ethical hacking (2)
TRANSCRIPT
ETHICAL HACKING
What is ethical hacking?
Ethical hacking, often performed by white hats or skilled computer experts, is the use of programming skills to determine vulnerabilities in computer systems.
HistoryKevin mitnic(1995)
Gary mckinnon (2002)
Hacking methods:
Brute force hack
Fake login hack
Cookie steal hack
Web mail hack
Types of hackers: white hat hacker
grey hat hacker
black hat hacker
Hacking with ethicsHacking website:• open the website u want to hack• Provide wrong user name and password• Right click on the page->go to view source-
>html • Delete the java script from the source
carefully• Give input=“password” type=“password” ->
replace• File-> saveas->store inhard disk->goto saved
page and open it ---->u can see some changes
Locally stored passwords
Trojan
Key logger
Impersonation Sniffing
Sniffing
Social engineering
Basicneeds for hacking:
First u can learn about computers you are in much femeliar about HTML language
Learn about hardware , dos, batch filesPort scanningLearn programming languages HTML,C+
+,Perl….etcHow to secure yourselfFTP(file transfer protocol)TCP/IP,UDP,DHCP
CODE:
Shop admin hacking :Finding vp-asp 5.00 In google.com type vp-asp 5.00 and install
software Page will be like this
***://***.victim.com/shop/shop displaycategories.asp Now the URL will be like this ****://***.victim.com/shop/shoping140.mdb
If you don’t download the database try this the URL will be
****://***.victim.com/sp/resx/shoping1 40.mdbIf u see error messg try this ***://***.victim.com/shop/shopping 500.m db download mdb file Admin page is usually located here ***://***victim.com/shop/shopadmin.asp
Hacking windows X-P:Boot the pc in safe modeSelect the safe mode optionTry rebooting pc in DOSNow, Access to c:\Windows\sysytem32\config\SAMRename SAM as SAM.mjGo to cmd prompt and type next userHold Ctrl+Alt key and press DEL twice
Conclusion:The role of ETHICAL HACKING in security
is to provide customers with awareness of how they could potentially be attacked and why they would be targeted. The only way to anticipate the actions of a hacker is to act like the hacker.
PRESENTED BY-A.SIRISHAM.MANJEERA