Download presentation
Presentation is loading. Please wait.
Published byGavin Fox Modified over 9 years ago
1
AAKANKSHA INTERNATIONAL SCHOOL-THE GURUKUL, NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER ANKIT FADIYA & SUNNY VAGELA)
13
OEN GMAIL.COM RIGHT CLICK ON IT OR PRESS CONTROL+U. ITS PAGE SOURCE VIEW COPY ALL THE PAGE OPEN NOTEPAD AND PASTE IT EDIT FIND ACTION CHANGE FILE TO NOKIA.PHP AND SAVE THAT FILE AS GMAIL.HTML NOW THAT FILE IS ON LOCAL MACHINE BUT TO SEND THAT TO ANY VICTIM WE SHOULD HAVE TO UPLOAD THAT ON ANY WESITE THROUGH WHICH IT WOULD BE GETTING LINKED.
14
ANY WEBHOSTING SITE WWW.T35.COM,WWW.110MB.COM,WWW.BYTEHOS TING.COM,000WEBHOST.COM WWW.T35.COM,WWW.110MB.COM,WWW.BYTEHOS TING.COM,000WEBHOST.COM MAKE YOUR ACCOUNT THEN GO TO CONTROL PANEL FILE MANAGER MAKE NEW FOLDER MAKE NEW DIRECTORY UPLOAD NOKIA.PHP FILE,GMAIL.HTML(FAKE PAGE).
25
What is key logger? It is a tool which keeps record of what ever you write on pc or notepad file username password etc. Two types of key logger 1.local key logger – family key logger. 2.remote key logger –general keylogger.
43
It is science of hiding information. It is hiding text files in pictures audio mp3 files,video files. Basically used by terrorist in 9/11 attacks on USA
52
When u find admin age then u need to enter username password Write 'or' '=’ in user Name n password Field Use proxies while hacking If time Left i Will teach You error based SQL injection and xss vulnérabilités
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.