SlideShare une entreprise Scribd logo
1  sur  52
Glimpse on Computer Security A presentation by – Sumit Dimri
AGENDA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
  Network Security
A Brief History of the World
Overview ,[object Object],[object Object],[object Object]
What is “Security” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Why do we need security? ,[object Object],[object Object],[object Object]
Who is vulnerable? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security related URLs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Google Hacking ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is   G o o g l e ? ,[object Object],[object Object],[object Object]
How does  G o o g l e TM  work?
The special syntaxes ,[object Object],[object Object],[object Object]
 
INURL ,[object Object],[object Object]
 
SITE ,[object Object],[object Object]
 
LINK ,[object Object]
 
FILETYPE ,[object Object],[object Object]
 
15-441 Networks Fall 2002
15-441 Networks Fall 2002
What are Sniffers? ,[object Object],[object Object],[object Object]
 
 
 
ARP Spoofing ,[object Object]
ARP POISONING :arp -a 15-441 Networks Fall 2002
15-441 Networks Fall 2002
What is Steganography? ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
 
 
What Is Social Engineering ,[object Object],[object Object]
Art Of Manipulation ,[object Object],[object Object]
Human Weakness ,[object Object],[object Object]
Human Based Social Engineering ,[object Object],[object Object],[object Object],[object Object],[object Object]
Computer Based Social Engineering ,[object Object],[object Object],[object Object],[object Object]
Reverse Social Engineering ,[object Object],[object Object]
Hacking Web Servers ,[object Object],[object Object],[object Object],[object Object]
Invading PHP server ,[object Object]
Steps for web hacking ,[object Object],[object Object],[object Object],[object Object]
PHP4.4 have this port for admin login.  Now just login using port 2000  http://www.website.com:2000 And you will be comfortably login into admin  Page like this-
 
3.Hack the site Now in the fields, you have to type- Username – admin Password –  a’ or 1=1 or ‘b Domain -  a’ or 1=1 or ‘b And press go , you will login into admin.
 
 
Now you have hacked into admin. Actually sites based on PHP4.4 have the vulnerability in them that they are vulnerable to SQL injection. It will  Literally take 20 seconds.
Thanks For your time  

Contenu connexe

Tendances

Top Tips For E-safety
Top Tips For E-safetyTop Tips For E-safety
Top Tips For E-safetyTj Falls
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_pptNarayanan
 
What is spear phishing ( cyber attack )
What is spear phishing ( cyber attack )What is spear phishing ( cyber attack )
What is spear phishing ( cyber attack )Olivia martins
 
Information gathering
Information gatheringInformation gathering
Information gatheringMaulik Kotak
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hackingleet detected
 
Cyber hacking dev days by aes team
Cyber hacking dev days by aes teamCyber hacking dev days by aes team
Cyber hacking dev days by aes teamABIN VARGHESE
 
P R I V A C Y!!!
P R I V A C Y!!!P R I V A C Y!!!
P R I V A C Y!!!aimane
 
Computer security and malware by shahzad younas
Computer security and malware by shahzad younasComputer security and malware by shahzad younas
Computer security and malware by shahzad younasShahzad Younas
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Networkthowell
 
Password hacking
Password hackingPassword hacking
Password hackingAbhay pal
 
Cyber Security for REALTORS®
Cyber Security for REALTORS®Cyber Security for REALTORS®
Cyber Security for REALTORS®Danny Fredericks
 
OSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and PractitionersOSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and PractitionersMegan DeBlois
 

Tendances (20)

Hacking team
Hacking teamHacking team
Hacking team
 
Top Tips For E-safety
Top Tips For E-safetyTop Tips For E-safety
Top Tips For E-safety
 
Cyber security
Cyber security Cyber security
Cyber security
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_ppt
 
What is spear phishing ( cyber attack )
What is spear phishing ( cyber attack )What is spear phishing ( cyber attack )
What is spear phishing ( cyber attack )
 
Information gathering
Information gatheringInformation gathering
Information gathering
 
Introduction to Hacking
Introduction to HackingIntroduction to Hacking
Introduction to Hacking
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Aiman
AimanAiman
Aiman
 
Cyber hacking dev days by aes team
Cyber hacking dev days by aes teamCyber hacking dev days by aes team
Cyber hacking dev days by aes team
 
P R I V A C Y!!!
P R I V A C Y!!!P R I V A C Y!!!
P R I V A C Y!!!
 
Hacking
HackingHacking
Hacking
 
Phishing Incident Response Playbook
Phishing Incident Response PlaybookPhishing Incident Response Playbook
Phishing Incident Response Playbook
 
All About Hacking..!!
All About Hacking..!!All About Hacking..!!
All About Hacking..!!
 
Computer security and malware by shahzad younas
Computer security and malware by shahzad younasComputer security and malware by shahzad younas
Computer security and malware by shahzad younas
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
 
Social Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus NetworkSocial Engineering: Protecting Yourself on the Campus Network
Social Engineering: Protecting Yourself on the Campus Network
 
Password hacking
Password hackingPassword hacking
Password hacking
 
Cyber Security for REALTORS®
Cyber Security for REALTORS®Cyber Security for REALTORS®
Cyber Security for REALTORS®
 
OSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and PractitionersOSINT Basics for Threat Hunters and Practitioners
OSINT Basics for Threat Hunters and Practitioners
 

Similaire à C:\Fakepath\Ethical Hacking

Ipsec And Ssl Protocols ( Vpn )
Ipsec And Ssl Protocols ( Vpn )Ipsec And Ssl Protocols ( Vpn )
Ipsec And Ssl Protocols ( Vpn )Monique Jones
 
Hacking and Cyber Security.
Hacking and Cyber Security.Hacking and Cyber Security.
Hacking and Cyber Security.Kalpesh Doru
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAnumadil1
 
Based on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdfBased on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdfarri2009av
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
Analysis of web application penetration testing
Analysis of web application penetration testingAnalysis of web application penetration testing
Analysis of web application penetration testingEngr Md Yusuf Miah
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeMelbourne IT
 
Network Security and Spoofing Attacks
Network Security and Spoofing AttacksNetwork Security and Spoofing Attacks
Network Security and Spoofing AttacksPECB
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Small Business
 
Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)Maximiliano Soler
 
Information Gathering With Google
Information Gathering With GoogleInformation Gathering With Google
Information Gathering With GoogleZero Science Lab
 
Linux- Anti reconnaissance
Linux- Anti reconnaissanceLinux- Anti reconnaissance
Linux- Anti reconnaissanceSagar Kumar
 
What Makes Web Applications Desirable For Hackers
What Makes Web Applications Desirable For HackersWhat Makes Web Applications Desirable For Hackers
What Makes Web Applications Desirable For HackersJaime Manteiga
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center FundamentalAmir Hossein Zargaran
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfxererenhosdominaram
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSECSean Whalen
 

Similaire à C:\Fakepath\Ethical Hacking (20)

Ipsec And Ssl Protocols ( Vpn )
Ipsec And Ssl Protocols ( Vpn )Ipsec And Ssl Protocols ( Vpn )
Ipsec And Ssl Protocols ( Vpn )
 
Hacking and Cyber Security.
Hacking and Cyber Security.Hacking and Cyber Security.
Hacking and Cyber Security.
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
unit-1.pptx
unit-1.pptxunit-1.pptx
unit-1.pptx
 
Based on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdfBased on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdf
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Analysis of web application penetration testing
Analysis of web application penetration testingAnalysis of web application penetration testing
Analysis of web application penetration testing
 
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
 
Network Security and Spoofing Attacks
Network Security and Spoofing AttacksNetwork Security and Spoofing Attacks
Network Security and Spoofing Attacks
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
 
Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)Information Gathering with Google (c0c0n - India)
Information Gathering with Google (c0c0n - India)
 
Information Gathering With Google
Information Gathering With GoogleInformation Gathering With Google
Information Gathering With Google
 
Linux- Anti reconnaissance
Linux- Anti reconnaissanceLinux- Anti reconnaissance
Linux- Anti reconnaissance
 
What Makes Web Applications Desirable For Hackers
What Makes Web Applications Desirable For HackersWhat Makes Web Applications Desirable For Hackers
What Makes Web Applications Desirable For Hackers
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
 
Intro to INFOSEC
Intro to INFOSECIntro to INFOSEC
Intro to INFOSEC
 

C:\Fakepath\Ethical Hacking

Notes de l'éditeur

  1. In other words, having systems in place beforehand which prevent attacks before they begin.
  2. Since November 2004, the number of indexed pages has doubled. A googol is (10 100 ) Google’s Motto is “Don’t Be Evil”
  3. Web servers: There’s actually more than 100 of these around the country. Which is one of the reasons why Google moves so quickly. Index Servers & Doc servers: There’s also redundancy built into the index and doc servers so the millions of people hitting Google at the same time don’t bog it down.