WEBSITE ETHICAL HACKING AND TESTING
SUMMER TRAINING PROJECT
CHANDIGARH UNIVERSITY
SUBMITTED BY:
NAME: KARAN JINDAL
UID: 17BCS3171
A LIST OF DIVISIONS
 What is hacking and ethical hacking?
 Subdivision of hacking.
 Information Gathering.
 Google Hacking
 Website Testing
 Testing Techniques
 Proxy
What is hacking?
Hacking is an shot to exploit a digital computer or into a private network inside a computer.
Simply put it is gaining unauthorised access to take some personal information for some
wrongful purpose.
What is ethical hacking?
Ethical hacking refers to the act of locating weaknesses and vulnerabilities of computer and
information systems by duplicating the intent and actions of malicious hackers. Ethical hacking
is also known as penetration testing, intrusion testing, or red teaming.
What are benefits of ethical hacking?
The primary benefit of ethical hacking is to prevent data from being stolen and misused by
malicious attackers, as well as:
• Discovering vulnerabilities • Implementing a secure network
• Defending national security• Gaining trust of customers and investors
Categories of HACKING
INFORMATION GATHERNING
Information Gathering and getting to know the target systems is the first process in ethical hacking.
Reconnaissance is a set of processes and techniques ( Foot-printing , Scanning & Enumeration) used to
covertly discover and collect information about a target system.
There are many ways to know about the target system’s services ,like
 Social engineering
 “Whois.com”
 “Pipl.com”
 “archive.org”
 “reverseip.domaintools.com”
“Whois.com”
This website provides all the details of the target domain like owner e-mail, phone number,
server names, registration services etc.
“archive.org”
This domain provides all the previous snapshots of the target domain since the
website was first updated, these screen shots help hacker to know about the
details of the website that were updated.
Domain name to
gather information
About.
This shows the
changes made
on domain.
GOOGLE DORKING
Google hacking involves using advanced operators in the Google search
engine to locate specific strings of text within search results.
The commonly used operators are like :
 Intitle:
 Inurl:
 Site:
 url:
 Filetype:
Google hacking database (GHDB) is a website which contains all the dorks
that are used to know more about google hacking.
GOOGLE DORKING EXAMPLES:
z
WEBSITE TESTING
Website testing is basically getting into website in a way a hacker
can gain access to website database or make changes to website
illegally and then closing all the ways to get hacker into it.
z
HOW A HACKER CAN GET INTO WEBSITE?
z
SQL INJECTION
SQL injection is a code injection technique, used to attack data-
driven applications, in which malicious SQL statements are inserted
into an entry field for execution.
z
 SQL Injection Based on 1=1 is Always True
 SQL Injection Based on ""="" is Always True
z
DISTRIBUTED-DOS ATTACK
DDoS is short for Distributed Denial of Service. DDoS is a type of DOS
attack where multiple compromised systems, are used to target a
single system causing a Denial of Service (DoS) attack.
z
z
TOOLS FOR DOS ATTACK
 LOIC (Low Orbit Ion Canon)
 XOIC
 HOIC
 JMETER
 HP LOADRUNNER
z
LOIC
z
How to know that website is attacked?
 “uptimerobot.com”
 “Cloudflare.com”
 “Sucuri.net”
PREVENTION OF DENIAL OF SERVICE ATTACK
• By more bandwidth.
• Build redundancy into infrastructure.
• Firewall.
• Internet service provider(ISP).
• Protect your DNS server.
z
PROXY
Website ethical hacking and testing

More Related Content

PPTX
PPTX
Hacking vs cracking
PPTX
DeepPhish: Simulating malicious AI
PPTX
Threat Intelligence Data Collection & Acquisition
PPTX
black hat deephish
PDF
OSINT Basics for Threat Hunters and Practitioners
PPTX
ETHICAL HACKING PPT
Hacking vs cracking
DeepPhish: Simulating malicious AI
Threat Intelligence Data Collection & Acquisition
black hat deephish
OSINT Basics for Threat Hunters and Practitioners
ETHICAL HACKING PPT

What's hot (20)

PPTX
Ethical hacking
PPTX
Nmapper theHarvester OSINT Tool explanation
PPTX
Presentation1
PPT
Security and trust. gabriel waller, nokia siemens networks.
PDF
Open Source Information Gathering Brucon Edition
PDF
Investigating, Mitigating and Preventing Cyber Attacks with Security Analytics
PPTX
ETHICAL HACKING BY HRITIK JAGE
PPTX
Classifying Phishing URLs Using Recurrent Neural Networks
PDF
[CB20] Illicit QQ Communities: What's Being Shared? by Aaron Shraberg
PDF
Ethical hacking interview questions and answers
PPTX
PDF
What you need to know about OSINT
PDF
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
PDF
[CB20] Operation Chimera - APT Operation Targets Semiconductor Vendors by CK ...
PDF
InfoSec Monthly News Recap: April 2017
DOCX
FBI & Secret Service- Business Email Compromise Workshop
PPTX
PHISHING DETECTION
PPTX
ETHICAL HACKING
PPTX
Information gathering
PDF
Stop pulling the plug
Ethical hacking
Nmapper theHarvester OSINT Tool explanation
Presentation1
Security and trust. gabriel waller, nokia siemens networks.
Open Source Information Gathering Brucon Edition
Investigating, Mitigating and Preventing Cyber Attacks with Security Analytics
ETHICAL HACKING BY HRITIK JAGE
Classifying Phishing URLs Using Recurrent Neural Networks
[CB20] Illicit QQ Communities: What's Being Shared? by Aaron Shraberg
Ethical hacking interview questions and answers
What you need to know about OSINT
Getting Started With Hacking Android & iOS Apps? Tools, Techniques and resources
[CB20] Operation Chimera - APT Operation Targets Semiconductor Vendors by CK ...
InfoSec Monthly News Recap: April 2017
FBI & Secret Service- Business Email Compromise Workshop
PHISHING DETECTION
ETHICAL HACKING
Information gathering
Stop pulling the plug

Similar to Website ethical hacking and testing (20)

PPT
Ethical Hacking and Network Security
PPT
C:\Fakepath\Ethical Hacking
PPTX
Presentation on ethical hacking
PPTX
Ethical Hacking justvamshi .pptx
PPTX
Ethical_Hacking_XP_Overview202583291.pptx
PPTX
unit-1.pptx
PPTX
GEC-LIE Chapter-3.-Lesson-5-Hacking.pptx
PPTX
Ethical hacking : Its methodologies and tools
PDF
CITEC #CON2-Dirty Attack with Google Hacking
PPTX
Engineering report ca2_Kritakbiswas.pptx
PPTX
Ethical Hacking.pptx
PPTX
Parag presentation on ethical hacking
PDF
What is ethical hacking and complete cyber security presentation on this file
PPTX
building foundation for ethical hacking.ppt
PPT
Ethical Hacking
PPTX
Ethical hacking
PPTX
Ethical hacking
PPT
Ethical hacking Book Review
PPTX
How to hack or what is ethical hacking
PDF
Lord of the bing b-sides atl
Ethical Hacking and Network Security
C:\Fakepath\Ethical Hacking
Presentation on ethical hacking
Ethical Hacking justvamshi .pptx
Ethical_Hacking_XP_Overview202583291.pptx
unit-1.pptx
GEC-LIE Chapter-3.-Lesson-5-Hacking.pptx
Ethical hacking : Its methodologies and tools
CITEC #CON2-Dirty Attack with Google Hacking
Engineering report ca2_Kritakbiswas.pptx
Ethical Hacking.pptx
Parag presentation on ethical hacking
What is ethical hacking and complete cyber security presentation on this file
building foundation for ethical hacking.ppt
Ethical Hacking
Ethical hacking
Ethical hacking
Ethical hacking Book Review
How to hack or what is ethical hacking
Lord of the bing b-sides atl

Recently uploaded (20)

PDF
Hindi spoken digit analysis for native and non-native speakers
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Abstractive summarization using multilingual text-to-text transfer transforme...
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PDF
STKI Israel Market Study 2025 version august
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PPTX
The various Industrial Revolutions .pptx
DOCX
search engine optimization ppt fir known well about this
PPTX
Configure Apache Mutual Authentication
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
sbt 2.0: go big (Scala Days 2025 edition)
Hindi spoken digit analysis for native and non-native speakers
Module 1.ppt Iot fundamentals and Architecture
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Getting started with AI Agents and Multi-Agent Systems
Abstractive summarization using multilingual text-to-text transfer transforme...
Custom Battery Pack Design Considerations for Performance and Safety
A review of recent deep learning applications in wood surface defect identifi...
Credit Without Borders: AI and Financial Inclusion in Bangladesh
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Chapter 5: Probability Theory and Statistics
STKI Israel Market Study 2025 version august
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
The various Industrial Revolutions .pptx
search engine optimization ppt fir known well about this
Configure Apache Mutual Authentication
Benefits of Physical activity for teenagers.pptx
Developing a website for English-speaking practice to English as a foreign la...
Consumable AI The What, Why & How for Small Teams.pdf
sbt 2.0: go big (Scala Days 2025 edition)

Website ethical hacking and testing

  • 1. WEBSITE ETHICAL HACKING AND TESTING SUMMER TRAINING PROJECT CHANDIGARH UNIVERSITY SUBMITTED BY: NAME: KARAN JINDAL UID: 17BCS3171
  • 2. A LIST OF DIVISIONS  What is hacking and ethical hacking?  Subdivision of hacking.  Information Gathering.  Google Hacking  Website Testing  Testing Techniques  Proxy
  • 3. What is hacking? Hacking is an shot to exploit a digital computer or into a private network inside a computer. Simply put it is gaining unauthorised access to take some personal information for some wrongful purpose. What is ethical hacking? Ethical hacking refers to the act of locating weaknesses and vulnerabilities of computer and information systems by duplicating the intent and actions of malicious hackers. Ethical hacking is also known as penetration testing, intrusion testing, or red teaming.
  • 4. What are benefits of ethical hacking? The primary benefit of ethical hacking is to prevent data from being stolen and misused by malicious attackers, as well as: • Discovering vulnerabilities • Implementing a secure network • Defending national security• Gaining trust of customers and investors
  • 6. INFORMATION GATHERNING Information Gathering and getting to know the target systems is the first process in ethical hacking. Reconnaissance is a set of processes and techniques ( Foot-printing , Scanning & Enumeration) used to covertly discover and collect information about a target system. There are many ways to know about the target system’s services ,like  Social engineering  “Whois.com”  “Pipl.com”  “archive.org”  “reverseip.domaintools.com”
  • 7. “Whois.com” This website provides all the details of the target domain like owner e-mail, phone number, server names, registration services etc.
  • 8. “archive.org” This domain provides all the previous snapshots of the target domain since the website was first updated, these screen shots help hacker to know about the details of the website that were updated. Domain name to gather information About. This shows the changes made on domain.
  • 9. GOOGLE DORKING Google hacking involves using advanced operators in the Google search engine to locate specific strings of text within search results. The commonly used operators are like :  Intitle:  Inurl:  Site:  url:  Filetype:
  • 10. Google hacking database (GHDB) is a website which contains all the dorks that are used to know more about google hacking.
  • 12. z WEBSITE TESTING Website testing is basically getting into website in a way a hacker can gain access to website database or make changes to website illegally and then closing all the ways to get hacker into it.
  • 13. z HOW A HACKER CAN GET INTO WEBSITE?
  • 14. z SQL INJECTION SQL injection is a code injection technique, used to attack data- driven applications, in which malicious SQL statements are inserted into an entry field for execution.
  • 15. z  SQL Injection Based on 1=1 is Always True  SQL Injection Based on ""="" is Always True
  • 16. z DISTRIBUTED-DOS ATTACK DDoS is short for Distributed Denial of Service. DDoS is a type of DOS attack where multiple compromised systems, are used to target a single system causing a Denial of Service (DoS) attack.
  • 17. z
  • 18. z TOOLS FOR DOS ATTACK  LOIC (Low Orbit Ion Canon)  XOIC  HOIC  JMETER  HP LOADRUNNER
  • 20. z How to know that website is attacked?  “uptimerobot.com”  “Cloudflare.com”  “Sucuri.net” PREVENTION OF DENIAL OF SERVICE ATTACK • By more bandwidth. • Build redundancy into infrastructure. • Firewall. • Internet service provider(ISP). • Protect your DNS server.