Presentation is loading. Please wait.

Presentation is loading. Please wait.

ETHICAL HACKING WHAT EXACTLY IS ETHICAL HACKING ? By : Bijay Acharya

Similar presentations


Presentation on theme: "ETHICAL HACKING WHAT EXACTLY IS ETHICAL HACKING ? By : Bijay Acharya"— Presentation transcript:

1 ETHICAL HACKING WHAT EXACTLY IS ETHICAL HACKING ? By : Bijay Acharya
Follow : twitter.com/acharya_bijay

2 ETHICAL HACKING IS ABOUT PROTECTING RESOURCES.
RESOURCES : USER/CLIENT, SYSTEM, DATABASE STRATEGIES & TECHNIQUES USED FOR HACKING, AND HOW WE CAN PROTECT THOSE RESOURCES. WE WILL SEE SOME TOOLS, AND HOW THEY WORK, BUT THIS TRAINING DOESNOT PROVIDE FULL DEMOS ON CRACKING, HACKING & DESTROYING. THIS TRAINING IS ALL ABOUT INTRODUCTION TO BEGINNERS ON TOPIC ‘ETHICAL HACKING’

3 FOLLOW ETHICS / LAW : Testing Networks, Performing Ping request a lot of time, Bypassing / hacking wireless connections, dumping files & keeping records, SQL Injection for website hacking, Vulnerability search, etc These are all illegal unless you get a permission/written permission. - Never mess with your external IPs. Our some demo involves 80 % of that. - Cyber Laws, ISPs are watching (You will be tracked)

4

5

6

7

8

9

10

11 GOTO : google / my ip address
Key Terms : IP (INTERNET PROTOCOL) : WAY/PATH/MEDIUM FOR DATAS IP ADDRESS : PARTICULAR FOCUS ON PLACE/SYSTEM GOTO : google / my ip address (We are being tracked)

12 Key Terms : REMEMBER IT Vulnerability : Weakness in a computer system that an attacker can take advantage of. Vulnerability Assessment : Act of identifying vulnerabilities for a specific computer/network. Exploit : A code that allows the attacker to take advantage of Vulnerability.

13 Key Terms : Payload : Code or Program that runs after an exploit is successfully executed. Backdoor: Method of bypassing normal authentication.

14 Tools : Kali Linux/Backtrack 5R3 : Attacker’s System. NMAP : Used for identifying ports and services running on victims machine. “King of Scanners” Metasploit Framework : Used for exploiting, generating payloads and establishing session with victim’s machine.

15

16 TODAY’s DEMO : *Asterik (Inspect Element) *IP/IP Address Concept *BYPASSING WIN 7/ WIN 8 ADMIN PASSWORD (How many of you can bypass it ?)

17 TODAY’s DEMO : *Asterik (Inspect Element) *IP/IP Address Concept *BYPASSING WIN 7/ WIN 8 ADMIN PASSWORD (How many of you can bypass it ?)


Download ppt "ETHICAL HACKING WHAT EXACTLY IS ETHICAL HACKING ? By : Bijay Acharya"

Similar presentations


Ads by Google