Академический Документы
Профессиональный Документы
Культура Документы
(B.C.A,CCSE,CISEH,CPT,DWD,Hard A+)
Total Data Breach Since 2013
Total Cyber Attack By Year
Total Loss In Cash In 12 Months
Report
99% Out of 100% Systems
Digital World Growth Past 12 Month
Hacker 'Favorite Target
Website And Server Hack By Islamic State
Live Attack In Real World
JoBs In ThIs FiElD
Growth In Job Posting
Salary By Job
15 Top-Paying Certifications
INTRODUCTION
TO
ETHICAL HACKING
Thus in this case, you first have to establish a direct connection with your
friend’s computer by either sending him a file or by using the call
feature.
Then, goto MSDOS or the command line and type:
C:\>netstat -n
This command will give you the IP Address of your friend’s computer.
Instant Messanger
1. Ask your friend to come online and chat with you.
C:\>netstat -n
This command will give you the IP Address of your friend’s computer.
Getting IP from Website
Working:
Definition:
Working:
Tools:
MultiProxy
Onion Routing: Using Tor
Network
download it from
http://torproject.org
DOS
Commands
1.nslookup
2.net view
3.net use
4.net user
5.ping
6.tracert
7.arp
8.route
9.nbtstat
10.netstat
11.ipconfig
Ping
syntax:
nslookup www.thehackbook.com
tracert
C:\program files\nmap>nmap
–O www.google.com
C:\program files\nmap>nmap –A
www. google.com
Os detection using websites: use PHP
script to detect visitors OS and browser
Executing the Attack
1.Ping of Death
2.Teardrop attacks
3.SYN flood attacks
4.Land Attacks
5.Smurf Attacks
6.UDP flood Attacks
7.DDOS Attacks
8.Modem-disconnect
Attack
Trojan Attacks
Tools:
Sniffers are tools that can capture all data packets being sent
across the entire network in the raw form.
Threats:
Tools:
Social Enginnering
Password guessing
Phishing attacks
Key Loggers
Sniffing attacks
Man in the middle attack
Tab Nabbing- Latest kind of phishing
attack
Phshing Attack
Fake login
page: Demo.
www.facebook.thehackbook.co
m
www.gmail.thehackbook.com
Resetting the password
Definition:
Working: