Ethical Hacking: Hacking GMail

Slides:



Advertisements
Similar presentations
Module X Session Hijacking
Advertisements

Accessing Public Wi-Fi: Security Issues Sankar Roy Department of Computing and Information Sciences Kansas State University.
Name : Ahmed S. Eleyan No. : Teacher : Rasha Attalah Subject : Secure Your Data Date : 20 / 12 / 2010 College of Engineering.
CPSC 203 Introduction to Computers Lab 39, 40 By Jie (Jeff) Gao.
® Microsoft Office 2010 Appendix A: Introduction to SkyDrive and Office Web Apps.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Cryptography and Network Security Chapter 20 Intruders
Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system.
Network Attacks Mark Shtern.
Remote Desktop Access Novell at Home. Remote desktop access Works on Broadband Computer at work must.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Morris Bennett Altman Director of Network Services Internet Security Officer Queens College, CUNY Are You Exposed? Network Security.
Web Application Security Assessment and Vulnerability Assessment.
Self-Service A Guide to Student Account Access Through the Central Piedmont Community College Website Start.
M.M.S. Demo M.M.S. Demo Thank you for viewing the Material Management System (M.M.S.) Demo. This demo will run automatically on your computer and will.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
CNIT 132 Intermediate HTML and CSS Publish Web Page.
VPN AND SECURITY FLAWS Rajesh Perumal Clemson University.
Learning In A Techno World How Safe is Your Cyberspace?
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Ethical Hacking Defeating Wireless Security. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
Module 7: Firewalls and Port Forwarding 1. Overview Firewall configuration for Web Application Hosting Forwarding necessary ports for Web Application.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
PARTFOLIO: BY GROUP MOHAMAD SHAZWAN BIN DAUD NUR’ ARINA ATIQAH BT ASRAR
Last modified Not in textbook CNIT 335 or CNIT 345? CNIT 335 was Vista Tech Support –But Vista is a dead duck –We will not cover Vista at all.
BY OLIVIA WILSON AND BRITTANY MCDONALD Up Your Shields with Shields Up!
Computer Security and Penetration Testing Chapter 16 Windows Vulnerabilities.
PRESENTATION TITLE 1 The Streetwise Security Awareness Non-Trivial Quiz Version 1.0 Compiled by Scott Wright The Streetwise Security Coach
Mark Shtern. Passwords are the most common authentication method They are inherently insecure.
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
CSE 4481 Computer Security Lab Mark Shtern. INTRODUCTION.
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
CHAPTER 9 Sniffing.
Turning Windows 7 into a Web Server Ch 28. Understanding Internet Information Services.
CNIT 124: Advanced Ethical Hacking Ch 7: Capturing Traffic.
Ethical Hacking: Hacking GMail. Teaching Hacking.
Retina Network Security Scanner
CNIT 124: Advanced Ethical Hacking Ch 10: Client-Side Exploitation.
Ethical Hacking: Defeating Logon Passwords. 2 Contact Sam Bowne Sam Bowne Computer Networking and Information Technology Computer Networking and Information.
 The overall objective is for the student to establish and begin using a secondary account utilizing Gmail’s web based system COURSE OBJECTIVES.
Trouble-shooting Tips Georgia Bulldogs I can receive, but not send messages  If you can successfully receive messages, but can’t send messages,
Mark Shtern.  Our life depends on computer systems  Traffic control  Banking  Medical equipment  Internet  Social networks  Growing number of.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
INTERNET APPLICATIONS CPIT405 Install a web server and analyze packets.
By Collin Donaldson. What is it? Shodan is a search engine that allows you to look for devices connected to the internet using service banners. When you.
Security Operations Chapter 11 Part 3 Pages 1279 to 1309.
SESSION HIJACKING It is a method of taking over a secure/unsecure Web user session by secretly obtaining the session ID and masquerading as an authorized.
It's Everywhere Point of Sale attacks ● The free WiFi is connected to the same DSL or cable service as the PoS computers ● Depending if this free WiFi.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Gmail Tech Support Number
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Logging Into Windows XP for first time (labs only!)
CSCE 548 Student Presentation By Manasa Suthram
ZIMBRA DESKTOP USER MANUAL
Instructor Materials Chapter 7 Network Security
Open the iexplorer and
Dial +1(505) Quickly Gmail Password Recover.
Dial +1(505) Quickly Gmail Password Recovery.
Ch 3: Obtaining Help and Support
Man-in-the-Middle Attacks
HTML Level II (CyberAdvantage)
Setting the Permissions
Cyber Operation and Penetration Testing Online Password Cracking Cliff Zou University of Central Florida.
What you will need to Register
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Intrusion.
Presentation transcript:

Ethical Hacking: Hacking GMail

What do Hackers Do? Get into computer systems without valid accounts and passwords Take over Web servers Collect passwords from Internet traffic Take over computers with remote access trojans And much, much more

Ethical Hackers Ethical Hackers do the same thing criminal hackers do, with one difference Ethical Hackers have permission from the owner of the machines to hack in These "Penetration Tests" reveal security problems so they can be fixed

Student Agreement Required for every student in CNIT 123: Ethical Hacking and Network Defense or CNIT 124: Advanced Ethical Hacking

Sniffing Plaintext Passwords

Attacker Sniffing Traffic Eavesdropping To Internet Router Attacker Sniffing Traffic Target Using Web

Insecure Login Pages HTTP does not encrypt data Always look for HTTPS on login pages

Tool: Cain Click NIC icon to start sniffer Click Sniffer tab, Password tab on bottom From http://www.oxid.it/cain.html

Three Hands-On Activities Monterey Room, Second Floor All Day Weds. & Thurs. till noon Sniffing plaintext passwords with Cain Hijacking Gmail sessions with Ferret & Hamster Revealing Windows XP Login passwords with OphCrack

Contact Sam Bowne Computer Networking and Information Technology City College San Francisco Email: sbowne@ccsf.edu Web: samsclass.info Last modified 12-2-08