Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Ethical Hacking and Information Security

Workshops and Seminars - ToC
by

Gundeep Bindra

on 20 August 2011

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Ethical Hacking and Information Security

Ethical Hacking and
Information Technology
by
Gundeep Bindra
A Hacker
is a person who breaks into computers and computer networks for profit, in protest, or because they are motivated by the challenge. The subculture that has evolved around hackers is often referred to as the computer underground but it is now an open community.
Gundeep Bindra
Computer Science Engineer
Mail |
mailbox@gundeepbindra.com
Contact |
+91-9711149967
Website |
http://www.gundeepbindra.com
Types of hackers
White Hat
Black Hat
Grey Hat
Blue Hat
or the "Computer security experts"
or the "Computer Criminal"
combination of WH and BH
or a Bug Tester
Phases of Hacking
Reconnaissance
Scanning
Gaining Access
Maintaining Access
Covering Tracks
Proxy
IP Address
MAC Address
Port Number
Ethical Hacking
Website Hacking
Windows Hacking
EMail Hacking
Cyber Forensics and Investigation
I. Tracing an IP Address
netstat -n
Traceroute
IP Spoofing
MAC Spoofing
InfoBear.com, ZoneEdit.com, WHOIS
NeoTracePro, eMailTrackerPro, SamSpade, ZoneAlarm, Black Ice
Proxy
technitium
Squid(Linux), Wingate and MultiProxy (Windows)
192.168.1.2
80: HTTP
20 and 21: FTP
01:23:45:67:89:ab
II. Preparing an Attack and Scanning Methodologies
ping
Softwares: nmap, SuperScan, WS_Ping_ProPack
Scanning
Softwares: Scanlogd, NukeNabber, GFI Languard
TCP and UDP
Keyloggers and Trojans
Softwares:
Countermeasures
I. Input Validation Attacks
SQL Injection
Magic Password
Demo
Countermeasures
REAK
B
--
--
I. Admin Passwords
Live CD
L0phtcrack
Countermeasures
I. Tracing Emails
II. Phishing attacks
III. Email Forging
Introduction
Email Headers
Tracing an Email on the Internet
Countermeasures
Making fake pages
keyloggers to hack mail ids
Social Engineering
Countermeasures
Email Threats
The CC & BCC Fields
Demo
Countermeasures
Cyber Forensics and Investigation
Penetration Testing and Vulnerability Assessment
Thumbs.db
Softwares: GFI Languard, Nessus
Cyber Law
IT Act 2000
Thank You
Gundeep Bindra
by
mailbox@gundeepbindra.com
+91-9711149967
www.gundeepbindra.com
GOD BLESS !!
Full transcript