ETHICAL HACKING WHAT EXACTLY IS ETHICAL HACKING ? By : Bijay Acharya

Slides:



Advertisements
Similar presentations
Part 2 Penetration Testing. Review 2-minute exercise: RECON ONLY Find 3x IP addresses at the U.S. Merchant Marine Academy Google: “U.S. Merchant Marine.
Advertisements

Penetration Testing & Countermeasures Paul Fong & Cai Yu CS691 5 May 2003.
Hands-On Ethical Hacking and Network Defense Chapter 5 Port Scanning Last updated
Hacking WLAN // BRUTE FORCE CRACKER // TCP/IP. WLAN HACK Wired Equivalent Privacy (WEP) encryption was designed to protect against casual snooping, but.
Offensive Security Part 1 Basics of Penetration Testing
A Complete Tool For System Penetration Testing Presented By:- Mahesh Kumar Sharma B.Tech IV Year Computer Science Roll No. :- CS09047.
1 Colorado University Guest Lecture: Vulnerability Assessment Chris Triolo Spring 2007.
Browser Exploitation Framework (BeEF) Lab
Penetration Testing.
Dennis  Application Security Specialist  WhiteHat Security  Full-Time Student  University of Houston – Main Campus ▪ Computer.
Lecture 18 HACKING (CONTINUED). WHY DO PEOPLE HACK ?  JUST FOR FUN.  SHOW OF THEIR KNOWLEDGE.  HACK OTHER SYSTEM SECRETLY.  DESTROY ENEMY’S COMPUTER.
Introduction to InfoSec – Recitation 15 Nir Krakowski (nirkrako at post.tau.ac.il) Itamar Gilad (itamargi at post.tau.ac.il)
Software Security Testing Vinay Srinivasan cell:
Kali Linx Attacks Jim Nasto. Window 8 Computer On my Windows 8 64 bit OS machine. I started using a Virtual Machine using Hyper V Manager and shared the.
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
AASSA Conference 2012 Quito, Ecuador March 16 th 2012 All the rights reserved.Instructor: Francisco Bolaños, Ing. InterAmerican Academy Ethical Hacking.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
Web Applications Testing By Jamie Rougvie Supported by.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
1 OFF SYMB - 12/7/2015 Firewalls Basics. 2 OFF SYMB - 12/7/2015 Overview Why we have firewalls What a firewall does Why is the firewall configured the.
Hands-On Ethical Hacking and Network Defense
Module 1A An Introduction to Metasploit – Based upon Chapter 2 of “Metasploit the Penetration testers guide” Based upon Chapter 2 of “Metasploit the Penetration.
PREPARED BY : Harsh patel dhruv patel sreejit sundaram.
Chapter 1 Real World Incidents Spring Incident Response & Computer Forensics.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Final Project: Advanced Security Blade IPS and DLP blades.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
Top 10 Hacking Tool Welcome TO hackaholic Kumar shubham.
Learn Hacking – Part 1 - Requirement youtube.com/studentvideotutorial - Slides are available in description box below (youtube) / my website - By : Bijay.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Intro to Ethical Hacking
Topic 5 Penetration Testing 滲透測試
Penetration Testing Social Engineering Attack and Web-based Exploitation CIS 6395, Incident Response Technologies Fall.
Seminar On Ethical Hacking Submitted To: Submitted By:
Penetration Testing: Concepts,Attacks and Defence Stratagies
Penetration Testing Armitage: Metasploit GUI and Machine-Gun Style Attack CIS 6395, Incident Response Technologies Fall 2016, Dr. Cliff Zou
MySQL Exploit with Metasploit
A Comprehensive Security Assessment of the Westminster College Unix Lab Jacob Shodd.
Security Testing Methods
Backdoor Attacks.
Secure Software Confidentiality Integrity Data Security Authentication
Network Exploitation Tool
Exploiting Metasploitable 2 with Metasploit in Kali-Linux 2016
Daniel Kouril, Ivo Nutar Masaryk University
Daniel Kouril Sven Gabriel
Metasploit a one-stop hack shop
Common Operating System Exploits
Key Term to understand:
Metasploit Project For this exploit I will be using the following strategy Create backdoor exe file Upload file to website Have victim computer download.
Metasploit assignment
Exploiting Metasploitable
Intro to Ethical Hacking
Internet Security Submitted to Professor Mort Anvari
Week 5.
Analysis Report Kali Linux Metasploit
Metasploit Assignment
Web Application Penetration Testing ‘17
Brute force attacks, DDOS, Botnet, Exploit, SQL injection
Metasploit Analysis Report Overview
Cyber Operation and Penetration Testing Social Engineering Attack and Web-based Exploitation Cliff Zou University of Central Florida.
Cyber Operation and Penetration Testing Armitage: Metasploit GUI and Machine-Gun Style Attack Cliff Zou University of Central Florida.
The Internet: Encryption & Public Keys
WJEC GCSE Computer Science
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
Test 3 review FTP & Cybersecurity
Hacking Windows Damian Gordon.
Presentation transcript:

ETHICAL HACKING WHAT EXACTLY IS ETHICAL HACKING ? By : Bijay Acharya Follow : twitter.com/acharya_bijay

ETHICAL HACKING IS ABOUT PROTECTING RESOURCES. RESOURCES : USER/CLIENT, SYSTEM, DATABASE STRATEGIES & TECHNIQUES USED FOR HACKING, AND HOW WE CAN PROTECT THOSE RESOURCES. WE WILL SEE SOME TOOLS, AND HOW THEY WORK, BUT THIS TRAINING DOESNOT PROVIDE FULL DEMOS ON CRACKING, HACKING & DESTROYING. THIS TRAINING IS ALL ABOUT INTRODUCTION TO BEGINNERS ON TOPIC ‘ETHICAL HACKING’

FOLLOW ETHICS / LAW : Testing Networks, Performing Ping request a lot of time, Bypassing / hacking wireless connections, dumping files & keeping records, SQL Injection for website hacking, Vulnerability search, etc . . . These are all illegal unless you get a permission/written permission. - Never mess with your external IPs. Our some demo involves 80 % of that. - Cyber Laws, ISPs are watching (You will be tracked)

GOTO : google / my ip address Key Terms : IP (INTERNET PROTOCOL) : WAY/PATH/MEDIUM FOR DATAS IP ADDRESS : PARTICULAR FOCUS ON PLACE/SYSTEM GOTO : google / my ip address (We are being tracked)

Key Terms : REMEMBER IT Vulnerability : Weakness in a computer system that an attacker can take advantage of. Vulnerability Assessment : Act of identifying vulnerabilities for a specific computer/network. Exploit : A code that allows the attacker to take advantage of Vulnerability.

Key Terms : Payload : Code or Program that runs after an exploit is successfully executed. Backdoor: Method of bypassing normal authentication.

Tools : Kali Linux/Backtrack 5R3 : Attacker’s System. NMAP : Used for identifying ports and services running on victims machine. “King of Scanners” Metasploit Framework : Used for exploiting, generating payloads and establishing session with victim’s machine.

TODAY’s DEMO : *Asterik (Inspect Element) *IP/IP Address Concept *BYPASSING WIN 7/ WIN 8 ADMIN PASSWORD (How many of you can bypass it ?)

TODAY’s DEMO : *Asterik (Inspect Element) *IP/IP Address Concept *BYPASSING WIN 7/ WIN 8 ADMIN PASSWORD (How many of you can bypass it ?)