SlideShare a Scribd company logo
ETHICAL HACKING




BY …..
         Miss. Pallavi S. Sonone (CSE Dept. PLIT, Buldana)
Hacking Include’s…….
   Password Cracking
   Trojans
   Phishing
   Facebook Hacking
   Sniffers
   IP Tracking
   Website Hacking
   Cross Site Scripting
   Proxies
   Remote Testers
   Port Hacking
   Mobile Phone Hacking
   WiFi Hacking
   Social Engineering
   ATM Machine Hacking
IP Address:

  This address is unique for different devices.

e.g.
       172.16.254.1
       225.168.1.20
TORRENTs UNBLOCKING:


 How Torrents Blocked?



 -Disable Torrent Clients

-Block Download of .torrent extension files
COOKIES:

 It is a text file stored on our computer sort by
  the website on user machine.

 -Cookies logged us automatically(On
  google.com)

 -allows to customize background image(On
  google.com)
TYPES Of Cookies:


 Session/ Temporary Cookies:
 Persistent Cookies:
 First-Party Cookies:
 Third-Party Cookies:
 Unsatisfactory Cookies:
TROJANs:

 Trojans are RATs or Remote Administration
  Tools that give an attacker remote control or
  remote access to the victims computer.
Protection:

 Trojan should start automatically (Whenever
  windows boots)

 Trojan has to open a port


 Trojan has to be loaded into memory
SPOOFING:

Spoofing means
         “Hacking Other’s Email, SMS or Call”

There Are Three Types Of SPOOFING:
  1) EMAIL Spoofing:
  2)SMS Spoofing:
  3) Call Spoofing:
PASSWORD CRACKING:

Include’s…
 Online Account
 Admin/Windows Login Password Cracking
 File/Application Cracking
 BIOS Cracking
 Network Cracking(FTP, SQL, Coporate email)
 Wifi Passwords
 Mobile Login Cracking
MAFIABOY:
DOS ATTACK:

 To bring down an entire network


 -Each system connected to internet has
  limited bandwidth available.

 [If our computer has bandwidth of 2mbps &
  the criminal sends 100mbps of data then our
  computer will crack]
TYPES OF DOS ATTACK:

1.Ping Of Death:
2.TearDrop:


1]Ping Of Death:

65,536 bytes is the size of data packet.

(Not Larger Attack)
.
2 TearDrop:
Data is broken down into smaller
chunks of data
e.g. 4000 Bytes
     Chunk A 1-1500 bytes
     Chunk B 1500-3000 bytes
     Chunk C 3000-4000 bytes

DOS attack is extremely dangerous
STEGNOGRAPHY:

Hiding of any file or data into the other file

TYPES OF STEGNOGRAPHY:

1. Image STEGNOGRAPHY
2. Text STEGNOGRAPHY
3. Spam(Mimic) STEGNOGRAPHY
ROAD SIGN HACKING:
ATM MACHINE HACKING:
BEST SECURITY PRACTICES:
1. Install a FIREWALL: Zone Alarm (Free
   Download)
2. Use an Antivirus: Update it Weakly
3. Use an ANTISPYWARE: PrevX, SpySweeper
4. Update your OS: Every 15 days
5. Choose a Strong Password
6. Avoid Public computer to bank or shop
   Online.
7. Secure your WiFi: Enable WEP, WPA or WPA2
8. Encrypt your Data/Folders/Drivers: Truecrypt
9. Use Digital signature/PGP Encrypted Email
….

More Related Content

PPTX
Seminar On Trojan Horse
PPTX
Trojan virus & backdoors
PPT
The Trojan Horse (Computing)
PPTX
password cracking and Key logger
PPT
Hacking 1224807880385377-9
PPTX
Access Controls Attacks
PPTX
Trojan Horse Virus and Hacking
DOCX
Password hacking
Seminar On Trojan Horse
Trojan virus & backdoors
The Trojan Horse (Computing)
password cracking and Key logger
Hacking 1224807880385377-9
Access Controls Attacks
Trojan Horse Virus and Hacking
Password hacking

What's hot (20)

PPTX
Hacker&cracker
PPTX
Password Attack
PPTX
Password craking techniques
PPT
PPTX
ETHICAL HACKING
PDF
Ethical Hacking
PPTX
Password cracking and brute force
PPTX
Torjan horse virus
PPTX
Learn awesome hacking tricks
PPTX
Ethical hacking
PPT
Trojan Horse Presentation
PPT
Malware, Trojans and Slurpware
PPT
Trojan Horse Virus
PPSX
Hacker !
PPTX
Access control attacks by Yaakub bin Idris
PPTX
Internet Threats: Carlo Alvarez
PPTX
Web defacement
PPTX
Ethical Hacking4
PPTX
Password Cracking
PDF
Virtualisasi Hacking
Hacker&cracker
Password Attack
Password craking techniques
ETHICAL HACKING
Ethical Hacking
Password cracking and brute force
Torjan horse virus
Learn awesome hacking tricks
Ethical hacking
Trojan Horse Presentation
Malware, Trojans and Slurpware
Trojan Horse Virus
Hacker !
Access control attacks by Yaakub bin Idris
Internet Threats: Carlo Alvarez
Web defacement
Ethical Hacking4
Password Cracking
Virtualisasi Hacking

Viewers also liked (15)

PPTX
ETHICAL HACKING PPT
PPTX
Seminar1
PDF
Ce Hv6 Module 18 Web Based Password Cracking Techniques
PDF
Quick Installation Guide EZ Hotspot Extender Extended English
PDF
Ceh v5 module 13 web based password cracking techniques
PDF
Wifi Password Hack v2.85 - The best software to hack the Wifi networks !
PDF
Wireless Hacking
PPTX
Password Cracking
PPTX
WiFi Secuiry: Attack & Defence
PDF
Intro to White Chapel
PPT
Lecture 11 - Sex and Gender
PPTX
password cracking using John the ripper, hashcat, Cain&abel
PDF
Growth Hacking Belgium (kick-off)
PPTX
Hacking ppt
PDF
How to share folders within a domain network
ETHICAL HACKING PPT
Seminar1
Ce Hv6 Module 18 Web Based Password Cracking Techniques
Quick Installation Guide EZ Hotspot Extender Extended English
Ceh v5 module 13 web based password cracking techniques
Wifi Password Hack v2.85 - The best software to hack the Wifi networks !
Wireless Hacking
Password Cracking
WiFi Secuiry: Attack & Defence
Intro to White Chapel
Lecture 11 - Sex and Gender
password cracking using John the ripper, hashcat, Cain&abel
Growth Hacking Belgium (kick-off)
Hacking ppt
How to share folders within a domain network

Similar to Ethical Hacking (20)

PPT
Hack the hack
PPT
Lecture8 to identify the (Cyber Crime).ppt
PPTX
It act seminar
PPTX
Hacking by Pratyush Gupta
PPT
Trojan backdoors
PDF
Operations security (OPSEC)
PPTX
Meeting02_RoT.pptx
PPT
presentation of professionalism harwares.ppt
PPT
31.ppt
PPT
Computer security
PPTX
Cyber security & ethical hacking 10
PPT
Ethical Hacking
PPT
RRB JE Stage 2 Computer and Applications Questions Part 5
 
PPT
Ch02 System Threats and Risks
PDF
Malwares
PDF
Ceh v5 module 06 trojans and backdoors
PPSX
PPTX
Cyber Security Seminar Day 2
PDF
Information security
PPTX
Introduction to the Ethical hacking.pptx
Hack the hack
Lecture8 to identify the (Cyber Crime).ppt
It act seminar
Hacking by Pratyush Gupta
Trojan backdoors
Operations security (OPSEC)
Meeting02_RoT.pptx
presentation of professionalism harwares.ppt
31.ppt
Computer security
Cyber security & ethical hacking 10
Ethical Hacking
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Ch02 System Threats and Risks
Malwares
Ceh v5 module 06 trojans and backdoors
Cyber Security Seminar Day 2
Information security
Introduction to the Ethical hacking.pptx

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
A Presentation on Artificial Intelligence
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Empathic Computing: Creating Shared Understanding
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Chapter 3 Spatial Domain Image Processing.pdf
Machine learning based COVID-19 study performance prediction
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
A Presentation on Artificial Intelligence
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
NewMind AI Monthly Chronicles - July 2025
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Network Security Unit 5.pdf for BCA BBA.
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Modernizing your data center with Dell and AMD
Dropbox Q2 2025 Financial Results & Investor Presentation
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Empathic Computing: Creating Shared Understanding
“AI and Expert System Decision Support & Business Intelligence Systems”
CIFDAQ's Market Insight: SEC Turns Pro Crypto
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Encapsulation theory and applications.pdf
Understanding_Digital_Forensics_Presentation.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

Ethical Hacking

  • 1. ETHICAL HACKING BY ….. Miss. Pallavi S. Sonone (CSE Dept. PLIT, Buldana)
  • 2. Hacking Include’s…….  Password Cracking  Trojans  Phishing  Facebook Hacking  Sniffers  IP Tracking  Website Hacking  Cross Site Scripting  Proxies  Remote Testers  Port Hacking  Mobile Phone Hacking  WiFi Hacking  Social Engineering  ATM Machine Hacking
  • 3. IP Address: This address is unique for different devices. e.g. 172.16.254.1 225.168.1.20
  • 4. TORRENTs UNBLOCKING:  How Torrents Blocked? -Disable Torrent Clients -Block Download of .torrent extension files
  • 5. COOKIES:  It is a text file stored on our computer sort by the website on user machine.  -Cookies logged us automatically(On google.com)  -allows to customize background image(On google.com)
  • 6. TYPES Of Cookies:  Session/ Temporary Cookies:  Persistent Cookies:  First-Party Cookies:  Third-Party Cookies:  Unsatisfactory Cookies:
  • 7. TROJANs:  Trojans are RATs or Remote Administration Tools that give an attacker remote control or remote access to the victims computer.
  • 8. Protection:  Trojan should start automatically (Whenever windows boots)  Trojan has to open a port  Trojan has to be loaded into memory
  • 9. SPOOFING: Spoofing means “Hacking Other’s Email, SMS or Call” There Are Three Types Of SPOOFING: 1) EMAIL Spoofing: 2)SMS Spoofing: 3) Call Spoofing:
  • 10. PASSWORD CRACKING: Include’s…  Online Account  Admin/Windows Login Password Cracking  File/Application Cracking  BIOS Cracking  Network Cracking(FTP, SQL, Coporate email)  Wifi Passwords  Mobile Login Cracking
  • 12. DOS ATTACK:  To bring down an entire network  -Each system connected to internet has limited bandwidth available.  [If our computer has bandwidth of 2mbps & the criminal sends 100mbps of data then our computer will crack]
  • 13. TYPES OF DOS ATTACK: 1.Ping Of Death: 2.TearDrop: 1]Ping Of Death: 65,536 bytes is the size of data packet. (Not Larger Attack)
  • 14. . 2 TearDrop: Data is broken down into smaller chunks of data e.g. 4000 Bytes Chunk A 1-1500 bytes Chunk B 1500-3000 bytes Chunk C 3000-4000 bytes DOS attack is extremely dangerous
  • 15. STEGNOGRAPHY: Hiding of any file or data into the other file TYPES OF STEGNOGRAPHY: 1. Image STEGNOGRAPHY 2. Text STEGNOGRAPHY 3. Spam(Mimic) STEGNOGRAPHY
  • 18. BEST SECURITY PRACTICES: 1. Install a FIREWALL: Zone Alarm (Free Download) 2. Use an Antivirus: Update it Weakly 3. Use an ANTISPYWARE: PrevX, SpySweeper 4. Update your OS: Every 15 days 5. Choose a Strong Password 6. Avoid Public computer to bank or shop Online. 7. Secure your WiFi: Enable WEP, WPA or WPA2 8. Encrypt your Data/Folders/Drivers: Truecrypt 9. Use Digital signature/PGP Encrypted Email
  • 19. ….