KEMBAR78
ethical-hacking-18092013112412-ethical-hacking.ppt
Ethical Hacking
http://studygalaxy.com/
What is Hacking ???
 Hacking is unauthorized use of computer
and network resources. (The term
"hacker" originally meant a very gifted
programmer. In recent years though, with
easier access to multiple systems, it now
has negative implications.)
Type of Hackers
 Script Kiddies or Cyber-Punks: Between age
12-30; bored in school; get caught due to
bragging online .
 Professional Criminals or Crackers: Make a
living by breaking into systems and selling the
information.
 Coders and Virus Writers: These have strong
programming background and write code but
won’t use it themselves; have their own
networks called “zoos”; leave it to others to
release their code into “The Wild” or Internet.
What do Hackers do?
 A few examples of Web application hacks
 File Query
 Browser caching
 Cookie and URL hacks
 SQL Injection
 Cross-site Scripting (# 1 threat today!)
Web File Query
 A hacker tests for HTTP (80) or HTTPS
(443)
 Does a “View Source” on HTML file to
detect directory hierarchy
 Can view sensitive information left by
system administrators or programmers
 Database passwords in /include files
Browser Page Caching
 Be aware of differences between
browsers!
 Pages with sensitive data should not be
cached: page content is easily accessed
using browser’s history
Cookies and URLs
 Sensitive data in cookies and URLs?
 Issues that arise are:
 Information is stored on a local computer (as files
or in the browser’s history)
 Unencrypted data can be intercepted on the
network and/or logged into unprotected web log
files
SQL Injection Attacks
 SQL injection is a security vulnerability
that occurs in the database layer of an
application. Its source is the incorrect
escaping of dynamically-generated string
literals embedded in SQL statements.
Cross-Site Scripting (XSS)
Attacks
 Malicious code can secretly gather
sensitive data from user while using
authentic website (login, password,
cookie)
What is Ethical Hacking ??
 Ethical hacking – defined “methodology adopted
by ethical hackers to discover the harmed
existing in information systems’ of operating
environments.”
 With the growth of the Internet, computer security has
become a major concern for businesses and
governments.
 In their search for a way to approach the problem,
organizations came to realize that one of the best
ways to evaluate the unwanted threat to their
interests would be to have independent computer
security professionals attempt to break into their
computer systems.
Who are Ethical Hackers?
 “One of the best ways to evaluate the intruder threat is to have an
independent computer security professionals attempt to break their
computer systems”
 Successful ethical hackers possess a variety of skills. First and
foremost, they must be completely trustworthy.
 Ethical hackers typically have very strong programming and
computer networking skills.
 They are also adept at installing and maintaining systems that use
the more popular operating systems (e.g., Linux or Windows 2000)
used on target systems.
 These base skills are detailed knowledge of the hardware and
software provided by the more popular computer and networking
hardware vendors.
What do Ethical Hackers do?
 An ethical hacker’s evaluation of a system’s security
seeks answers to these basic questions:
 What can an intruder see on the target systems?
 What can an intruder do with that information?
 Does anyone at the target notice the intruder’s at
tempts or successes?
 What are you trying to protect?
 What are you trying to protect against?
 How much time, effort, and money are you willing to
expend to obtain adequate protection?
Required Skills of an Ethical
Hacker
 Routers: knowledge of routers, routing protocols, and
access control lists
 Microsoft: skills in operation, configuration and
management.
 Linux: knowledge of Linux/Unix; security setting,
configuration, and services.
 Firewalls: configurations, and operation of intrusion
detection systems.
 Mainframes : knowledge of mainframes .
 Network Protocols: TCP/IP; how they function and can
be manipulated.
 Project Management: knowledge of leading, planning,
organizing, and controlling a penetration testing team.
Hacker Classes
 Hacker classes
 Black hats – highly skilled,
 malicious, destructive “crackers”
 White hats – skills used for
 defensive security analysts
 Gray hats – offensively and
 defensively; will hack for different
 reasons, depends on situation.
 Hactivism – hacking for social and political cause.
 Ethical hackers – determine what attackers can gain
access to, what they will do with the information, and can
they be detected.
NOW
Some practical Knowledge
How to hack any thing ????
How to hack Windows-XP
Passwords
 Simple User Password :-
simply boot the System and press
keyboard key “F8”. After this start the
system in safe made .And open the
Control panel-->User Accountchange or
remove the password.
How to hack Windows-XP
Passwords
 Administrator Password:-
Methods
The Administrator Password is
hack or crack by two methods :--
1). With the help of Bootable windows XP
CD.
2). By modify the the system File and
directory Structure of operating System.
How to hack Windows-XP
Passwords
 With the help of Bootable CD :-
step 1. Windows XP CD in your cd-rom/DVD and start
your computer .
step 2. When you get to the Welcome to Setup screen,
press ENTER to Setup Windows now .
step 3. The next screen is the Setup screen which gives
you the option to do a Repair .
step 4. Let the Repair run. Setup will now check your
disks and then start copying files which can take several
minutes.
How to hack Windows-XP
Passwords
Step 5. Shortly after the Copying Files stage, you will be
required to reboot .
Step 6. after restarting ,setup will resume automatically with
the standard billboard screens and you will notice
Installing Windows is highlighted.
Step 7. Keep your eye on the lower left hand side of the
screen and when you see the Installing Devices
progress bar, press SHIFT + F10 .
Step 8. This is the security hole! A command console will
now open up giving you the potential for wide
access to your system.
Step 9. At the prompt, type NUSRMGR.CPL and press
Enter. You have just gained graphical access to
your User Accounts in the Control Panel.
How to hack Windows-XP
Passwords
Step 10. Now simply pick the account you need to change
and remove or change your password as you prefer .
Step 11. After you’ve made your changes close the
windows, exit the command box and continue on with
the Repair .
Step 12. Once the Repair is done, you will be able to log on
with your new password (or without a password if you
chose not to use one or if you chose not to be asked for
a password).
How to hack Windows-XP
Passwords
By modify the the system File and
directory Structure of operating
System:-
In this trick we simply log in the windows
And make some changes in the in
system32 folder of windows directory .
How to hack Windows-XP
Passwords
Steps for hack Administrator password:-
1) Log in and open the command prompt and enter the command
exactly .
2) C:Documents and Settingsraj>cd
3) C:cd windows
4) C:windows>cd system32
5) C:windows>cd system32>mkdir temphack
6) C:windows>cd system32>copy logon.scr temphacklogon.scr
7) C:windows>cd system32>copy cmd.exe temphackcmd.exe
8) C:windows>cd system32>del logon.scr
9) Exit
How to hack Windows-XP
Passwords
After executing these command again open
the command prompt and type the
command:-
(if admin name is raj )
C:Documents and Settingsraj>”net user raj 1234”
where “1234” is the nw changed admin password .
Web Hacking
How to hack Yahoo Password!!
This is how it is done :-
Step 1. Log in to your own yahoo account. Note: Your
account must be at : least 30 days old for this to
work.
Step 2. Once you have logged into your own account,
compose/write an e-mail : to:
email_pwd_service@yahoo.com
Step 3. In the subject line type exactly: password retrieve
Step 4. On the first line of your mail write the email address
of the person : you are hacking
Step 5. On the second line type in the e-mail address that
you are using
How to hack Yahoo Password!!
Step 7.On the third line type in the password to YOUR
email address . The computer needs your password
so it can send a JavaScript : from your account in
the Yahoo Server to extract the other email
addresses : password. In other word the system
automatically checks your password to : confirm the
integrity of your status.
Step 8. The final step before sending the mail is, : type on
the fourth line the following code exactly: cgi
bin/$et76431&%20auto20%mail/pass%30send%30p
wrsa
Step 9. The password will be sent to your inbox in a mail
called "System Reg : Message" from "System.
Usually within 1 hour.
How to hack Yahoo Password!!
Any Questions???
Or
suggestions???
ethical-hacking-18092013112412-ethical-hacking.ppt

ethical-hacking-18092013112412-ethical-hacking.ppt

  • 1.
  • 2.
    What is Hacking???  Hacking is unauthorized use of computer and network resources. (The term "hacker" originally meant a very gifted programmer. In recent years though, with easier access to multiple systems, it now has negative implications.)
  • 3.
    Type of Hackers Script Kiddies or Cyber-Punks: Between age 12-30; bored in school; get caught due to bragging online .  Professional Criminals or Crackers: Make a living by breaking into systems and selling the information.  Coders and Virus Writers: These have strong programming background and write code but won’t use it themselves; have their own networks called “zoos”; leave it to others to release their code into “The Wild” or Internet.
  • 4.
    What do Hackersdo?  A few examples of Web application hacks  File Query  Browser caching  Cookie and URL hacks  SQL Injection  Cross-site Scripting (# 1 threat today!)
  • 5.
    Web File Query A hacker tests for HTTP (80) or HTTPS (443)  Does a “View Source” on HTML file to detect directory hierarchy  Can view sensitive information left by system administrators or programmers  Database passwords in /include files
  • 6.
    Browser Page Caching Be aware of differences between browsers!  Pages with sensitive data should not be cached: page content is easily accessed using browser’s history
  • 7.
    Cookies and URLs Sensitive data in cookies and URLs?  Issues that arise are:  Information is stored on a local computer (as files or in the browser’s history)  Unencrypted data can be intercepted on the network and/or logged into unprotected web log files
  • 8.
    SQL Injection Attacks SQL injection is a security vulnerability that occurs in the database layer of an application. Its source is the incorrect escaping of dynamically-generated string literals embedded in SQL statements.
  • 9.
    Cross-Site Scripting (XSS) Attacks Malicious code can secretly gather sensitive data from user while using authentic website (login, password, cookie)
  • 10.
    What is EthicalHacking ??  Ethical hacking – defined “methodology adopted by ethical hackers to discover the harmed existing in information systems’ of operating environments.”  With the growth of the Internet, computer security has become a major concern for businesses and governments.  In their search for a way to approach the problem, organizations came to realize that one of the best ways to evaluate the unwanted threat to their interests would be to have independent computer security professionals attempt to break into their computer systems.
  • 11.
    Who are EthicalHackers?  “One of the best ways to evaluate the intruder threat is to have an independent computer security professionals attempt to break their computer systems”  Successful ethical hackers possess a variety of skills. First and foremost, they must be completely trustworthy.  Ethical hackers typically have very strong programming and computer networking skills.  They are also adept at installing and maintaining systems that use the more popular operating systems (e.g., Linux or Windows 2000) used on target systems.  These base skills are detailed knowledge of the hardware and software provided by the more popular computer and networking hardware vendors.
  • 12.
    What do EthicalHackers do?  An ethical hacker’s evaluation of a system’s security seeks answers to these basic questions:  What can an intruder see on the target systems?  What can an intruder do with that information?  Does anyone at the target notice the intruder’s at tempts or successes?  What are you trying to protect?  What are you trying to protect against?  How much time, effort, and money are you willing to expend to obtain adequate protection?
  • 13.
    Required Skills ofan Ethical Hacker  Routers: knowledge of routers, routing protocols, and access control lists  Microsoft: skills in operation, configuration and management.  Linux: knowledge of Linux/Unix; security setting, configuration, and services.  Firewalls: configurations, and operation of intrusion detection systems.  Mainframes : knowledge of mainframes .  Network Protocols: TCP/IP; how they function and can be manipulated.  Project Management: knowledge of leading, planning, organizing, and controlling a penetration testing team.
  • 14.
    Hacker Classes  Hackerclasses  Black hats – highly skilled,  malicious, destructive “crackers”  White hats – skills used for  defensive security analysts  Gray hats – offensively and  defensively; will hack for different  reasons, depends on situation.  Hactivism – hacking for social and political cause.  Ethical hackers – determine what attackers can gain access to, what they will do with the information, and can they be detected.
  • 15.
    NOW Some practical Knowledge Howto hack any thing ????
  • 16.
    How to hackWindows-XP Passwords  Simple User Password :- simply boot the System and press keyboard key “F8”. After this start the system in safe made .And open the Control panel-->User Accountchange or remove the password.
  • 17.
    How to hackWindows-XP Passwords  Administrator Password:- Methods The Administrator Password is hack or crack by two methods :-- 1). With the help of Bootable windows XP CD. 2). By modify the the system File and directory Structure of operating System.
  • 18.
    How to hackWindows-XP Passwords  With the help of Bootable CD :- step 1. Windows XP CD in your cd-rom/DVD and start your computer . step 2. When you get to the Welcome to Setup screen, press ENTER to Setup Windows now . step 3. The next screen is the Setup screen which gives you the option to do a Repair . step 4. Let the Repair run. Setup will now check your disks and then start copying files which can take several minutes.
  • 19.
    How to hackWindows-XP Passwords Step 5. Shortly after the Copying Files stage, you will be required to reboot . Step 6. after restarting ,setup will resume automatically with the standard billboard screens and you will notice Installing Windows is highlighted. Step 7. Keep your eye on the lower left hand side of the screen and when you see the Installing Devices progress bar, press SHIFT + F10 . Step 8. This is the security hole! A command console will now open up giving you the potential for wide access to your system. Step 9. At the prompt, type NUSRMGR.CPL and press Enter. You have just gained graphical access to your User Accounts in the Control Panel.
  • 20.
    How to hackWindows-XP Passwords Step 10. Now simply pick the account you need to change and remove or change your password as you prefer . Step 11. After you’ve made your changes close the windows, exit the command box and continue on with the Repair . Step 12. Once the Repair is done, you will be able to log on with your new password (or without a password if you chose not to use one or if you chose not to be asked for a password).
  • 21.
    How to hackWindows-XP Passwords By modify the the system File and directory Structure of operating System:- In this trick we simply log in the windows And make some changes in the in system32 folder of windows directory .
  • 22.
    How to hackWindows-XP Passwords Steps for hack Administrator password:- 1) Log in and open the command prompt and enter the command exactly . 2) C:Documents and Settingsraj>cd 3) C:cd windows 4) C:windows>cd system32 5) C:windows>cd system32>mkdir temphack 6) C:windows>cd system32>copy logon.scr temphacklogon.scr 7) C:windows>cd system32>copy cmd.exe temphackcmd.exe 8) C:windows>cd system32>del logon.scr 9) Exit
  • 23.
    How to hackWindows-XP Passwords After executing these command again open the command prompt and type the command:- (if admin name is raj ) C:Documents and Settingsraj>”net user raj 1234” where “1234” is the nw changed admin password .
  • 24.
  • 25.
    How to hackYahoo Password!! This is how it is done :- Step 1. Log in to your own yahoo account. Note: Your account must be at : least 30 days old for this to work. Step 2. Once you have logged into your own account, compose/write an e-mail : to: email_pwd_service@yahoo.com Step 3. In the subject line type exactly: password retrieve Step 4. On the first line of your mail write the email address of the person : you are hacking Step 5. On the second line type in the e-mail address that you are using
  • 26.
    How to hackYahoo Password!! Step 7.On the third line type in the password to YOUR email address . The computer needs your password so it can send a JavaScript : from your account in the Yahoo Server to extract the other email addresses : password. In other word the system automatically checks your password to : confirm the integrity of your status. Step 8. The final step before sending the mail is, : type on the fourth line the following code exactly: cgi bin/$et76431&%20auto20%mail/pass%30send%30p wrsa Step 9. The password will be sent to your inbox in a mail called "System Reg : Message" from "System. Usually within 1 hour.
  • 27.
    How to hackYahoo Password!!
  • 28.