This document discusses the concept of ethical hacking. It defines ethical hacking as testing systems for security purposes, while distinguishing it from criminal hacking. It describes different types of hackers like white hat and black hat hackers. The document then covers various hacking techniques like email hacking through phishing and keyloggers, hacking Windows systems by exploiting the SAM database, and use of trojans for remote access or data theft. Prevention methods are also highlighted for some attacks.
2. CONTENTS
Concept of Ethical Hacking
Hacker
Email Hacking
Windows Hacking
Trojan
3. 1. CONCEPT OF ETHICAL HACKING
Ethical Hacking is testing the resources for a good
cause and for the betterment of technology.
Technically Ethical Hacking means penetration
testing which is focused on Securing and Protecting
IT Systems.
4. 1. CONCEPT OF ETHICAL HACKING
Introduction to Hacking:-
Its all about showing your Expertize.
5. 2. HACKER
Hacker is a word that has two
meanings:
who likes to play with Software or Electronic Systems.
Hackers enjoy Exploring and Learning how Computer systems
operate.
And second,
who maliciously breaks into systems , for personal gain.
Technically, these criminals are Crackers as Criminal Hackers.
6. TYPES OF HACKER
White Hat Hacker,
Who perform Ethical Hacking.
They are Security Professional.
Black Hat Hacker,
Perform Unehthical Hacking.
They are the Criminals hackers or Crackers who
use their skills and knowledge for illegal purpose.
17. EMAIL HACKING(CONT..)
Prevention against Phishing.
Read email carefully.
Watch the link carefully before you clicking.
During logged in session do not use any suspicious link.
Always check the URL before Signing In your a/c.
19. EMAIL HACKING(CONT..)
Some Famous Keyloggers
Actual Spy
Perfect Keylogger
Family Keylogger
Home Keylogger
Soft Central Keylogger
Adramax Keylogger
20. 4.WINDOWS HACKING AND SECURITY
Security architecture of Windows
LSA(local Security Authority)
SAM (Security Account Manager)
LSAUsername
Password
SAM
Authentication
Package
Logon Dialog
Key (In Hash Format)
User
a/c
databas
e
Query
Returns user’s SID
21. 4.WINDOWS HACKING AND SECURITY
Security architecture of Windows
SAM (Security Account Manager)
Location of a SAM file
C:WindowsSystem32Config
22. 4.WINDOWS HACKING AND SECURITY
Windows User Account Attacks
To check the User Account
net user
To Add a New User Account
net user username password /add
To Delete a User Account
net user username /delete
To change the Password of User Account
net user username *
.
23. 4.WINDOWS HACKING AND SECURITY
Windows User Account Attacks
Brute-force Method
Rainbow Table Attack(Oph Crack)
24. 4.WINDOWS HACKING AND SECURITY
Creating a Backdoor in window.
Sticky key Backdoor
25. 4.WINDOWS HACKING AND SECURITY
Steganography
Performing System Security
Application Monitoring
Process Monitoring
26. 5 .TROJANS
o What is Trojan?
o Different Types of Trojans
o Remote Administration Trojans
o Data Stealing Trojans
o Security Disabler Trojan