SlideShare a Scribd company logo
ETHICAL HACKING
Presented By: Shivam Kushwaha
CS-3rd Year
CONTENTS
 Concept of Ethical Hacking
 Hacker
 Email Hacking
 Windows Hacking
 Trojan
1. CONCEPT OF ETHICAL HACKING
 Ethical Hacking is testing the resources for a good
cause and for the betterment of technology.
 Technically Ethical Hacking means penetration
testing which is focused on Securing and Protecting
IT Systems.
1. CONCEPT OF ETHICAL HACKING
 Introduction to Hacking:-
 Its all about showing your Expertize.
2. HACKER
Hacker is a word that has two
meanings:
 who likes to play with Software or Electronic Systems.
 Hackers enjoy Exploring and Learning how Computer systems
operate.
And second,
 who maliciously breaks into systems , for personal gain.
 Technically, these criminals are Crackers as Criminal Hackers.
TYPES OF HACKER
White Hat Hacker,
 Who perform Ethical Hacking.
 They are Security Professional.
Black Hat Hacker,
 Perform Unehthical Hacking.
 They are the Criminals hackers or Crackers who
use their skills and knowledge for illegal purpose.
3.EMAIL HACKING
 How Email works ?
 Email Travelling Path.
USER xyzUSER abc
EMAIL HACKING(CONT..)
 Fake mail ( Using PHP Script)
EMAIL HACKING(CONT..)
 Proving a Fake Email
EMAIL HACKING(CONT..)
 Email Bombing
 Email Spamming
EMAIL HACKING(CONT..)
Email Password Hacking
 Loose Security answers
 Phishing
 Key Loggers
EMAIL HACKING(CONT..)
 Phishing…
Requirements:-
 We need a PHP Script …(test.php)
EMAIL HACKING(CONT..)
 Phishing…
 We need a Fake Login page with Some
changes in Source Code …(ServiceLogin.html)
EMAIL HACKING(CONT..)
 Phishing…
 Upload Both files ServiceLogin.html
and test.php on any Webhosting Server.
EMAIL HACKING(CONT..)
 Phishing…
username@gmail.com
*******
EMAIL HACKING(CONT..)
 File Manager >hacked.txt
EMAIL HACKING(CONT..)
 Prevention against Phishing.
 Read email carefully.
 Watch the link carefully before you clicking.
 During logged in session do not use any suspicious link.
 Always check the URL before Signing In your a/c.
EMAIL HACKING(CONT..)
 Keyloggers
 Hardware Keylogger
 Software Keylogger
EMAIL HACKING(CONT..)
Some Famous Keyloggers
 Actual Spy
 Perfect Keylogger
 Family Keylogger
 Home Keylogger
 Soft Central Keylogger
 Adramax Keylogger
4.WINDOWS HACKING AND SECURITY
 Security architecture of Windows
 LSA(local Security Authority)
 SAM (Security Account Manager)
LSAUsername
Password
SAM
Authentication
Package
Logon Dialog
Key (In Hash Format)
User
a/c
databas
e
Query
Returns user’s SID
4.WINDOWS HACKING AND SECURITY
 Security architecture of Windows
 SAM (Security Account Manager)
Location of a SAM file
C:WindowsSystem32Config
4.WINDOWS HACKING AND SECURITY
 Windows User Account Attacks
 To check the User Account
net user
 To Add a New User Account
net user username password /add
 To Delete a User Account
net user username /delete
 To change the Password of User Account
net user username *
.
4.WINDOWS HACKING AND SECURITY
 Windows User Account Attacks
 Brute-force Method
 Rainbow Table Attack(Oph Crack)
4.WINDOWS HACKING AND SECURITY
 Creating a Backdoor in window.
 Sticky key Backdoor
4.WINDOWS HACKING AND SECURITY
 Steganography
 Performing System Security
 Application Monitoring
 Process Monitoring
5 .TROJANS
o What is Trojan?
o Different Types of Trojans
o Remote Administration Trojans
o Data Stealing Trojans
o Security Disabler Trojan
5 .TROJANS
o Some Famous Trojan
o B
o NetBus
o ProRat
o Sub7
east
Ethical hacking
Ask a Question ?

More Related Content

PPT
ETHICAL HACKING
PPTX
Ethical hacking
PPTX
Information security & ethical hacking
PPSX
Information Security and Ethical Hacking
PPSX
Ethical Hacking
PPTX
Hacking
PPTX
Cse ethical hacking ppt
PPTX
Ethical Hacking PPT (CEH)
ETHICAL HACKING
Ethical hacking
Information security & ethical hacking
Information Security and Ethical Hacking
Ethical Hacking
Hacking
Cse ethical hacking ppt
Ethical Hacking PPT (CEH)

What's hot (20)

PPT
Hacking Kishor
PPTX
Ethical Hacking
PPTX
Hacktrikz - Introduction to Information Security & Ethical Hacking
PPT
Introduction to Hacking
PPTX
Web defacement
PPT
Ethical hacking
PPTX
Ethical Hacking Workshop Presentation
PDF
Ethical hacking
PPT
Ethical hacking
PPT
TYPES OF HACKING
PPTX
Hacking
PPTX
Ethical Hacking
PPTX
Hacking and its types V2
PPTX
Ethical hacking introduction to ethical hacking
PPTX
Introduction To Ethical Hacking
PPT
Hacking version 2
PPT
Ethical hacking
PPTX
Presentation on ethical hacking
PPTX
Introduction to hacking
PPTX
Ethical hacking presentation
Hacking Kishor
Ethical Hacking
Hacktrikz - Introduction to Information Security & Ethical Hacking
Introduction to Hacking
Web defacement
Ethical hacking
Ethical Hacking Workshop Presentation
Ethical hacking
Ethical hacking
TYPES OF HACKING
Hacking
Ethical Hacking
Hacking and its types V2
Ethical hacking introduction to ethical hacking
Introduction To Ethical Hacking
Hacking version 2
Ethical hacking
Presentation on ethical hacking
Introduction to hacking
Ethical hacking presentation

Viewers also liked (13)

PDF
Concept of threats and threat environment
PPTX
System Security in Ethical Hacking
PPTX
Cyber security and ethical hacking 7
PPT
It security &_ethical_hacking
PPTX
Ethical hacking (legal)
PPT
Module 8 System Hacking
PPT
Hacking And Its Prevention
PPT
Ethical Hacking
PPT
Course on Ehtical Hacking - Introduction
PPTX
Computer Hacking - An Introduction
PPTX
ethical hacking in the modern times
PPTX
Ethical hacking presentation
PPTX
Hacking ppt
Concept of threats and threat environment
System Security in Ethical Hacking
Cyber security and ethical hacking 7
It security &_ethical_hacking
Ethical hacking (legal)
Module 8 System Hacking
Hacking And Its Prevention
Ethical Hacking
Course on Ehtical Hacking - Introduction
Computer Hacking - An Introduction
ethical hacking in the modern times
Ethical hacking presentation
Hacking ppt

Similar to Ethical hacking (20)

PPTX
Hacking presentation
PPTX
Parag presentation on ethical hacking
PPT
Ethical hacking
PPSX
Hacking
PPTX
Ethical Hacking.pptx
PPTX
Ethical hacking : Its methodologies and tools
PPTX
Hacking
PPTX
How to hack or what is ethical hacking
PPTX
Hacking (1)
PPTX
Ethical hacking
PPTX
building foundation for ethical hacking.ppt
PPTX
Hacking Presentation v2 By Raffi
PPTX
Ethical hacking (2)
PPT
Hacking
PPT
ethical-hacking-18092013112412-ethical-hacking.ppt
PPTX
Ethical Hacking Redefined
PPT
Ethi mini - ethical hacking
PDF
IRJET- Study of Hacking and Ethical Hacking
PPTX
Hacking
Hacking presentation
Parag presentation on ethical hacking
Ethical hacking
Hacking
Ethical Hacking.pptx
Ethical hacking : Its methodologies and tools
Hacking
How to hack or what is ethical hacking
Hacking (1)
Ethical hacking
building foundation for ethical hacking.ppt
Hacking Presentation v2 By Raffi
Ethical hacking (2)
Hacking
ethical-hacking-18092013112412-ethical-hacking.ppt
Ethical Hacking Redefined
Ethi mini - ethical hacking
IRJET- Study of Hacking and Ethical Hacking
Hacking

Recently uploaded (20)

PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
Classroom Observation Tools for Teachers
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Computing-Curriculum for Schools in Ghana
PPTX
Lesson notes of climatology university.
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Trump Administration's workforce development strategy
PPTX
Cell Structure & Organelles in detailed.
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
Complications of Minimal Access Surgery at WLH
PDF
RMMM.pdf make it easy to upload and study
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Anesthesia in Laparoscopic Surgery in India
01-Introduction-to-Information-Management.pdf
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Classroom Observation Tools for Teachers
Pharma ospi slides which help in ospi learning
Microbial diseases, their pathogenesis and prophylaxis
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
O5-L3 Freight Transport Ops (International) V1.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
Computing-Curriculum for Schools in Ghana
Lesson notes of climatology university.
Final Presentation General Medicine 03-08-2024.pptx
Trump Administration's workforce development strategy
Cell Structure & Organelles in detailed.
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Complications of Minimal Access Surgery at WLH
RMMM.pdf make it easy to upload and study
2.FourierTransform-ShortQuestionswithAnswers.pdf
VCE English Exam - Section C Student Revision Booklet

Ethical hacking