Difference Between Hacking And Ethical Hacking Ppt Presentation
PowerPoint Presentation: Phishing Attack- Phishing is the act of attempting to acquire information such as username and passwords ( to create a phishing page i.e. Facebook, g-mail, bank credit cards page) by masquerading as a trustworthy entity in an electronic communication.
Steps for hacking with phishing page- 1. Create your domain on web hosting site. Open facebook now right click> view page source > copy 3. Open notepad> paste html code> find action on the code 4. Now in action type “ phish.php” and save as “index.html” 5. Font keren untuk corel draw x4.
You need a php script. In script at location type and save this “phish.php” 6. Now upload “phish.php” & “index.html” on your web hosting server in “public.html” now the web hosting site or ftp server generate a link when you copy this link and paste in the url and hit enter it will show a fake page or phishing page which is look like a facebook login page. When someone will try to login in this fake page then his account will be hacked. Password and e-mail of victim stored in the “log.txt” file in “public.html”. PowerPoint Presentation: Windows Hacking- Windows hacking is the practice of modifying windows operating system to accomplish a goal outside of the of the creator original purpose.
Windows hacking is most common among teenagers and young adults, although there are many older hackers as well. Where The Windows Password Stores- windows users password stored in LM hash & NTLM hash formats in the SAM file. SAM file is Security Accounts Manager file. Figure shows the SAM file Location. Windows hacking Techniques- Brute Force Attack- It is a trial-and-error method used to hack user’s passwords with using the Cain & Abel software.
Oph crack Cd- it is a live boot cd which crack the password of windows user when insert the oph cd during the time of booting process. With CMD- steps are given. > open cmd with administrator > type in cmd “ net user username * “ (without inverted commas. In username type your PC (e.g. Ghost-PC) name. > type a password: > confirm password: The command runs successfully. PowerPoint Presentation: Key Stroke loggers Hacking- key stroke loggers are actually tools which record every movement of the keys in the keyboard.
May 17, 2013 - Hack for Security only concentrates on white-hat hacking and help you to learn the Ethical Hacking world. Black Hat Hacker(hackers): BlackHat.
There are software and hardware keystroke loggers that records the movement of keys directly. For maintaining access and privilege escalation the hacker who is now inside the target network will upload the keystroke logging softwares in to the system. How It Works- Key logger is a virus when a hacker install it in your (victim) system then it (virus) captures every keystroke (and all the function which is done by the victim) & send it to the email id of the hacker in images and texts format. Runs in invisible mode. Some Key Logger Software- 1.
Ardamax Key Logger 2. Ghost Key Logger 3. Golden Key Logger 4. Stealth Key Logger 5. Actual Spy Key Logger.
PowerPoint Presentation: Website Hacking- Hacking is an art to break into the password protected sections of the website. After entering into the website, the hacker can do anything. He can either change the content of the website or he can also add his own material into it. Or he can also change the password of your password protected areas of the site Apply Blind SQL Injection – SQL means structured query language. Undercover girl book.