23
UNLOCK

Hacking & cyber Security

Embed Size (px)

Citation preview

Page 1: Hacking & cyber Security

UNLOCK

Page 2: Hacking & cyber Security

WELCOME TO HACKER WORLD

Page 3: Hacking & cyber Security

HACKING & SECURITY

WAGHMARE VISHAL

SEMINAR CONDUCTED BY:--

PEN TESTER & HACKER LINUX 7 ,CCNA (S&R), CEH ,CSCU

Mo.9764361472www.leetvilu.blogspot.in

Page 4: Hacking & cyber Security

HACKER

-------CRACKER ------- BAD GUY

HACKER---------GOOD GUY------

Page 5: Hacking & cyber Security

CONTENT

INTRODUCTION OF HACKER DARK NET HACKER REQUIREMENT HACKERS & TEAMS HACKING TYPES TYPES OF VIRUS HOW PROTECT HACKERS HOW TO PROTECT FROM HACKER

Page 6: Hacking & cyber Security

INTRODUCTION OF HACKING

WHITE HAT HACKER BLACK HAT HACKER GRAY HACKERS

HACKTIVISITS SPY HACKERS CYBER TERRORISTS

Page 7: Hacking & cyber Security

HACKING TEAM’S

Pakistani Haxors Crew – PHC Syrian Electronic Army Lizard Squad. LulzSec Anonymous Indian Hacker's Online Squad ( i-HO

S)

Page 8: Hacking & cyber Security

HACKED

https://www.quora.com/What-is-a-list-of-Pakistani-sites-hacked-by-Indian-hackers

https://hackerone.com/resources/hack-the-pentagonThe Pentagon websites were hacked by David

Dworken

Page 9: Hacking & cyber Security

HACKED

Hacked by indian hacker vilu

Page 10: Hacking & cyber Security

New Delhi:  Making a mockery of the India's cyber security, a group calling itself the Pakistan Cyber Army has hacked the website of the country's top investigating agency, the Central Bureau of Investigation (CBI).  The National Informatics Centre (NIC) has begun an enquiry.

HACKED

Page 11: Hacking & cyber Security

DARKNET

Page 12: Hacking & cyber Security

DARKNET TOR WORKING

ANONYMOUSLY FBI OFFER TO TO

R NORMAL USER A

ND TOR USERS EXPLORING THE

HIDEN NET USE OF DARK NET DARK NET USERS USE OF

DARKMARKET DRUGS MARKET WEAPANS MARKE

T

Tor

Page 13: Hacking & cyber Security

HACKER REQUIRMENT BASIC: NETWORKING LINUX , WINDOOWS BETTER LAPTOP HTML , PHP , PYTHON

,C ++, MYSQL

MANDATORY: WEAPAN: KALI LINUX ,

BACKTRACK ,PAROT OS

WINDOWS OS / RDP ,VPS /CLOUD SERVER

VPN HACKED WIFI EMAIL IDS GOOD

Page 14: Hacking & cyber Security

VIRUS

RAT – REMOTE ACCESS TROGEN

REMOTE ACCESS DESKTOP WEB CAMERA ACCESS REMOTE LY USE ROOT FILES REMOTELY ACCESS WHOLE

SYSTEM

Page 15: Hacking & cyber Security

VIRUS

PHONE HACKING

REMOTELY FILE ACCESS BROWSING DATA STOLEN CAMERA ACCESS PHONE LOCATION FIND REMOTELY SMS & CALL DAIL READ CONTACT SMS IMAGES AND VEDIO

Page 16: Hacking & cyber Security

CCTV HACKINGCCTV HACKING

REMOTE ACCESS CONTROL CCTV HACK LAN CCTV HACK WAN CCTV

Page 17: Hacking & cyber Security

WIFI HACKING

WIFI HACKING WPA WPS TESTER APK ANDRODUMPER AIRODUMPER-NG ,AIRCRACKER-

NG,WIFITE,REAVER WEP HACKING (Wired Equivalent Privacy) WPA 2 HACKING ( Wireless Protected Access)

PROTECT: USE MAC FILTER / MAC SPOOF STATIC IP MONITAR DEVICE APPS

Page 18: Hacking & cyber Security

PHISHING

SOCIAL NETWORK

BANKWEBSITES

SHADOWAVE.COM

WAPKA.MOBI

Page 19: Hacking & cyber Security

KEY LOGGER

KEY LOGGER HACKING KEY LOGGER DUMP

EACH AND EVERY KEY TYPED BY VICTIM.

SEND TO HACKER.SEND LOGIN DETAIL TO

HACKER.SEND STORED

USERNAME AND PASSWORD TO HACKER.

Page 20: Hacking & cyber Security

VPN

VIRTUAL PRIVATE NETWORK

USE VPN TO PROTECT YOUR IP WHILE USE NET

USE ANONYMUSX ADDON ON FIREFOX

CHANGE MAC

Page 21: Hacking & cyber Security

VIRUS SPREAD

BY IMAGE PDF APPLICATI

ON APK GIFT

IMAGE BY EMAILS FREE

TOOLS WEBSITE FREE WIFI FORUMS

Page 22: Hacking & cyber Security

HACKERS LANGUAGE TRANSLATION

HACKING IS

GOOD

H4ck||\|g 1$ 900d

Page 23: Hacking & cyber Security

THANKS YOU