Ethical hacking

Click to edit Master subtitle style

8/26/12

Presentation submitted by Samarth Saxena Cs-b

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

Hacking process

8/26/12

Static ip

Dynamic ip

8/26/12

SCANNIN StagesG
 1.Who is database. www.whois.net www.who.is www.domaintools.com 2.Information gathering Cmd>nslookup.yourtargetsite.com Reverse ip mapping It gives names of other websites hosted on
8/26/12 same

server.

ENNUMERATION
3.Trace route www.ip-address.com \go bottom <reverse ip> Proxy servers www.kproxy.com www.boomproxy.com www.hidemyass.com Logs are maintained.
8/26/12

EXPLOITS
Hackers use vpn It stands for virtual private network. No logs are maintained Only 15 mine time grid.

8/26/12

CONT..
Trace route method It gives a path between your computer and

victim computers.

Eg visual trace.

8/26/12

Ports
Physical : usb,serial port ,paraller port ,gpu

port etc.

Virtual port -1-655535 http:80 Smtp:25 Pop3 :110 ftp:21 Firewall works on rule.
8/26/12

8/26/12

SCREEN SHOT OF WHO’S WHO

8/26/12

DN S

8/26/12

THE HACKING PROCEDURE
exploits on a websites,
Namely Sql injection Php injection etc

Yet there are many ways of direct meta

Sql injection is most commonly used as 70%

of websites are vunerable to this attack.

8/26/12

When a website is created the data is always stored in form of databaseson what is known as servers. Server hosts the data on the internet.All data is in form of tables. Communication is done through url

8/26/12

Sql injection

8/26/12

8/26/12

8/26/12

Tables in SQL

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

After this the req admin table and password are shown on ypur screen . But please never try these steps ,because this is 8/26/12 unaurthorized for us to enter any sites.

Our group site is also vunerable.
http://www.lnctgroup.in/groupinfo.php?show=22

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

8/26/12

Prevention.
Prevention is Better Than Cure Using Antivirus Software Using Firewall Email Security Software updates Educate Yourself Windows update
8/26/12 

8/26/12

Thanks

Sign up to vote on this title
UsefulNot useful