computer security -a hacker's perspective

Post on 15-Jan-2015

1.583 Views

Category:

Technology

13 Downloads

Preview:

Click to see full reader

DESCRIPTION

A sneak peek at tools used for level 1 hacks.

TRANSCRIPT

COMPUTER SECURITYA Hacker’s Perspective

COMPUTER SECURITYA Hacker’s Perspective

Presented by

Kunal Mohanty

LEGAL DISCLAIMERLEGAL DISCLAIMER

Any actions and or activities related to the material contained within this presentation is solely your responsibility.The misuse of the information in this presentation can result in criminal charges brought against the persons in question. The author will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

This presentation contains materials that can be potentially damaging or dangerous. If you do not fully understand something on this presentation , then please IGNORE! Refer to the laws in your province/country before accessing, using,or in any other way utilizing these materials.These materials are for educational and research purposes only.Do not attempt to violate the law with anything contained here. Neither the author of this material, or anyone else affiliated in any way, is going to accept responsibility for your actions.

Any linked sites or references are not under the control of author and the author is not responsible for the contents of any linked site or any link contained in a linked site, or any changes or updates to such sites. I am providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement by me.

Presented by : Kunal Mohanty 07-06-2010

HACKINGHACKING

Process of breaking into systems for:

1. Personal or Commercial Gains

2. Malicious Intent – Causing severe damage

to Information & Assets

Presented by : Kunal Mohanty 07-06-2010

STATISTICSSTATISTICS

Presented by : Kunal Mohanty 07-06-2010

TYPES OF INCIDENTSTYPES OF INCIDENTS

Presented by : Kunal Mohanty 07-06-2010

SOME TRADITIONAL WAYSSOME TRADITIONAL WAYS

FOOTPRINTINGFOOTPRINTING

Presented by : Kunal Mohanty 07-06-2010

FOOTPRINTINGFOOTPRINTING

Presented by : Kunal Mohanty 07-06-2010

PING

TRACEROUTE

SCANNING AND ENUMERATIONSCANNING AND ENUMERATION

Presented by : Kunal Mohanty 07-06-2010

NMAP

SCANNING AND ENUMERATIONSCANNING AND ENUMERATION

Presented by : Kunal Mohanty 07-06-2010

SUPERSCAN

SYSTEM HACKINGSYSTEM HACKING

Presented by : Kunal Mohanty 07-06-2010

SNADBOY

SYSTEM HACKINGSYSTEM HACKING

Presented by : Kunal Mohanty 07-06-2010

KEYLOGGER

TROJANS AND BACKDOORSTROJANS AND BACKDOORS

Presented by : Kunal Mohanty 07-06-2010

NETBUS

TROJANS AND BACKDOORSTROJANS AND BACKDOORS

Presented by : Kunal Mohanty 07-06-2010

SUBSEVEN

SNIFFERSSNIFFERS

Presented by : Kunal Mohanty 07-06-2010

SMAC

SNIFFERSSNIFFERS

Presented by : Kunal Mohanty 07-06-2010

ETHEREAL

WEB BASED PASSWORD CRACKINGWEB BASED PASSWORD CRACKING

Presented by : Kunal Mohanty 07-06-2010

CAIN AND ABEL

WEB BASED PASSWORD CRACKINGWEB BASED PASSWORD CRACKING

Presented by : Kunal Mohanty 07-06-2010

BRUTUS

PHISHING ATTACKSPHISHING ATTACKS

Presented by : Kunal Mohanty 07-06-2010

THANKYOUTHANKYOU

top related