Академический Документы
Профессиональный Документы
Культура Документы
Agenda
security predictions
Cracking Tools :
ERD Commander
PH Crack
and many more
SAM = Security
OR we can Change
the Password
Virus &
Worms
Trojan
Horse
Keylogger
Symptom
s
A
N
D
Worms
These generally dont
perform any malicious
activity.
Lets
Code a
Virus !
Is it difficult ?
Trojan Horse
A Trojan is an infection that
steals information.
It then sends the information to a
specified location over the
internet.
It makes the computer prone to
hackers by making Backdoors.
Attacker
Trojan is a fatal
Victim
KEYLOGGER
Windows Registry
All initialization and
configuration information used
by windows are stored in the
registry.
Network Scanners
Network Scanners used to
find all the live systems
present in the network with
the Information about IP
Address, Port Number,
Services running on that
ports, Vulnerabilities, installed
applications etc.
Some Tools: Angry IP Scanner
GFI LAN Guard
Look At LAN
Sniffers
Sniffers used to Capture the
data packet from the network by
applying some Poisoning such as
ARP Poisoning.
Some Tools: Cain and abel
Ettercap
hmmmmmmmmmm
Cryptography
Art of Secret writing to convert plaintext(Readable format) into cipher text(NonReadable format) by using some algorithms with the help of a Key.
Encrypters!
Stagenography
Art of Secret writing to Hide one file behind the other file. Example a text message
can be bind behind the image or video file.
Hiding..
Google
Hacking
DNS Spoofing
SQL Injection
DOS Attack
Website Exploits
Google Cracking
Using Google
Google
Database Cracking
Hmmmmmmmmmmm.
Advance Googling
Filetype:xls hry.nic.in
Password Cracking
Intitle:index .of
Camera Cracking
Inurl:indexframe.shtml axis
SQL attack
Select * from table where user= " & TextBox1.Text & AND pass= '" & TextBox2.Text & ;
' OR '1'='1
OR
OR
1=1 ;
Lets see
how is
this
done!
Surfing Online
Browser
Hacking
Phishing
Fake Emails
Social Networking
Abuse
Browser Cracking
Use scripts links to run in Browser.
These scripts change the behavior of Browser.
Example:
javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300;
y4=200; x5=300; y5=200; DI=document.images; DIL=DI.length; function
A(){for(i=0; i<DIL; i++){DIS=DI[ i ].style; DIS.position='absolute';
DIS.left=Math.sin (R*x1+i*x2+x3)*x4+x5;
DIS.top=Math.cos(R*y1+i*y2+y3)*y4+y5}R++}setInterval('A()',5); void(0)
Lets Do It.........
Blast Virus
<html>
<body>
<script language="javascript">
while(1)
{
w1=window.open();
w1.document.write("<center><font color=red size=5>
blaaaast!!</font></center>");
}
</script>
</body>
</html>
Lets Do It.........
Fake Emails
Sending Fake mails with Fake
headers
E-mails can be sent to anyone
from any Id
It is used also in Spamming
Its bush@georgebush.com
Go to Regional Internet
Registries like Apnic, Afrinic,
etc.
Get the email of ISP of attacker &
lodge the complaint.
Catch me if u can
Phishing Attack
E-mail: Theres a problem with
your Gmail account
Password
sent
Password?
Gmail.org)
Preventing Phishing
Thank You
For any query and assistance,
Kindly contact:
Appin Technology lab