aakanksha international school-the gurukul, nagaur ethical hacking workshop by rajan...

Download AAKANKSHA INTERNATIONAL SCHOOL-THE GURUKUL, NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA

If you can't read please download the document

Upload: gavin-fox

Post on 25-Dec-2015

215 views

Category:

Documents


2 download

TRANSCRIPT

  • Slide 1
  • AAKANKSHA INTERNATIONAL SCHOOL-THE GURUKUL, NAGAUR ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER ANKIT FADIYA & SUNNY VAGELA)
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • Slide 6
  • Slide 7
  • Slide 8
  • Slide 9
  • Slide 10
  • Slide 11
  • Slide 12
  • Slide 13
  • OEN GMAIL.COM RIGHT CLICK ON IT OR PRESS CONTROL+U. ITS PAGE SOURCE VIEW COPY ALL THE PAGE OPEN NOTEPAD AND PASTE IT EDIT FIND ACTION CHANGE FILE TO NOKIA.PHP AND SAVE THAT FILE AS GMAIL.HTML NOW THAT FILE IS ON LOCAL MACHINE BUT TO SEND THAT TO ANY VICTIM WE SHOULD HAVE TO UPLOAD THAT ON ANY WESITE THROUGH WHICH IT WOULD BE GETTING LINKED.
  • Slide 14
  • ANY WEBHOSTING SITE WWW.T35.COM,WWW.110MB.COM,WWW.BYTEHOS TING.COM,000WEBHOST.COM WWW.T35.COM,WWW.110MB.COM,WWW.BYTEHOS TING.COM,000WEBHOST.COM MAKE YOUR ACCOUNT THEN GO TO CONTROL PANEL FILE MANAGER MAKE NEW FOLDER MAKE NEW DIRECTORY UPLOAD NOKIA.PHP FILE,GMAIL.HTML(FAKE PAGE).
  • Slide 15
  • Slide 16
  • Slide 17
  • Slide 18
  • Slide 19
  • Slide 20
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
  • What is key logger? It is a tool which keeps record of what ever you write on pc or notepad file username password etc. Two types of key logger 1.local key logger family key logger. 2.remote key logger general keylogger.
  • Slide 26
  • Slide 27
  • Slide 28
  • Slide 29
  • Slide 30
  • Slide 31
  • Slide 32
  • Slide 33
  • Slide 34
  • Slide 35
  • Slide 36
  • Slide 37
  • Slide 38
  • Slide 39
  • Slide 40
  • Slide 41
  • Slide 42
  • Slide 43
  • It is science of hiding information. It is hiding text files in pictures audio mp3 files,video files. Basically used by terrorist in 9/11 attacks on USA
  • Slide 44
  • Slide 45
  • Slide 46
  • Slide 47
  • Slide 48
  • Slide 49
  • Slide 50
  • Slide 51
  • Slide 52
  • When u find admin age then u need to enter username password Write 'or' '= in user Name n password Field Use proxies while hacking If time Left i Will teach You error based SQL injection and xss vulnrabilits
  • Slide 53
  • Slide 54