computer security -a hacker's perspective

20
COMPUTER SECURITY A Hacker’s Perspective COMPUTER SECURITY A Hacker’s Perspective Presented by Kunal Mohanty

Upload: kunal-mohanty

Post on 15-Jan-2015

1.582 views

Category:

Technology


13 download

DESCRIPTION

A sneak peek at tools used for level 1 hacks.

TRANSCRIPT

Page 1: Computer Security -A Hacker's Perspective

COMPUTER SECURITYA Hacker’s Perspective

COMPUTER SECURITYA Hacker’s Perspective

Presented by

Kunal Mohanty

Page 2: Computer Security -A Hacker's Perspective

LEGAL DISCLAIMERLEGAL DISCLAIMER

Any actions and or activities related to the material contained within this presentation is solely your responsibility.The misuse of the information in this presentation can result in criminal charges brought against the persons in question. The author will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

This presentation contains materials that can be potentially damaging or dangerous. If you do not fully understand something on this presentation , then please IGNORE! Refer to the laws in your province/country before accessing, using,or in any other way utilizing these materials.These materials are for educational and research purposes only.Do not attempt to violate the law with anything contained here. Neither the author of this material, or anyone else affiliated in any way, is going to accept responsibility for your actions.

Any linked sites or references are not under the control of author and the author is not responsible for the contents of any linked site or any link contained in a linked site, or any changes or updates to such sites. I am providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement by me.

Presented by : Kunal Mohanty 07-06-2010

Page 3: Computer Security -A Hacker's Perspective

HACKINGHACKING

Process of breaking into systems for:

1. Personal or Commercial Gains

2. Malicious Intent – Causing severe damage

to Information & Assets

Presented by : Kunal Mohanty 07-06-2010

Page 4: Computer Security -A Hacker's Perspective

STATISTICSSTATISTICS

Presented by : Kunal Mohanty 07-06-2010

Page 5: Computer Security -A Hacker's Perspective

TYPES OF INCIDENTSTYPES OF INCIDENTS

Presented by : Kunal Mohanty 07-06-2010

Page 6: Computer Security -A Hacker's Perspective

SOME TRADITIONAL WAYSSOME TRADITIONAL WAYS

Page 7: Computer Security -A Hacker's Perspective

FOOTPRINTINGFOOTPRINTING

Presented by : Kunal Mohanty 07-06-2010

Page 8: Computer Security -A Hacker's Perspective

FOOTPRINTINGFOOTPRINTING

Presented by : Kunal Mohanty 07-06-2010

PING

TRACEROUTE

Page 9: Computer Security -A Hacker's Perspective

SCANNING AND ENUMERATIONSCANNING AND ENUMERATION

Presented by : Kunal Mohanty 07-06-2010

NMAP

Page 10: Computer Security -A Hacker's Perspective

SCANNING AND ENUMERATIONSCANNING AND ENUMERATION

Presented by : Kunal Mohanty 07-06-2010

SUPERSCAN

Page 11: Computer Security -A Hacker's Perspective

SYSTEM HACKINGSYSTEM HACKING

Presented by : Kunal Mohanty 07-06-2010

SNADBOY

Page 12: Computer Security -A Hacker's Perspective

SYSTEM HACKINGSYSTEM HACKING

Presented by : Kunal Mohanty 07-06-2010

KEYLOGGER

Page 13: Computer Security -A Hacker's Perspective

TROJANS AND BACKDOORSTROJANS AND BACKDOORS

Presented by : Kunal Mohanty 07-06-2010

NETBUS

Page 14: Computer Security -A Hacker's Perspective

TROJANS AND BACKDOORSTROJANS AND BACKDOORS

Presented by : Kunal Mohanty 07-06-2010

SUBSEVEN

Page 15: Computer Security -A Hacker's Perspective

SNIFFERSSNIFFERS

Presented by : Kunal Mohanty 07-06-2010

SMAC

Page 16: Computer Security -A Hacker's Perspective

SNIFFERSSNIFFERS

Presented by : Kunal Mohanty 07-06-2010

ETHEREAL

Page 17: Computer Security -A Hacker's Perspective

WEB BASED PASSWORD CRACKINGWEB BASED PASSWORD CRACKING

Presented by : Kunal Mohanty 07-06-2010

CAIN AND ABEL

Page 18: Computer Security -A Hacker's Perspective

WEB BASED PASSWORD CRACKINGWEB BASED PASSWORD CRACKING

Presented by : Kunal Mohanty 07-06-2010

BRUTUS

Page 19: Computer Security -A Hacker's Perspective

PHISHING ATTACKSPHISHING ATTACKS

Presented by : Kunal Mohanty 07-06-2010

Page 20: Computer Security -A Hacker's Perspective

THANKYOUTHANKYOU