Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Hacking Overview

No description
by

Phạm Toàn

on 11 December 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Hacking Overview

IMHO
VIETNAMESE HACKER
WHY I DO THIS SHIT?
HOW TO START
HOW TO BECOME HACKER
HARD WAY

THE TOUR GUIDE
Why this slide ?????
So many guys claim he/she is the tour guide :( But are they.......................................??????????????
Me?
CVE-2012-2044: Adobe Shockwave Player Interger Overflow Vulnerability
CVE-2012-5691: RealPlayer Buffer Overflow Vulnerability (http://www.metasploit.com/modules/exploit/windows/fileformat/real_player_url_property_bof)
CVE-2013-3145: Internet Explorer Memory Corruption
CVE-2013-3146: Internet Explorer Memory Corruption
CVE-2013-3151: Internet Explorer Memory Corruption
(https://technet.microsoft.com/en-us/security/bulletin/ms13-055)
CVE-2013-3142: Internet Explorer Memory Corruption
(http://technet.microsoft.com/en-us/security/bulletin/ms13-jun)
Offensive security
HERE WE GO......................
Offensive security
Defensive security
TARGET ENUMERATION...
NEVER UPDATE?
./msfconsole
LATEST UPDATE
0 day
PWN 1ST VICTIM
LEARN Using Public Hacking Tools
metasploit, imm canvas....
LEARN Exploit/Vuln Discovery
SOCIAL
RAT
LEARN Using Public RAT
Do the RAT yourself ^^
INVISIBILITY
Hide your ass
Firewall
Antivirus
How it works?
ESCALATE
LEARN Computer Network
YES.........

LET PROGRAMMING RULE :D
Protocol
Architecture
Design
PWN THEM ALL
TREASURE
JAIL?
Learn to clear your track...
DON'T ASK WHY YOU NEED TO LEARN EVERYTHING ANYMORE !!!!!
Defensive security
Hide sensitive information
DESIGN
ARCHITECTURE
USER AWERANES
LATEST UPDATE PLZ
PRAY...
FIGHTING YOURSELF
RE
ASM
COMP ARCH
TOOLS
BRAIN
FORENSIC
PROTOCOL
FILE/DISK/IMAGE
TOOLS
NEED SHERLOCK HOLMES?
SECURITY DESIGN
GET YOUR GUN READY...
VIETNAMESE COMMUNITY
THE END
Audit source code ( C/PHP/ASP...)
Audit Binary ( ASM...)
TECHNICAL
MUST HAVE/BASIC SKILLS:
Reverse Engineering
Coding C/C++ - Python/Perl/Ruby - ASM

Join our group on skype.
(toanpv88)
Practice CTF/Wargame


WE HAVE A TRANING DISCUSS ONLINE

User habit
User weakness
Phone call
SMS
....
Scan network
Scan operating system/version/services
Scan website
./sqli/lfi/rfi/bruteforce...
Full transcript