panchmahalkar
 

Security

  • 1. WHAT IS HACKING? Hacking – the art of Exploitation A methodology of testing and securing networks and computers from vulnerabilities   Ethical hacking is also known as  penetration testing ,  intrusion testing  and  red teaming
  • 2. HACKER Also termed as White Hat A good guy performing vulnerability assessment and securing from the bad guys ( Crackers ) Often mistaken for a cracker
  • 3. Understand the difference HACKING VS CRACKING
  • 4. Hacker vs. Cracker Crackers Bad guy Break them Deploys to destruct Destructs and gains unauthorized control For fun or bad intentions Hackers Good guy Hackers Build things Deploys to Secure Helps secure the network and computers For help or educational purposes
  • 5. Some others.... Phreakers : Phone system manipulators Script Kiddies:  Non-expert who breaks into computer systems by using pre-packaged automated tools written by others
  • 6. SNEAK AT SOME MOST PREVAILING ATTACKS
  • 7. Reasons Behind Cracking Just for Fun Steal information Crack others secretly Notify thoughts to the mass Destroy enemy’s computer Show off
  • 8. Five Phases of an Attack Reconnaissance Scanning Gaining Access Maintaining Access Covering Attacks and Hiding
  • 9. Reconnaissance Social Engineering Physical Break-In Dumpster Diving DNS Websites, Search Engines, Usenets
  • 10. Scanning Network Mapping TraceRouting FIN probe Port Scanning
  • 11. Penetration Password Attacks Stack overflow Attacks Web Application Attacks SQL Attacks Sniffing Spoofing Session Hijacking
  • 12. Maintaining Access Back Door Kits Trojan Horses Programs Other Malicious scripts
  • 13. Covering Tracks and Hiding Altering Event logs Creating Hidden files or Directories Tunneling Using TCP/IP headers to carry Data
  • 14. WHAT DO YOU MEAN BY “ MOST SECURED SYSTEM ”
  • 15. A System sealed inside a thick box and locked?? A System unplugged from all cables and Disconnected from the internet?? A system patched with latest updates anti virus and firewall ??
  • 16. “ The whole concept of secured System in itself is a flawed concept”
  • 17. Common Causes of Cracking Ignorance Ignorance Ignorance Ignorance Ignorance
  • 19. DOS (Denial Of Service) It is an attempt to make a computer resource unavailable to its intended users Typically targets High profile webservers
  • 20. PoD (Ping Of Death) It is a type of attack on a computer that involves sending a malformed or otherwise malicious ping to a computer Sending a ping of this size often crashes the target computer
  • 21. SQL Injection Now a Days This Attack method is HOT
  • 22. DEMO
  • 23. Phishing Phishing is an e-mail fraud method in which the perpetrator sends out email in an attempt to gather personal and financial information from recipients The messages appear to come from well known and trustworthy Web sites.
  • 24. DEMO
  • 25.  
  • 26. How to Secure yourselves A good Antivirus A good Firewall A good Spyware or Trojanbuster Use of Genuine Software Avoid ignoring even simple things
  • 27. Prajwal Panchmahalkar Team : Matriux , n|u [email_address] [email_address]
  • 29.