Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security Student Name :Ala’a Ahmad Mohammad qwassmeh

Similar presentations


Presentation on theme: "Security Student Name :Ala’a Ahmad Mohammad qwassmeh"— Presentation transcript:

1 Security Student Name :Ala’a Ahmad Mohammad qwassmeh
Instructor: Dr:Ramzi Saifan

2 Security Topics Of Presentations 1) Injection Files 2) WPS
3) Windows (Change Password) 4) Viber

3 Injection Files we have many ways to hacking that the attacker used some of them are easy to discover it and some of them are complicated virus is kind of hacking that can attacker used .

4 Target group the attacker import about the target group .... to know how they can access each of them by the correct way to make hacking.

5 Example target group :Student choose the 2 files to blind them ( file contain code , pdf file )use (nj-Binder) to make blending.

6 the result file is in that image we have trouble in icon and extension
that program used to take icon from any program (resource )

7 now the extension of the result file is (exe )we need to change it to (pif , scr,cmd,bat) we need also to change name of the file too . now this file is ready

8 META DATA

9 METADATA Introduction
Meta data is "data [information] that provides information about other data".[1] Three distinct types of meta data exist: structural meta data, descriptive meta data, and administrative meta data.

10 METADATA Three distinct types of meta data
Descriptive meta data: describes a resource for purposes such as discovery and identification. It can include elements such as title, abstract, author, and keywords. Structural meta data: indicates how compound objects are put together, for example, how pages are ordered to form chapters . Administrative meta data: provides information to help manage a resource, such as when and how it was created, file type and other technical information, and who can access it.

11 METADATA

12 METADATA

13 METADATA

14 METADATA

15 METADATA How to create a project ?

16 METADATA Files Analysis

17 WPS Wi-Fi Protected Setup (WPS; originally, Wi-Fi Simple Config) is a network security standard to create a secure wireless home network. Two modes in a home network for adding a new device to the network: *PIN method. *Push button method

18 WPS Push button method

19 WPS Example

20 WPS Turn off and disabled step 1

21 WPS Tun off and disabled step 2

22 Windows Change Password
How can I change password if I forget my password !! if I click Shift 3 times it will be open this window

23 Windows Ok what I can do ?? I need to cd windows to change order of shift when I click it 3 times and if I can change it to open cmd .. I can to change password without loses any data and without format my computer ..

24 Windows Steps go to boot window

25 Windows cont..

26 Windows click Next

27 Windows Click on Command Prompt

28 Windows

29 Windows

30 Windows

31


Download ppt "Security Student Name :Ala’a Ahmad Mohammad qwassmeh"

Similar presentations


Ads by Google