KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website www.kaashivinfotech.

Slides:



Advertisements
Similar presentations
1 Computer and Internet Security JCCAA Presentation 03/14/2009 Yu-Min (Phillip) Hsieh Sr. System Administrator Information Technology Rice University.
Advertisements

Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
HACKING. Contents (1)  VARIOUS DEFINITIONS OF HACKING.  Who is hacker? (various definitions).  What does he do?.  Why does he do?  Who is a cracker?
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
-Ajay Babu.D y5cs022.. Contents Who is hacker? History of hacking Types of hacking Do You Know? What do hackers do? - Some Examples on Web application.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
What is hacking? Taeho Oh
Hacker, Cracker?! Are they the same? No!!! Hacker programmers intensely interested in the arcane and recondite workings of any computer operating system.
Ethical Hacking Adapted from Zephyr Gauray’s slides found here: And from Achyut Paudel’s.
HACKER NOT CRACKER. HACKER IS  A person who enjoys exploring the details of programmable systems and how to stretch their capabilities  Most often programmers.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Security A system is secure if its resources are used and accessed as intended under all circumstances. It is not generally possible to achieve total security.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
CS Nathan Digangi.  Secret, undocumented routine embedded within a useful program  Execution of the program results in execution of secret code.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Web server security Dr Jim Briggs WEBP security1.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Cyber crime & Security Prepared by : Rughani Zarana.
Staying Safe Online Keep your Information Secure.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Computer Security, Ethics and Privacy Chapter 11.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
Topic : Malicious Software Written By :Kaveh Maroufi December.
ColdFusion Security Michael Smith President TeraTech, Inc ColdFusion, Database & VB custom development
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
Security CS Introduction to Operating Systems.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Ethical Hacking KaaShiv InfoTech For Inplant Training / Internship, please download the "Inplant training registration form" from our website
Ethical Hacking KaaShiv InfoTech For Inplant Training / Internship, please download the "Inplant training registration form" from our website
Presents Ethical Hacking For Inplant Training / Internship, please download the "Inplant training registration form" from our website.
KaaShiv InfoTech Ethical Hacking For Inplant Training / Internship, please download the "Inplant training registration form" from our website
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
Computer Security By Duncan Hall.
Understand Malware LESSON Security Fundamentals.
Presents Ethical Hacking 1 For Inplant Training / Internship, please download the "Inplant training registration form" from our.
Ethical Hacking Keith Brooks CIO and Director of Services
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Securing Interconnect Networks By: Bryan Roberts.
PRESENTED BY : Bhupendra Singh
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
What they are and how to protect against them
Seminar On Ethical Hacking Submitted To: Submitted By:
Computer Security and Ethical Hacking
Presented by: Kevin Regaldo Phillip Dai
ETHICAL HACKING Presentation By: FATHIMA SHIMNA S3 ECE ROLL NO: 31 1.
Operating Systems Services provided on internet
Ethical Hacking Prince Singh Varanasi
HACKING.
Answer the questions to reveal the blocks and guess the picture.
Preparing for The Present & The Future
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Test 3 review FTP & Cybersecurity
Presentation transcript:

KaaShiv InfoTech Ethical Hacking For Inplant Training / I nternship, please download th e "Inplant training registration form" fr om our website com. Fill the form and send it to kaas

What is hacking? Hacking Process of breaking into systems for:  Personal or Commercial Gains  Malicious Intent – Causing sever damage to Information & Assets Conforming to accepted professional standards of conduct

Contents Who is hacker? History of hacking Types of hacking Hacking accidents Why do hackers hack? What hackers do after hacking? What do hackers know? For Inplant Training / Internship, ple ase download the "Inplant training registration form" from our website Fill the form and s end it to

Contents (2)  How can kid hack?  Why can ’ t Korean kid hack?  How can be a real hacker?  Why can ’ t defend against hackers?  How can protect the system?  What should do after hacked? For Inplant Training / Internship, ple ase download the "Inplant training registration form" from our website Fill the form and s end it to

Who is hacker? Hack Cut with repeated irregular blows Examine something very minutely Hacker The person who hacks Cracker System intruder/destroyer For Inplant Training / Internship, ple ase download the "Inplant training registration form" from our website Fill the form and s end it to

History of hacking  Telephone hacking  Use telephone freely  It’s called phreaking  Computer virus  Destroy many computers  Network hacking  Hack the important server remotely and destroy/modify/disclose the information For Inplant Training / Internship, ple ase download the "Inplant training registration form" from our website Fill the form and s end it to

Types of hacking Normal data transfer Interruption Interception For Inplant Training / Internship, ple ase download the "Inplant training registration form" from our website Fill the form and s end it to

Hacking accidents  Internet Worm  Robert T. Morris made an internet worm. It spread through the internet and crashed about 6000 systems.  Cuckoo’s Egg  Clifford Stoll caught the hackers who are the German hackers applied by KGB For Inplant Training / Internship, ple ase download the "Inplant training registration form" from our website Fill the form and s end it to

Hacking accidents  IP Spoof  Kevin Mitnick was caught by Tsutomu Shimomura who was security expert. Kevin Mitnick uses the IP Spoof attack in this accident For Inplant Training / Internship, ple ase download the "Inplant training registration form" from our website Fill the form and s end it to

Why do hackers hack? Just for fun Show off Hack other systems secretly Notify many people their thought Steal important information Destroy enemy ’ s computer network during the war For Inplant Training / Internship, ple ase download the "Inplant training registration form" from our website Fill the form and s end it to

What do hackers do after hacking?  Patch security hole  The other hackers can’t intrude  Clear logs and hide themselves  Install rootkit ( backdoor )  The hacker who hacked the system can use the system later  It contains trojan ls, ps, and so on For Inplant Training / Internship, ple ase download the "Inplant training registration form" from our website Fill the form and s end it to

What do hackers do after hacking?  Install irc related program  identd, irc, bitchx, eggdrop, bnc  Install scanner program  mscan, sscan, nmap  Install exploit program  Install denial of service program  Use all of installed programs silently For Inplant Training / Internship, ple ase download the "Inplant training registration form" from our website Fill the form and s end it to

What do hackers know?  Don’t know how to use vi  Don’t know what unix is  Don’t know what they do  Know how to intrude the system  Know how to crash the system  Know where the hacking programs are For Inplant Training / Internship, ple ase download the "Inplant training registration form" from our website Fill the form and s end it to

How can kid hack?  Kid has much of time  Kid can search for longer time than other people  All hacking program is easy to use  Kid doesn’t have to know how the hacking program works  These kids are called script kiddies For Inplant Training / Internship, ple ase download the "Inplant training registration form" from our website Fill the form and s end it to

Why can’t Korean kid hack?  Almost all Korean kids don’t know English well  Almost all hacking program manuals are written in English.  However, many hacking program manuals are being translated. For Inplant Training / Internship, ple ase download the "Inplant training registration form" from our website Fill the form and s end it to

How can be a real hacker? Study C/C++/assembly language Study computer architecture Study operating system Study computer network Examine the hacking tools for a month Think the problem of the computer For Inplant Training / Internship, ple ase download the "Inplant training registration form" from our website Fill the form and s end it to

Why can’t defend against hackers?  There are many unknown security hole  Hackers need to know only one security hole to hack the system  Admin need to know all security holes to defend the system For Inplant Training / Internship, ple ase download the "Inplant training registration form" from our website Fill the form and s end it to

How can protect the system?  Patch security hole often  Encrypt important data  Ex) pgp, ssh  Do not run unused daemon  Remove unused setuid/setgid program  Setup loghost For Inplant Training / Internship, ple ase download the "Inplant training registration form" from our website Fill the form and s end it to

How can protect the system? Use switch hub Setup firewall Ex) ipchains Setup ID Ex) snort Check unintentional change Ex) tripwire For Inplant Training / Internship, ple ase download the "Inplant training registration form" from our website Fill the form and s end it to

What should do after hacked? Shutdown the system Or turn off the system Separate the system from network Restore the system with the backu Or reinstall all programs Connect the system to the network It can be good to call the police For Inplant Training / Internship, ple ase download the "Inplant training registration form" from our website Fill the form and s end it to

How to translate the hackers’ language 1 -> i or l 3 -> e 4 -> a 7 -> t 9 -> g 0 -> o $ -> s | -> i or l |\| -> n |\/| -> m s -> z z -> s f -> ph ph -> f x -> ck ck -> x For Inplant Training / Internship, ple ase download the "Inplant training registration form" from our website Fill the form and s end it to

How to translate the hackers’ language (2)  Ex)  1 d1d n0t h4ck th1s p4g3,  1t w4s l1k3 th1s wh3n 1 h4ck3d 1n  I did not hack this page, it was like this when I hacked in For Inplant Training / Internship, ple ase download the "Inplant training registration form" from our website Fill the form and s end it to

Thank you For Inplant Training / Internship, please download the "Inplant training registration form " from our website Fill the f orm and send it to