Seminar1

21
Presentation By: Satish H. Padnani (1316110171) Section – C (3 rd Year) Computer Science Department Information Security

Transcript of Seminar1

Presentation By: Satish H. Padnani (1316110171)Section – C (3rd Year) Computer Science Department

Information Security

Presentation By: Satish H. Padnani (1316110171)Section – C (3rd Year) Computer Science Department

Ethical Hacking

Amazing Topics To Be Covered:- Introduction To Hacking. Password Cracking Techniques. Windows Hacking. Email Hacking. Google Hacking. Virus.

What is Hacking?

Try

Success

Hacker

No

Yes

What is Hacking ?

Need Of Hackers. – Loophole Removal

Information Gathering.Prevention From Attackers. - ???Crackers.

Password Cracking TechniquesPassword Guessing.Shoulder Surfing.

Brute Forcing.Dictionary Based Attack.Social Engineering.

Brute Forcing Websites?

Windows HackingCracking Windows Login Passwords Disabling the Password. Changing the Password. Recovering the Password.Brute Force Attack.Using Live CD’s.

Disabling or Changing or Recovering Password. SAM (Security Accounts Manager). Path:” C:/windows/System32/conifg” Properties Of SAM File? Become Non Accessible After You

Logged In. All The Password For Login Are

Stored In SAM file But Password are Stored in Hashes(Hexadecimal Format).

Hashing – One Way Function.

Playing With SAM file

For Gaining Access These Software Are Used:

Live Bootable OS Brute Forcing – Use OphCrack. Uses Rainbow Table Attack – Ready

Made Possible Combinations of Passwords Compared with Hashes.

It Doesn't Help When Password Is Complex.

The Next Best Scanner is ?Kon Boot – Disables

Password. What it does Disables the

LSA. LSA – Local Security

Authority(Guard)

Changing Password

You Just Need One Time Access of Victim Computer/Laptop.

Play With Sticky Keys.(exe file)Use Some CMD (Command Prompt)

Commands and You Can Anytime Change Anyone’s Password.

It is All About .exe FilesDemo

Biometric and BIOS Passwords

Resetting Biometric And BIOSPasswords

Counter Measures

Set a Strong Password. eg: #n?/ Check For the Sticky Keys Attacks. Change the Boot Order in BIOS HDD

First Boot Device. Set a Password on BIOS Setup. Physically Secure Your Computer.

Other Hacking Techniques On Different Levels. Email Hacking.

Google Hacking/Google Dorks

Virus

Using Command Prompt. Creating BAT files.o Application Flooder - DEMO

Thank You All Of You !!

Any Queries?

References

www.tinyurl.com/txnfx - Youtube Channel

Kyrion Technologies.