ethical hacking

Download Report

Transcript ethical hacking

ETHICAL HACKING
WHAT EXACTLY IS ETHICAL HACKING
?
By : Bijay Acharya
Follow : twitter.com/acharya_bijay
- ETHICAL HACKING IS ABOUT PROTECTING RESOURCES.
- RESOURCES : USER/CLIENT, SYSTEM, DATABASE
- STRATEGIES & TECHNIQUES USED FOR HACKING, AND
HOW WE CAN PROTECT THOSE RESOURCES.
- WE WILL SEE SOME TOOLS, AND HOW THEY WORK, BUT
THIS
TRAINING
DOESNOT
PROVIDE
FULL
DEMOS
ON
INTRODUCTION
TO
CRACKING, HACKING & DESTROYING.
- THIS
TRAINING
IS
ALL
ABOUT
BEGINNERS ON TOPIC ‘ETHICAL HACKING’
FOLLOW ETHICS / LAW :
- Testing Networks, Performing Ping request a lot of time,
Bypassing / hacking wireless connections, dumping files &
keeping
records,
SQL
Injection
for
website
hacking,
Vulnerability search, etc . . . These are all illegal unless you
get a permission/written permission.
-
Never mess with your external IPs. Our some demo
involves 80 % of that.
-
Cyber Laws, ISPs are watching (You will be tracked)
Key Terms :
IP (INTERNET PROTOCOL) : WAY/PATH/MEDIUM FOR DATAS
IP ADDRESS : PARTICULAR FOCUS ON PLACE/SYSTEM
GOTO : google / my ip address
(We are being tracked)
Key Terms : REMEMBER IT
Vulnerability : Weakness in a computer system that an
attacker can take advantage of.
Vulnerability Assessment : Act of identifying vulnerabilities
for a specific computer/network.
Exploit : A code that allows the attacker to take advantage of
Vulnerability.
Key Terms :
Payload : Code or Program that runs after an exploit is
successfully executed.
Backdoor: Method of bypassing normal authentication.
Tools :
Kali Linux/Backtrack 5R3 : Attacker’s System.
NMAP : Used for identifying ports and services running on
victims machine. “King of Scanners”
Metasploit Framework : Used for exploiting, generating
payloads and establishing session with victim’s machine.
TODAY’s DEMO :
*Asterik (Inspect Element)
*IP/IP Address Concept
*BYPASSING WIN 7/ WIN 8 ADMIN PASSWORD
(How many of you can bypass it ?)
TODAY’s DEMO :
*Asterik (Inspect Element)
*IP/IP Address Concept
*BYPASSING WIN 7/ WIN 8 ADMIN PASSWORD
(How many of you can bypass it ?)