SlideShare a Scribd company logo
HACK YOUR
WAY INTO!!
$ whoami
Akshay Pandurangi - @a_pandurangi
Cyber Security Analyst
Just a InfoSec learner!
Few Acknowledgements
Hack your way into
WHAT IS HACKING?
“Hacking” used to describe when a clever individual put
computer parts (or anything really) together in a novel,
unintended way that resulted in something cool or useful.
It was used with a positive connotation. For example, Steve
Wozniak, one of the original founders of Apple, was an
exceptional hacker.
WHAT PEOPLE THINK
ABOUT HACKING?
“hacking” – a blanket term readily
used to encompass a whole range of
attacks, from crashing a server to
more sophisticated infiltration, such
as stealing passwords.
“hacking” is more frequently used to
described discovering and taking
advantage of a weakness in a
computer system or network.
NO, THIS ISN’T HACKING!
HACKER?
A person who enjoys learning the details of computer
systems and how to stretch their capabilities
One who programs enthusiastically or who enjoys
programming rather than just theorizing about programming.
All hacker are NOT BAD GUYS!
Some of them are VIGILANTE!!!
HACKERS OF A DIFFERENT CLASSES
There are a large number of hacker classifications
defining who hackers are and why they are hacking in
the first place.
WHITE HAT
These guys do everything by the book. They have full, contractual
permission to try and compromise a system. There are rules – white hats
follow them.
BLACK HAT
These hackers are Bond villains. Black hat hacking is an illegal activity for
some form of personal gain.
GREY HAT
Everything in-between. Most commonly, these guys hack something with
whatever intentions… they leave identification mark!!
HOW DO HACKERS HACK THE STUFF!
HOW DO HACKERS HACK THE STUFF!
Here is a step-by-step process for the easiest method to hack:
1. Ask the operator for the password.
2. Sign in.
Seriously, Social Engineering is the key.
Its the practice of manipulating people into divulging information.
While a user may not intentionally give away the password, some
guile, a little knowledge of human nature, and a touch of trickery are
more than enough to get the access you need.
Ok, ok, that’s cheating… but it works! Let’s have a look at the sample
video.
REWARDS OF SOCIAL ENGINEERING
KNOWING THE TARGET!
Facebook, Instagram & Twitter are Social Engineer's best
friends!
Collecting the socially available information from Public
Resources
pipl
sync.me
email-lookup by golookup
DEMO
Let’s try them!
LET’S PLAY WITH EMAILS@HACKING
It’s a technique where the sender of an email has been
changed to appear as someone else.
This is done by simply forging the header of an email and
changing the address in the “from” field.
Requirement: access to a mail server with an open SMTP
That’s it! So simple, isn’t it?
DEMO
Spoofing is the real beauty!
PHISH THE TARGET
Build a replica of a website and make your victim to access it
If its looks fair enough as the actual website and earns your
victim’s trust…Boom! You won!!
Wait until victim logs-in and victim’s credentials now also
belongs to you.
Requirements: Replica of a target web-app & a Hosting space.
Basic knowledge of PHP will be handy.
DEMO
Spoofing is the real beauty!
SECURITY MANTRA: LEARN IT, TO AVOID IT!

More Related Content

PPTX
Hacking final
PPTX
Β. Hucking
PPSX
Ethical Hacking
PPTX
Hacking Vs Cracking in Computer Networks
PPTX
Introduction to Hacking
PPTX
Internet Security in Web 2.0
PPTX
Ethical hacking
Hacking final
Β. Hucking
Ethical Hacking
Hacking Vs Cracking in Computer Networks
Introduction to Hacking
Internet Security in Web 2.0
Ethical hacking

What's hot (18)

PPTX
Hacking Presentation
PPT
basic knowhow hacking
PPT
Hackers Izyani
PPT
Power Point Hacker
PDF
Weaponizing data science for social engineering: automate E2E spear phishing ...
PPTX
Hacking and Anti Hacking
PPTX
Internet Threats
RTF
Hacking and its types
PPTX
Web defacement
PPT
Common hacking tactics
PPT
Hacking
DOCX
Password hacking
PPTX
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
PPT
Ict H A C K I N G
PPTX
PPTX
Hacking ppt
PPTX
Surf smart
 
DOC
Kinds of hackers
Hacking Presentation
basic knowhow hacking
Hackers Izyani
Power Point Hacker
Weaponizing data science for social engineering: automate E2E spear phishing ...
Hacking and Anti Hacking
Internet Threats
Hacking and its types
Web defacement
Common hacking tactics
Hacking
Password hacking
[EMPOWERMENT TECHNOLOGIES] - INTERNET THREATS
Ict H A C K I N G
Hacking ppt
Surf smart
 
Kinds of hackers

Similar to Hack your way into (20)

PPTX
How to hack or what is ethical hacking
PPTX
Ethical hacking for Business or Management.pptx
PPTX
Data Privacy for Activists
PPTX
Ethical Hacking & Network Security
PPTX
Parag presentation on ethical hacking
PPTX
Gamifying Ethical hacking for education.pptx
PPTX
The Emotional Lure of Social Engineering
PPSX
Ethical Hacking, Its relevance and Its Prospects
PDF
How to be come a hacker slide for 2600 laos
PPTX
PPTX
Hacking ppt
PDF
Hackingppt 160730081605
PPT
Ethical Hacking
PPTX
Intro to INFOSEC
PDF
Ethical hacking
PDF
Getting users to care about security
PPT
Thane Barnier MACE 2016 presentation
PDF
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdf
PPTX
Hacking intro
How to hack or what is ethical hacking
Ethical hacking for Business or Management.pptx
Data Privacy for Activists
Ethical Hacking & Network Security
Parag presentation on ethical hacking
Gamifying Ethical hacking for education.pptx
The Emotional Lure of Social Engineering
Ethical Hacking, Its relevance and Its Prospects
How to be come a hacker slide for 2600 laos
Hacking ppt
Hackingppt 160730081605
Ethical Hacking
Intro to INFOSEC
Ethical hacking
Getting users to care about security
Thane Barnier MACE 2016 presentation
Linux_Basics_for_Hackers_OccupyTheWeb_Complex.pdf
Hacking intro

Recently uploaded (20)

PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PPT
Teaching material agriculture food technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
A Presentation on Artificial Intelligence
PDF
KodekX | Application Modernization Development
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Network Security Unit 5.pdf for BCA BBA.
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Teaching material agriculture food technology
Chapter 3 Spatial Domain Image Processing.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Building Integrated photovoltaic BIPV_UPV.pdf
cuic standard and advanced reporting.pdf
MYSQL Presentation for SQL database connectivity
Machine learning based COVID-19 study performance prediction
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
A Presentation on Artificial Intelligence
KodekX | Application Modernization Development
Diabetes mellitus diagnosis method based random forest with bat algorithm
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Per capita expenditure prediction using model stacking based on satellite ima...
Digital-Transformation-Roadmap-for-Companies.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Review of recent advances in non-invasive hemoglobin estimation
Network Security Unit 5.pdf for BCA BBA.

Hack your way into

  • 2. $ whoami Akshay Pandurangi - @a_pandurangi Cyber Security Analyst Just a InfoSec learner! Few Acknowledgements
  • 4. WHAT IS HACKING? “Hacking” used to describe when a clever individual put computer parts (or anything really) together in a novel, unintended way that resulted in something cool or useful. It was used with a positive connotation. For example, Steve Wozniak, one of the original founders of Apple, was an exceptional hacker.
  • 5. WHAT PEOPLE THINK ABOUT HACKING? “hacking” – a blanket term readily used to encompass a whole range of attacks, from crashing a server to more sophisticated infiltration, such as stealing passwords. “hacking” is more frequently used to described discovering and taking advantage of a weakness in a computer system or network.
  • 6. NO, THIS ISN’T HACKING!
  • 7. HACKER? A person who enjoys learning the details of computer systems and how to stretch their capabilities One who programs enthusiastically or who enjoys programming rather than just theorizing about programming. All hacker are NOT BAD GUYS! Some of them are VIGILANTE!!!
  • 8. HACKERS OF A DIFFERENT CLASSES There are a large number of hacker classifications defining who hackers are and why they are hacking in the first place. WHITE HAT These guys do everything by the book. They have full, contractual permission to try and compromise a system. There are rules – white hats follow them. BLACK HAT These hackers are Bond villains. Black hat hacking is an illegal activity for some form of personal gain. GREY HAT Everything in-between. Most commonly, these guys hack something with whatever intentions… they leave identification mark!!
  • 9. HOW DO HACKERS HACK THE STUFF!
  • 10. HOW DO HACKERS HACK THE STUFF! Here is a step-by-step process for the easiest method to hack: 1. Ask the operator for the password. 2. Sign in. Seriously, Social Engineering is the key. Its the practice of manipulating people into divulging information. While a user may not intentionally give away the password, some guile, a little knowledge of human nature, and a touch of trickery are more than enough to get the access you need. Ok, ok, that’s cheating… but it works! Let’s have a look at the sample video.
  • 11. REWARDS OF SOCIAL ENGINEERING
  • 12. KNOWING THE TARGET! Facebook, Instagram & Twitter are Social Engineer's best friends! Collecting the socially available information from Public Resources pipl sync.me email-lookup by golookup
  • 14. LET’S PLAY WITH EMAILS@HACKING It’s a technique where the sender of an email has been changed to appear as someone else. This is done by simply forging the header of an email and changing the address in the “from” field. Requirement: access to a mail server with an open SMTP That’s it! So simple, isn’t it?
  • 15. DEMO Spoofing is the real beauty!
  • 16. PHISH THE TARGET Build a replica of a website and make your victim to access it If its looks fair enough as the actual website and earns your victim’s trust…Boom! You won!! Wait until victim logs-in and victim’s credentials now also belongs to you. Requirements: Replica of a target web-app & a Hosting space. Basic knowledge of PHP will be handy.
  • 17. DEMO Spoofing is the real beauty!
  • 18. SECURITY MANTRA: LEARN IT, TO AVOID IT!