24
UNLOCK

cyber security & hacking

Embed Size (px)

Citation preview

Page 1: cyber security & hacking

UNLOCK

Page 2: cyber security & hacking

WELCOME TO HACKER WORLD

Page 3: cyber security & hacking

HACKING & SECURITY

WAGHMARE VISHAL

SEMINAR CONDUCTED BY:--

PEN TESTER & HACKER LINUX 7 ,CCNA (S&R), CEH ,CSCU

Mo.9764361472www.leetvilu.blogspot.in

Page 4: cyber security & hacking

HACKER

-------CRACKER ------- BAD GUY

HACKER---------GOOD GUY------

Page 5: cyber security & hacking

CONTENT

INTRODUCTION OF HACKER DARK NET HACKER REQUIREMENT HACKERS & TEAMS HACKING TYPES TYPES OF VIRUS HOW PROTECT HACKERS HOW TO PROTECT FROM HACKER

Page 6: cyber security & hacking

INTRODUCTION OF HACKING

WHITE HAT HACKER BLACK HAT HACKER GRAY HACKERS

HACKTIVISITS SPY HACKERS CYBER TERRORISTS

Page 7: cyber security & hacking

HACKING TEAM’S

Pakistani Haxors Crew – PHC Syrian Electronic Army Lizard Squad. LulzSec Anonymous Indian Hacker's Online Squad ( i-HO

S)

Page 8: cyber security & hacking

HACKED

https://www.quora.com/What-is-a-list-of-Pakistani-sites-hacked-by-Indian-hackers

https://hackerone.com/resources/hack-the-pentagonThe Pentagon websites were hacked by David

Dworken

Page 9: cyber security & hacking

HACKED

Hacked by indian hacker vilu

Page 10: cyber security & hacking

New Delhi:  Making a mockery of the India's cyber security, a group calling itself the Pakistan Cyber Army has hacked the website of the country's top investigating agency, the Central Bureau of Investigation (CBI).  The National Informatics Centre (NIC) has begun an enquiry.

HACKED

Page 11: cyber security & hacking

DARKNET

Page 12: cyber security & hacking

DARKNET TOR WORKING

ANONYMOUSLY FBI OFFER TO TO

R NORMAL USER A

ND TOR USERS EXPLORING THE

HIDEN NET USE OF DARK NET DARK NET USERS USE OF

DARKMARKET DRUGS MARKET WEAPANS MARKE

T

Tor

Page 13: cyber security & hacking

HACKER REQUIRMENT BASIC: NETWORKING LINUX , WINDOOWS BETTER LAPTOP HTML , PHP , PYTHON

,C ++, MYSQL

MANDATORY: WEAPAN: KALI LINUX ,

BACKTRACK ,PAROT OS

WINDOWS OS / RDP ,VPS /CLOUD SERVER

VPN HACKED WIFI EMAIL IDS GOOD

Page 14: cyber security & hacking

WEBSITE WEBSITE HACKING TYPES AND

DEMO :SQL INJECTIONBLIND INJECTIONNO DIRECTXSSDEFACE PAGESSHELLXPATHSOCIAL ENGIDDOS

Page 15: cyber security & hacking

VIRUS

RAT – REMOTE ACCESS TROGEN

REMOTE ACCESS DESKTOP WEB CAM ERA ACCESS REMOTE USE ROOT FILES REMOTELY ACCESS WHOLE

SYSTEM

Page 16: cyber security & hacking

VIRUS

PHONE HACKING

REMOTELY FILE ACCESS BROWSING DATA STOLEN CAMERA ACCESS PHONE LOCATION FIND REMOTELY SMS & CALL DAIL READ CONTACT SMS IMAGES AND VEDIO

Page 17: cyber security & hacking

CCTV HACKINGCCTV HACKING

REMOTE ACCESS CONTROL CCTV HACK LAN CCTV HACK WAN CCTV

Page 18: cyber security & hacking

WIFI HACKING

PHONE HACKING WPA WPS TESTER APK ANDRODUMPER AIRODUMPER-NG ,AIRCRACKER-

NG,WIFITE,REAVER WEP HACKING (Wired Equivalent Privacy) WPA 2 HACKING ( Wireless Protected Access)

PROTECT: USE MAC FILTER / MAC SPOOF STATIC IP MONITAR DEVICE APPS

Page 19: cyber security & hacking

PHISHING

SOCIAL NETWORK

BANKWEBSITES

SHADOWAVE.COM

WAPKA.MOBI

Page 20: cyber security & hacking

KEYLOGGER

PHONE HACKING KEYLOGGER DUMP

EACH AND EVRY KEY TYPED BY VICTIM.

SEND TO HACKER.SEND LOGIN DETAIL TO

HACKER.SEND USERNAME AND

PASSWORD STORED TO HACKER.

Page 21: cyber security & hacking

VPN

VIRTUAL PRIVATE NETWORK

USE VPN TO PROTECT YOUR IP WHILE USE NET

USE ANONYMUSX ADDON ON FIREFOX

CHANGE MAC

Page 22: cyber security & hacking

VIRUS SPREAD

BY IMAGE PDF APPLICATI

ON APK GIFT

IMAGE BY EMAILS FREE

TOOLS WEBSITE FREE WIFI FORUMS

Page 23: cyber security & hacking

HACKERS LANGUAGE TRANSLATION

HACKING IS

GOOD

H4ck||\|g 1$ 900d

Page 24: cyber security & hacking

THANKS YOU