computer security -a hacker's perspective
DESCRIPTION
A sneak peek at tools used for level 1 hacks.TRANSCRIPT
COMPUTER SECURITYA Hacker’s Perspective
COMPUTER SECURITYA Hacker’s Perspective
Presented by
Kunal Mohanty
LEGAL DISCLAIMERLEGAL DISCLAIMER
Any actions and or activities related to the material contained within this presentation is solely your responsibility.The misuse of the information in this presentation can result in criminal charges brought against the persons in question. The author will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.
This presentation contains materials that can be potentially damaging or dangerous. If you do not fully understand something on this presentation , then please IGNORE! Refer to the laws in your province/country before accessing, using,or in any other way utilizing these materials.These materials are for educational and research purposes only.Do not attempt to violate the law with anything contained here. Neither the author of this material, or anyone else affiliated in any way, is going to accept responsibility for your actions.
Any linked sites or references are not under the control of author and the author is not responsible for the contents of any linked site or any link contained in a linked site, or any changes or updates to such sites. I am providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement by me.
Presented by : Kunal Mohanty 07-06-2010
HACKINGHACKING
Process of breaking into systems for:
1. Personal or Commercial Gains
2. Malicious Intent – Causing severe damage
to Information & Assets
Presented by : Kunal Mohanty 07-06-2010
STATISTICSSTATISTICS
Presented by : Kunal Mohanty 07-06-2010
TYPES OF INCIDENTSTYPES OF INCIDENTS
Presented by : Kunal Mohanty 07-06-2010
SOME TRADITIONAL WAYSSOME TRADITIONAL WAYS
FOOTPRINTINGFOOTPRINTING
Presented by : Kunal Mohanty 07-06-2010
FOOTPRINTINGFOOTPRINTING
Presented by : Kunal Mohanty 07-06-2010
PING
TRACEROUTE
SCANNING AND ENUMERATIONSCANNING AND ENUMERATION
Presented by : Kunal Mohanty 07-06-2010
NMAP
SCANNING AND ENUMERATIONSCANNING AND ENUMERATION
Presented by : Kunal Mohanty 07-06-2010
SUPERSCAN
SYSTEM HACKINGSYSTEM HACKING
Presented by : Kunal Mohanty 07-06-2010
SNADBOY
SYSTEM HACKINGSYSTEM HACKING
Presented by : Kunal Mohanty 07-06-2010
KEYLOGGER
TROJANS AND BACKDOORSTROJANS AND BACKDOORS
Presented by : Kunal Mohanty 07-06-2010
NETBUS
TROJANS AND BACKDOORSTROJANS AND BACKDOORS
Presented by : Kunal Mohanty 07-06-2010
SUBSEVEN
SNIFFERSSNIFFERS
Presented by : Kunal Mohanty 07-06-2010
SMAC
SNIFFERSSNIFFERS
Presented by : Kunal Mohanty 07-06-2010
ETHEREAL
WEB BASED PASSWORD CRACKINGWEB BASED PASSWORD CRACKING
Presented by : Kunal Mohanty 07-06-2010
CAIN AND ABEL
WEB BASED PASSWORD CRACKINGWEB BASED PASSWORD CRACKING
Presented by : Kunal Mohanty 07-06-2010
BRUTUS
PHISHING ATTACKSPHISHING ATTACKS
Presented by : Kunal Mohanty 07-06-2010
THANKYOUTHANKYOU