Difference Between Hacking And Ethical Hacking Ppt Presentation

PowerPoint Presentation: Phishing Attack- Phishing is the act of attempting to acquire information such as username and passwords ( to create a phishing page i.e. Facebook, g-mail, bank credit cards page) by masquerading as a trustworthy entity in an electronic communication. Steps for hacking with phishing page- 1. Create your domain on web hosting site.

Open facebook now right click> view page source > copy 3. Open notepad> paste html code> find action on the code 4. Now in action type “ phish.php” and save as “index.html” 5. You need a php script. In script at location type and save this “phish.php” 6. Now upload “phish.php” & “index.html” on your web hosting server in “public.html” now the web hosting site or ftp server generate a link when you copy this link and paste in the url and hit enter it will show a fake page or phishing page which is look like a facebook login page. When someone will try to login in this fake page then his account will be hacked.

Password and e-mail of victim stored in the “log.txt” file in “public.html”. PowerPoint Presentation: Windows Hacking- Windows hacking is the practice of modifying windows operating system to accomplish a goal outside of the of the creator original purpose. Windows hacking is most common among teenagers and young adults, although there are many older hackers as well. Where The Windows Password Stores- windows users password stored in LM hash & NTLM hash formats in the SAM file. SAM file is Security Accounts Manager file.

Presentation (PDF Available). Difference between Hacker & Cracker. The paper also looks at ways in which future research could be looked into to help keep ethical hacking, ethical. Oct 15, 2016 - Contents:- What is Security Difference Between security and Protection Overview Of Hacking Hacker and Ethical Hacker Types Of.

Figure shows the SAM file Location. Windows hacking Techniques- Brute Force Attack- It is a trial-and-error method used to hack user’s passwords with using the Cain & Abel software.

Oph crack Cd- it is a live boot cd which crack the password of windows user when insert the oph cd during the time of booting process. With CMD- steps are given. > open cmd with administrator > type in cmd “ net user username * “ (without inverted commas.

In username type your PC (e.g. Ghost-PC) name. > type a password: > confirm password: The command runs successfully. PowerPoint Presentation: Key Stroke loggers Hacking- key stroke loggers are actually tools which record every movement of the keys in the keyboard. There are software and hardware keystroke loggers that records the movement of keys directly. For maintaining access and privilege escalation the hacker who is now inside the target network will upload the keystroke logging softwares in to the system. How It Works- Key logger is a virus when a hacker install it in your (victim) system then it (virus) captures every keystroke (and all the function which is done by the victim) & send it to the email id of the hacker in images and texts format.

Runs in invisible mode. Some Key Logger Software- 1. Ardamax Key Logger 2. Programma diagnostiki eberspacher edit in excel Ghost Key Logger 3. Golden Key Logger 4. Stealth Key Logger 5.

Actual Spy Key Logger. Usb dongle key. PowerPoint Presentation: Website Hacking- Hacking is an art to break into the password protected sections of the website. After entering into the website, the hacker can do anything. He can either change the content of the website or he can also add his own material into it. Or he can also change the password of your password protected areas of the site Apply Blind SQL Injection – SQL means structured query language. It is used for web application hacking method. Steps For Hacking- * Open the website u want to hack.

Provide wrong username-password. (e.g: Username - me and Password - ' or 1=1 --) An error occured saying wrong username-password. Now be prepared ur work starts from here. Right click anywhere on that page =>> go to view source.

* There u can see the html codings with javascripts. * Before this login information copy the url of the site in which you are. PowerPoint Presentation: >>>>>>>>>>>>>>> continue website hacking. Then delete the java script from the above that validates ur informaiton in the server.(Do this very carefully, ur success to hack the site depends upon this i.e how efficiently u delete the Javascripts that validate ur account information then look for.code.: input name='password' type='password' => replace there instead of. See there if maxlength of password is less than 11 then increase it to 11 (e.g: if then write Just go to file => save as and save it any where within the hardisk with ext.html(e.g:c:hack.html) Close your webpage and go to the webpage u save in your harddisk(e.g: c:hack.html) Open it. * U see that some changes in current page as compared to original One. * Provide any username[e.g:hacker] and password[e.g:' or 1=1 --] Congrats!U hav cracked the above website and entered into the account of 1st user saved in the server's database Check The vulnerability Of Websites- There are some software for checking vulnerabilities of the sites.