ehitsec, cci & network pen-testing

Post on 13-Apr-2017

564 Views

Category:

Presentations & Public Speaking

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Ethical Hacking IT Security, Cyber Crime Investigation & Penetration Testing

Mr. Vishwesh.S.SataputeCo-Founder Cypherkode Infosec

#whoami Pen-Tester Trainer (OSCP).

Interested in finding loop holes in networks.

Learning some new concepts and ninja techniques.

Pursuing my BE in Computer Engineering (RGIT, Versova).

Interested in hardware hacking.

What is Hacking?

TYPE OF H@CK3r’SWHITE

HAT HACKE

R

BLACK HAT

HACKER

GRAYHAT

HACKER

Hacking - Process

• Foot Printing

• Scanning

• Gaining Access

• Maintaining Access

HACKING VS CRACKING• Hacker– The person who hack

• Cracker– System intruder/destroyer

• Hacking with malicious intention is cracking.• The basic difference is hackers do not do anythingdisastrous.• Cracking yield more devastating results.• Cracking is crime.• Cyber crime are the results of cracking ,not hacking

How you all use

• Which are your famous sites ?

• How you share your information on social media sites ?

• Social Engineering

Attacking Method

#CYBER CRIMES

List of cyber crimes are as follows:-• Hacking of computer systems and networks.• Financial crimes such as siphoning of money

from banks, credit card frauds, money laundering.

• Cyber pornography involving production & distribution of pornographic material, including child pornography.

#CYBER CRIMES

• Online Gambling, Launching of virus, worms, Trojans , DOS Attack, Sale of illegal articles such as narcotics, weapons, wildlife, etc.

• Harassments such as cyber stalking, cyber defamation, indecent and abusing mails.

• Intellectual property crimes such as theft of computer source code, software piracy, copyright infringement, trademark violations.

#Indian Hackers• ATMS.• Jobs.• ACROSS INDIA level fraud.• Target any age group.

Scams & Frauds

• How hackers use Facebook.

• Recent cyber crimes using Facebook.

• Facebook records all information.

• Securing Facebook by filters.

#Cyber Crime in Organizations

• Spam mails.• Theft of source code.• Exchange of business secrets and documents.• Insider attacks on personal database.• Use of office computer for running other

business.• External cyber attacks on an organization

resulting in denial-of-service.

#Cyber Warfare

• Cyberwarfare is any virtual conflict initiated as a politically motivated attack on an enemy's computer and information systems.

• Waged via the Internet, these attacks disable financial and organizational systems by stealing or altering classified data to undermine networks, websites and services.

#Cyber Warfare Attacks

• The Original Logic Bomb.

• Moonlight Maze.

• Titan Rain.

#Cyber Warfare India VS Pakistan

• Why India is the weaker side?

#Safe Guard Yourself

• Information : general not specific.• TP Id’s.• Insta-alert facility: Credit card n banks.• DO NOT TRUST ANYONE.• Social engg, pictures, 2 id’s same person.• Always LOGOUT or SIGNOUT.• WI-FI security.• HTTPS & LOCK.

#Personal Information Leaks• Personal information identifies you,

your location or your financial assets.

• Known: name, age, sex, picture, phone number, address, ID numbers such as SSN, Bank Account Numbers, Credit Card Numbers.

• Less Unknowns: hobbies, interests, school mascot, gaming identities.

• This info can be used for phishing scams/pretexting.

#Network Pentesting

#Basic Pentest

#Safety Punch’s :P

• Do not share personal information such as your name, age, sex, picture, location Etc.

• Create nicknames that do not reflect your own name or anything personal.

• Never respond to online communication that is inappropriate.

• Never agree to meet in person someone you met online.

• Never open e-mails from people you do not know.• Never click on links you don’t know about it.

#Connect me

• Email:-– Vishwesh.satapute[at]cypherkode[dot]com– Vsatapute[at]gmail[dot]com

• Facebook:- – www.facebook.com/funkymalware– www.facebook.com/CypherkodeInfosec

• Mobile & Whatsapp:- +91 9768036518• Website:- www.cypherkode.com (UC)

top related