Download - EHITSec, CCI & Network Pen-Testing
![Page 1: EHITSec, CCI & Network Pen-Testing](https://reader035.vdocuments.mx/reader035/viewer/2022062503/58ef7a801a28aba64b8b4655/html5/thumbnails/1.jpg)
Ethical Hacking IT Security, Cyber Crime Investigation & Penetration Testing
Mr. Vishwesh.S.SataputeCo-Founder Cypherkode Infosec
![Page 2: EHITSec, CCI & Network Pen-Testing](https://reader035.vdocuments.mx/reader035/viewer/2022062503/58ef7a801a28aba64b8b4655/html5/thumbnails/2.jpg)
#whoami Pen-Tester Trainer (OSCP).
Interested in finding loop holes in networks.
Learning some new concepts and ninja techniques.
Pursuing my BE in Computer Engineering (RGIT, Versova).
Interested in hardware hacking.
![Page 3: EHITSec, CCI & Network Pen-Testing](https://reader035.vdocuments.mx/reader035/viewer/2022062503/58ef7a801a28aba64b8b4655/html5/thumbnails/3.jpg)
What is Hacking?
![Page 4: EHITSec, CCI & Network Pen-Testing](https://reader035.vdocuments.mx/reader035/viewer/2022062503/58ef7a801a28aba64b8b4655/html5/thumbnails/4.jpg)
TYPE OF H@CK3r’SWHITE
HAT HACKE
R
BLACK HAT
HACKER
GRAYHAT
HACKER
![Page 5: EHITSec, CCI & Network Pen-Testing](https://reader035.vdocuments.mx/reader035/viewer/2022062503/58ef7a801a28aba64b8b4655/html5/thumbnails/5.jpg)
Hacking - Process
• Foot Printing
• Scanning
• Gaining Access
• Maintaining Access
![Page 6: EHITSec, CCI & Network Pen-Testing](https://reader035.vdocuments.mx/reader035/viewer/2022062503/58ef7a801a28aba64b8b4655/html5/thumbnails/6.jpg)
HACKING VS CRACKING• Hacker– The person who hack
• Cracker– System intruder/destroyer
• Hacking with malicious intention is cracking.• The basic difference is hackers do not do anythingdisastrous.• Cracking yield more devastating results.• Cracking is crime.• Cyber crime are the results of cracking ,not hacking
![Page 7: EHITSec, CCI & Network Pen-Testing](https://reader035.vdocuments.mx/reader035/viewer/2022062503/58ef7a801a28aba64b8b4655/html5/thumbnails/7.jpg)
How you all use
• Which are your famous sites ?
• How you share your information on social media sites ?
• Social Engineering
![Page 8: EHITSec, CCI & Network Pen-Testing](https://reader035.vdocuments.mx/reader035/viewer/2022062503/58ef7a801a28aba64b8b4655/html5/thumbnails/8.jpg)
Attacking Method
![Page 9: EHITSec, CCI & Network Pen-Testing](https://reader035.vdocuments.mx/reader035/viewer/2022062503/58ef7a801a28aba64b8b4655/html5/thumbnails/9.jpg)
#CYBER CRIMES
List of cyber crimes are as follows:-• Hacking of computer systems and networks.• Financial crimes such as siphoning of money
from banks, credit card frauds, money laundering.
• Cyber pornography involving production & distribution of pornographic material, including child pornography.
![Page 10: EHITSec, CCI & Network Pen-Testing](https://reader035.vdocuments.mx/reader035/viewer/2022062503/58ef7a801a28aba64b8b4655/html5/thumbnails/10.jpg)
#CYBER CRIMES
• Online Gambling, Launching of virus, worms, Trojans , DOS Attack, Sale of illegal articles such as narcotics, weapons, wildlife, etc.
• Harassments such as cyber stalking, cyber defamation, indecent and abusing mails.
• Intellectual property crimes such as theft of computer source code, software piracy, copyright infringement, trademark violations.
![Page 11: EHITSec, CCI & Network Pen-Testing](https://reader035.vdocuments.mx/reader035/viewer/2022062503/58ef7a801a28aba64b8b4655/html5/thumbnails/11.jpg)
#Indian Hackers• ATMS.• Jobs.• ACROSS INDIA level fraud.• Target any age group.
![Page 12: EHITSec, CCI & Network Pen-Testing](https://reader035.vdocuments.mx/reader035/viewer/2022062503/58ef7a801a28aba64b8b4655/html5/thumbnails/12.jpg)
Scams & Frauds
• How hackers use Facebook.
• Recent cyber crimes using Facebook.
• Facebook records all information.
• Securing Facebook by filters.
![Page 13: EHITSec, CCI & Network Pen-Testing](https://reader035.vdocuments.mx/reader035/viewer/2022062503/58ef7a801a28aba64b8b4655/html5/thumbnails/13.jpg)
#Cyber Crime in Organizations
• Spam mails.• Theft of source code.• Exchange of business secrets and documents.• Insider attacks on personal database.• Use of office computer for running other
business.• External cyber attacks on an organization
resulting in denial-of-service.
![Page 14: EHITSec, CCI & Network Pen-Testing](https://reader035.vdocuments.mx/reader035/viewer/2022062503/58ef7a801a28aba64b8b4655/html5/thumbnails/14.jpg)
#Cyber Warfare
• Cyberwarfare is any virtual conflict initiated as a politically motivated attack on an enemy's computer and information systems.
• Waged via the Internet, these attacks disable financial and organizational systems by stealing or altering classified data to undermine networks, websites and services.
![Page 15: EHITSec, CCI & Network Pen-Testing](https://reader035.vdocuments.mx/reader035/viewer/2022062503/58ef7a801a28aba64b8b4655/html5/thumbnails/15.jpg)
#Cyber Warfare Attacks
• The Original Logic Bomb.
• Moonlight Maze.
• Titan Rain.
![Page 16: EHITSec, CCI & Network Pen-Testing](https://reader035.vdocuments.mx/reader035/viewer/2022062503/58ef7a801a28aba64b8b4655/html5/thumbnails/16.jpg)
#Cyber Warfare India VS Pakistan
• Why India is the weaker side?
![Page 17: EHITSec, CCI & Network Pen-Testing](https://reader035.vdocuments.mx/reader035/viewer/2022062503/58ef7a801a28aba64b8b4655/html5/thumbnails/17.jpg)
#Safe Guard Yourself
• Information : general not specific.• TP Id’s.• Insta-alert facility: Credit card n banks.• DO NOT TRUST ANYONE.• Social engg, pictures, 2 id’s same person.• Always LOGOUT or SIGNOUT.• WI-FI security.• HTTPS & LOCK.
![Page 18: EHITSec, CCI & Network Pen-Testing](https://reader035.vdocuments.mx/reader035/viewer/2022062503/58ef7a801a28aba64b8b4655/html5/thumbnails/18.jpg)
#Personal Information Leaks• Personal information identifies you,
your location or your financial assets.
• Known: name, age, sex, picture, phone number, address, ID numbers such as SSN, Bank Account Numbers, Credit Card Numbers.
• Less Unknowns: hobbies, interests, school mascot, gaming identities.
• This info can be used for phishing scams/pretexting.
![Page 19: EHITSec, CCI & Network Pen-Testing](https://reader035.vdocuments.mx/reader035/viewer/2022062503/58ef7a801a28aba64b8b4655/html5/thumbnails/19.jpg)
#Network Pentesting
![Page 20: EHITSec, CCI & Network Pen-Testing](https://reader035.vdocuments.mx/reader035/viewer/2022062503/58ef7a801a28aba64b8b4655/html5/thumbnails/20.jpg)
#Basic Pentest
![Page 21: EHITSec, CCI & Network Pen-Testing](https://reader035.vdocuments.mx/reader035/viewer/2022062503/58ef7a801a28aba64b8b4655/html5/thumbnails/21.jpg)
#Safety Punch’s :P
• Do not share personal information such as your name, age, sex, picture, location Etc.
• Create nicknames that do not reflect your own name or anything personal.
• Never respond to online communication that is inappropriate.
• Never agree to meet in person someone you met online.
• Never open e-mails from people you do not know.• Never click on links you don’t know about it.
![Page 22: EHITSec, CCI & Network Pen-Testing](https://reader035.vdocuments.mx/reader035/viewer/2022062503/58ef7a801a28aba64b8b4655/html5/thumbnails/22.jpg)
![Page 23: EHITSec, CCI & Network Pen-Testing](https://reader035.vdocuments.mx/reader035/viewer/2022062503/58ef7a801a28aba64b8b4655/html5/thumbnails/23.jpg)
#Connect me
• Email:-– Vishwesh.satapute[at]cypherkode[dot]com– Vsatapute[at]gmail[dot]com
• Facebook:- – www.facebook.com/funkymalware– www.facebook.com/CypherkodeInfosec
• Mobile & Whatsapp:- +91 9768036518• Website:- www.cypherkode.com (UC)
![Page 24: EHITSec, CCI & Network Pen-Testing](https://reader035.vdocuments.mx/reader035/viewer/2022062503/58ef7a801a28aba64b8b4655/html5/thumbnails/24.jpg)