Download presentation
Presentation is loading. Please wait.
Published byAleesha Wilkins Modified over 6 years ago
1
ETHICAL HACKING WHAT EXACTLY IS ETHICAL HACKING ? By : Bijay Acharya
Follow : twitter.com/acharya_bijay
2
ETHICAL HACKING IS ABOUT PROTECTING RESOURCES.
RESOURCES : USER/CLIENT, SYSTEM, DATABASE STRATEGIES & TECHNIQUES USED FOR HACKING, AND HOW WE CAN PROTECT THOSE RESOURCES. WE WILL SEE SOME TOOLS, AND HOW THEY WORK, BUT THIS TRAINING DOESNOT PROVIDE FULL DEMOS ON CRACKING, HACKING & DESTROYING. THIS TRAINING IS ALL ABOUT INTRODUCTION TO BEGINNERS ON TOPIC ‘ETHICAL HACKING’
3
FOLLOW ETHICS / LAW : Testing Networks, Performing Ping request a lot of time, Bypassing / hacking wireless connections, dumping files & keeping records, SQL Injection for website hacking, Vulnerability search, etc These are all illegal unless you get a permission/written permission. - Never mess with your external IPs. Our some demo involves 80 % of that. - Cyber Laws, ISPs are watching (You will be tracked)
11
GOTO : google / my ip address
Key Terms : IP (INTERNET PROTOCOL) : WAY/PATH/MEDIUM FOR DATAS IP ADDRESS : PARTICULAR FOCUS ON PLACE/SYSTEM GOTO : google / my ip address (We are being tracked)
12
Key Terms : REMEMBER IT Vulnerability : Weakness in a computer system that an attacker can take advantage of. Vulnerability Assessment : Act of identifying vulnerabilities for a specific computer/network. Exploit : A code that allows the attacker to take advantage of Vulnerability.
13
Key Terms : Payload : Code or Program that runs after an exploit is successfully executed. Backdoor: Method of bypassing normal authentication.
14
Tools : Kali Linux/Backtrack 5R3 : Attacker’s System. NMAP : Used for identifying ports and services running on victims machine. “King of Scanners” Metasploit Framework : Used for exploiting, generating payloads and establishing session with victim’s machine.
16
TODAY’s DEMO : *Asterik (Inspect Element) *IP/IP Address Concept *BYPASSING WIN 7/ WIN 8 ADMIN PASSWORD (How many of you can bypass it ?)
17
TODAY’s DEMO : *Asterik (Inspect Element) *IP/IP Address Concept *BYPASSING WIN 7/ WIN 8 ADMIN PASSWORD (How many of you can bypass it ?)
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.