SlideShare a Scribd company logo
1 of 42
Cyber Security and
HACKING
BY: Arjun Tomar
What is HACKING?
Hacker….??? Who is a HACKER?
A hacker is someone who seeks and expoits
weaknesses in a computer system or
computer network.
Hacker is a term, generally used by some to
mean ‘a clever programmer’, and by others to
mean ‘someone who tries to break into
computer systems’
Hacker vs. Ethical Hacker
When someone hacks a computer or network system, it's typically
for one of three main reasons:
Hacking for fun:-
Some hackers make attempts on computers, servers or network systems
just for the personal gratification. Others may feel that they need to prove
something to their peers or friends, and hack something only for the
challenge. They don’t steal any data.
Hacking to steal:-
Another reason to hack a system is to steal information or money. A large
portion of hacking attempts fall into this category. Banks and large
companies are common targets for hacking jobs, but sometimes smaller
companies or even a specific person's computer are targeted, as well. If
the companies are hacked they suffer a huge loss.
Why people hack?
Hacking to disrupt:-
There are also some hackers, including hacking groups; that target a
company to disrupt or disturb business, create chaos and just be a
nuisance. These groups often be trying to make a statement with their
hacking, demonstrate security inadequacies, or to show general
disapproval for the business itself. It can be compared to ‘poking’ in
Facebook.
CONTINUED…..
Career in Hacking
• Network administrator
 Administer network which means that they
take care of task of installing, configuration,
expanding and repairing of network.
 Network administrator take care of network
hardware such as cables, hubs, switches,
routers, servers and clients.
Continued…
• Job description:
 An ethical hacker conducts advanced
penetration tests to identify vulnerability in
computer system.
 The ability to analyze risk assessment and put
in place measures to control vulnerable areas.
 Ethical hacker is also many times more
involves with other areas of interests
security for company such as encryption,
security protocols, firewalls.
Continued …
• Skills required:
 Creativity.
 Analytical thinking.
 Logical thinking.
 Motivation.
 Networking.
 Hardware.
 Observation.
 Dedication.
 Quick-thinking.
 In depth computer knowledge.
Continued …
Government jobs:
 Government agencies.
 Military.
 Defense organization.
 Cbi ( central bureau of investigation).
 Forensic laboratories.
Continued …
Jobs: private options
 It firms
 Financial companies
 Banks
 Airlines
 Hotels
 Retail networks.
Continued …
Jobs: private options
• Fresher salary: 1.5 to 3.0 lakhs per annum.
• Pg. diploma or masters will get 16 to 25 lakhs.
• So simply hacking is very beneficial and
necessary for todays generation children.
• Social engineering is the art of manipulating people so that
give up confidential information.
• A social engineer commonly use telephone or internet to trick
a person into revealing sensitive information or getting them
to do something that is against typical policies.
Types of Social Engineering
 Pre-texting
 Diversion theft
 Phishing
 IVR or phone phishing
 Baiting
 Quid pro quo
 Tailgating
Pre-Texting
 When one party lies to another to gain access
to privileged data. For example, a pre-texting
scam could involve an attacker who pretends
to need personal or financial data in order to
confirm the identity of the recipient.
 They are most frequently done through phone
calls. They pretend to be worker of your bank,
and then they ask for your CVV, credit card no.
etc.
Diversion theft
 Diversion theft is a "con" exercised by
professional thieves, normally against a
transport or courier company.
 The objective is to persuade the persons
responsible for a legitimate delivery that the
consignment is requested elsewhere — hence,
"round the corner".
Phishing
 Phishing is when a malicious party sends a
fraudulent email disguised as a legitimate
email, often purporting to be from a trusted
source. The message is meant to trick the
recipient into sharing personal or financial
information or clicking on a link that installs
malware.
Phone Phishing
 Phone phishing (or "vishing") uses a rogue interactive
voice response (IVR) system to recreate a legitimate-
sounding copy of a bank or other institution's IVR
system.
 The victim is prompted (typically via a phishing e-mail)
to call in to the "bank" via a (ideally toll free) number
provided in order to "verify" information.
 A typical "vishing" system will reject log-ins continually,
ensuring the victim enters PINs or passwords multiple
times, often disclosing several different passwords
Quid pro quo
 An attacker calls random numbers at a company,
claiming to be calling back from technical
support.
 Eventually this person will hit someone with a
legitimate problem, grateful that someone is
calling back to help them.
 The attacker will "help" solve the problem and, in
the process, have the user type commands that
give the attacker access or launch malware.
Tailgating
 An attacker, seeking entry to a restricted area secured
by unattended, electronic access control, e.g.
by RFID card, simply walks in behind a person who has
legitimate access.
 Following common courtesy, the legitimate person will
usually hold the door open for the attacker or the
attackers themselves may ask the employee to hold it
open for them.
 The legitimate person may fail to ask for identification
for any of several reasons, or may accept an assertion
that the attacker has forgotten or lost the appropriate
identity token.
More Tips
 BEFORE clicking on links both in emails and on
websites keep an eye out for misspellings, @
signs and suspicious sub-domains.
 When clicking on links sent via email or on
websites, always keep a watch out for uninitiated
or automatic downloads. It could be a malware
installing itself on your system. All such activity
should be reported IMMEDIATELY to your
security manager.
Some more
 BLOCK USB devices in order to reduce the risk of
Baiting. Baiting is the digital equivalent of a real-world
Trojan Horse, where the attacker tempts users with
free or found physical media (USB drives) and relies on
the curiosity or greed of the victim – if they plug it in,
they are hacked!
 Follow the ATE – AWARENESS, TRAINING and
EDUCATION security concept for all employees, no
matter what level and what position they hold in the
organization. While C-level employees are great
targets, their admins can be even more powerful
vectors for attack!
IP ADDRESSANDMACADDRESS
CLICK ME to
WATCH a
FANTASTIC
VIDEO
IP ADRESS
A Unique identifier
Way to identify machineon a network
Connectto other computer
IP Address
• An Internet Protocol (IP) address is a numerical
label assigned to each device (e.g. computer,
printer etc.) participating in a computer
network that uses the Internet Protocol for
communication.
• Its role has been characterized as follows:
"A name indicates what we seek. An address
indicates where it is. A route indicates how to
get there.”
IP Address
• Internet Protocol can be defined as a 32 -
bit number and this system, known as Internet
Protocol Version 4 (IPv4), is still in use today.
• IP addresses are usually written and displayed
in human-readable notations, such as
172.16.254.1 (IPv4), and
2001:db8:0:1234:0:567:8:1 (IPv6).
MAC ADDRESS
Media Access Control
Mac attack technique employed to compromise security of network
switches. So that switches star behaving like a hub and switches and hub
are two different things.
What is MAC address?
Switches turns into hub.
User 1
User 2
Mac hood
hacker
MACAttack
 If User 1 sending information to User 2 and hacker
sends bogus MAC address, then switch behaves as hub.
So attacker gets sensitive information like password,
protected files, credit card number and more.
 Due to Mac address you are identified in a computer
network
MACAttack
 Physical Address: This is your identification in a
network. E.g.: 08-00-27-00-S4-7E .
 When spoofing attack is done, attacker pretends
to be someone else by falsifying data and there
by gain restricted sources and steals personal
information.
 By changing MAC address we pretend that we are
something else.
We all have seen that all websites start from either ‘https’ or
‘http’. So, what is http and https in relation to hacking
HTTP (HyperText Transfer
Protocol) and HTTPS
(HyperText Transfer Protocol
Secure)
Difference between HTTPand HTTPS
When We use HTTP
A SENDS
PASSWORD
B RECEIVES
PASSWORD
HACKER HACKES LINKS
GETS PASSWORD
When We use HTTPs
A SENDS
PASSWORD
B RECEIVES MESSAGE
ENCRYPTED DECRYPTED
 Proxy means to represent someone else in your name.
 To mask your IP under a proxy server to show that you
live in a different country and to make yourself
untraceable.
Attacker
server
target
Attacker not connected directly by target but uses other server.
Attacker
117.119.22.21
Webserver
111.121.14.65
Proxy
111.121.14.65
There is not direct connection of attacker and web server
but attacker uses proxy to hide its identity in a network.
Types of PROXY
• Direct Attack
• Logged Attack
Proxy
Attacker Target
Attacker USA Target
• Using proxy changing
Continued…
Attacker
Using proxy
changing Target
We can use proxy changing, so that target will
never know our destination.
 Go to Google chrome and then type hide me. Then go to
free proxy. Then you can access Google of any country
like Germany, USA, Netherland.
 You can also use Hideme.be.
 Hide.me simply hide your identity to which country you
belongs.
 Go to Google and type proxy list hide my ass. In this you
get IP address of different countries to use as proxy IP
address.
How to se Proxy changing
Cyber Security and Hacking Guide

More Related Content

What's hot (20)

Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
HACKING
HACKINGHACKING
HACKING
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Hacking
HackingHacking
Hacking
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
A presentation on Phishing
A presentation on PhishingA presentation on Phishing
A presentation on Phishing
 
Social engineering hacking attack
Social engineering hacking attackSocial engineering hacking attack
Social engineering hacking attack
 
hacking
hackinghacking
hacking
 
Anti phishing presentation
Anti phishing presentationAnti phishing presentation
Anti phishing presentation
 
Phishing
PhishingPhishing
Phishing
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
ethical hacking
ethical hackingethical hacking
ethical hacking
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Email hacking
Email hackingEmail hacking
Email hacking
 
Phishing
PhishingPhishing
Phishing
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Hacking
HackingHacking
Hacking
 

Viewers also liked

Hacking & its types
Hacking & its typesHacking & its types
Hacking & its typesSai Sakoji
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKINGSHERALI445
 
Hacking the Web
Hacking the WebHacking the Web
Hacking the WebMike Crabb
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern timesjeshin jose
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hackingsatish kumar
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An IntroductionJayaseelan Vejayon
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingNeel Kamal
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information SecurityAjay Dhamija
 
31 Best Growth Hacking Resources
31 Best Growth Hacking Resources31 Best Growth Hacking Resources
31 Best Growth Hacking ResourcesStephen Jeske
 
Ethical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSEthical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSSifs India
 
Day3 Backup
Day3 BackupDay3 Backup
Day3 BackupJai4uk
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and HackingParth Makadiya
 
Social networking & Social Media
Social networking & Social MediaSocial networking & Social Media
Social networking & Social MediaAJ Ajay
 
How to remove shortcut virus from pendrive using cmd easily
How to remove shortcut virus from pendrive using cmd easilyHow to remove shortcut virus from pendrive using cmd easily
How to remove shortcut virus from pendrive using cmd easilyTan
 
Puppy Pendrive
Puppy PendrivePuppy Pendrive
Puppy PendriveMohan R
 

Viewers also liked (20)

Hacking & its types
Hacking & its typesHacking & its types
Hacking & its types
 
Hacking
HackingHacking
Hacking
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Hacking the Web
Hacking the WebHacking the Web
Hacking the Web
 
ethical hacking in the modern times
ethical hacking in the modern timesethical hacking in the modern times
ethical hacking in the modern times
 
It security &_ethical_hacking
It security &_ethical_hackingIt security &_ethical_hacking
It security &_ethical_hacking
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Computer Hacking - An Introduction
Computer Hacking - An IntroductionComputer Hacking - An Introduction
Computer Hacking - An Introduction
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
Growth Hacker le Social Media - Growth Hacking Paris 10
Growth Hacker le Social Media - Growth Hacking Paris 10Growth Hacker le Social Media - Growth Hacking Paris 10
Growth Hacker le Social Media - Growth Hacking Paris 10
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ethical hacking & Information Security
Ethical hacking & Information SecurityEthical hacking & Information Security
Ethical hacking & Information Security
 
31 Best Growth Hacking Resources
31 Best Growth Hacking Resources31 Best Growth Hacking Resources
31 Best Growth Hacking Resources
 
Ethical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFSEthical Hacking & IT Security Courses in SIFS
Ethical Hacking & IT Security Courses in SIFS
 
Day3 Backup
Day3 BackupDay3 Backup
Day3 Backup
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and Hacking
 
Social networking & Social Media
Social networking & Social MediaSocial networking & Social Media
Social networking & Social Media
 
How to remove shortcut virus from pendrive using cmd easily
How to remove shortcut virus from pendrive using cmd easilyHow to remove shortcut virus from pendrive using cmd easily
How to remove shortcut virus from pendrive using cmd easily
 
Puppy Pendrive
Puppy PendrivePuppy Pendrive
Puppy Pendrive
 
Contraception
ContraceptionContraception
Contraception
 

Similar to Cyber Security and Hacking Guide

PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)Shivam Sahu
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyHaider Ali Malik
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxNargis Parveen
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxprosunghosh7
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Shawon Raffi
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security Mehedi Hasan
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptxTapan Khilar
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfonlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfjainutkarsh078
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hackingWaseem Rauf
 

Similar to Cyber Security and Hacking Guide (20)

PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Information security
Information securityInformation security
Information security
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
Workshop on Cyber security
Workshop on Cyber security Workshop on Cyber security
Workshop on Cyber security
 
Online security and payment system
Online security and payment systemOnline security and payment system
Online security and payment system
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
CYBER SECUIRTY PRESENTATION.pptx
CYBER SECUIRTY PRESENTATION.pptxCYBER SECUIRTY PRESENTATION.pptx
CYBER SECUIRTY PRESENTATION.pptx
 
Security Primer
Security PrimerSecurity Primer
Security Primer
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdfonlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
onlinesecurityandpaymentsystem-140116021418-phpapp01.pdf
 
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
 

Recently uploaded

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 

Recently uploaded (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Cyber Security and Hacking Guide

  • 3. Hacker….??? Who is a HACKER? A hacker is someone who seeks and expoits weaknesses in a computer system or computer network. Hacker is a term, generally used by some to mean ‘a clever programmer’, and by others to mean ‘someone who tries to break into computer systems’
  • 5. When someone hacks a computer or network system, it's typically for one of three main reasons: Hacking for fun:- Some hackers make attempts on computers, servers or network systems just for the personal gratification. Others may feel that they need to prove something to their peers or friends, and hack something only for the challenge. They don’t steal any data. Hacking to steal:- Another reason to hack a system is to steal information or money. A large portion of hacking attempts fall into this category. Banks and large companies are common targets for hacking jobs, but sometimes smaller companies or even a specific person's computer are targeted, as well. If the companies are hacked they suffer a huge loss. Why people hack?
  • 6. Hacking to disrupt:- There are also some hackers, including hacking groups; that target a company to disrupt or disturb business, create chaos and just be a nuisance. These groups often be trying to make a statement with their hacking, demonstrate security inadequacies, or to show general disapproval for the business itself. It can be compared to ‘poking’ in Facebook. CONTINUED…..
  • 7. Career in Hacking • Network administrator  Administer network which means that they take care of task of installing, configuration, expanding and repairing of network.  Network administrator take care of network hardware such as cables, hubs, switches, routers, servers and clients.
  • 8. Continued… • Job description:  An ethical hacker conducts advanced penetration tests to identify vulnerability in computer system.  The ability to analyze risk assessment and put in place measures to control vulnerable areas.  Ethical hacker is also many times more involves with other areas of interests security for company such as encryption, security protocols, firewalls.
  • 9. Continued … • Skills required:  Creativity.  Analytical thinking.  Logical thinking.  Motivation.  Networking.  Hardware.  Observation.  Dedication.  Quick-thinking.  In depth computer knowledge.
  • 10. Continued … Government jobs:  Government agencies.  Military.  Defense organization.  Cbi ( central bureau of investigation).  Forensic laboratories.
  • 11. Continued … Jobs: private options  It firms  Financial companies  Banks  Airlines  Hotels  Retail networks.
  • 12. Continued … Jobs: private options • Fresher salary: 1.5 to 3.0 lakhs per annum. • Pg. diploma or masters will get 16 to 25 lakhs. • So simply hacking is very beneficial and necessary for todays generation children.
  • 13. • Social engineering is the art of manipulating people so that give up confidential information. • A social engineer commonly use telephone or internet to trick a person into revealing sensitive information or getting them to do something that is against typical policies.
  • 14. Types of Social Engineering  Pre-texting  Diversion theft  Phishing  IVR or phone phishing  Baiting  Quid pro quo  Tailgating
  • 15. Pre-Texting  When one party lies to another to gain access to privileged data. For example, a pre-texting scam could involve an attacker who pretends to need personal or financial data in order to confirm the identity of the recipient.  They are most frequently done through phone calls. They pretend to be worker of your bank, and then they ask for your CVV, credit card no. etc.
  • 16. Diversion theft  Diversion theft is a "con" exercised by professional thieves, normally against a transport or courier company.  The objective is to persuade the persons responsible for a legitimate delivery that the consignment is requested elsewhere — hence, "round the corner".
  • 17. Phishing  Phishing is when a malicious party sends a fraudulent email disguised as a legitimate email, often purporting to be from a trusted source. The message is meant to trick the recipient into sharing personal or financial information or clicking on a link that installs malware.
  • 18. Phone Phishing  Phone phishing (or "vishing") uses a rogue interactive voice response (IVR) system to recreate a legitimate- sounding copy of a bank or other institution's IVR system.  The victim is prompted (typically via a phishing e-mail) to call in to the "bank" via a (ideally toll free) number provided in order to "verify" information.  A typical "vishing" system will reject log-ins continually, ensuring the victim enters PINs or passwords multiple times, often disclosing several different passwords
  • 19. Quid pro quo  An attacker calls random numbers at a company, claiming to be calling back from technical support.  Eventually this person will hit someone with a legitimate problem, grateful that someone is calling back to help them.  The attacker will "help" solve the problem and, in the process, have the user type commands that give the attacker access or launch malware.
  • 20. Tailgating  An attacker, seeking entry to a restricted area secured by unattended, electronic access control, e.g. by RFID card, simply walks in behind a person who has legitimate access.  Following common courtesy, the legitimate person will usually hold the door open for the attacker or the attackers themselves may ask the employee to hold it open for them.  The legitimate person may fail to ask for identification for any of several reasons, or may accept an assertion that the attacker has forgotten or lost the appropriate identity token.
  • 21. More Tips  BEFORE clicking on links both in emails and on websites keep an eye out for misspellings, @ signs and suspicious sub-domains.  When clicking on links sent via email or on websites, always keep a watch out for uninitiated or automatic downloads. It could be a malware installing itself on your system. All such activity should be reported IMMEDIATELY to your security manager.
  • 22. Some more  BLOCK USB devices in order to reduce the risk of Baiting. Baiting is the digital equivalent of a real-world Trojan Horse, where the attacker tempts users with free or found physical media (USB drives) and relies on the curiosity or greed of the victim – if they plug it in, they are hacked!  Follow the ATE – AWARENESS, TRAINING and EDUCATION security concept for all employees, no matter what level and what position they hold in the organization. While C-level employees are great targets, their admins can be even more powerful vectors for attack!
  • 23. IP ADDRESSANDMACADDRESS CLICK ME to WATCH a FANTASTIC VIDEO
  • 24.
  • 25. IP ADRESS A Unique identifier Way to identify machineon a network Connectto other computer
  • 26. IP Address • An Internet Protocol (IP) address is a numerical label assigned to each device (e.g. computer, printer etc.) participating in a computer network that uses the Internet Protocol for communication. • Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there.”
  • 27. IP Address • Internet Protocol can be defined as a 32 - bit number and this system, known as Internet Protocol Version 4 (IPv4), is still in use today. • IP addresses are usually written and displayed in human-readable notations, such as 172.16.254.1 (IPv4), and 2001:db8:0:1234:0:567:8:1 (IPv6).
  • 28. MAC ADDRESS Media Access Control Mac attack technique employed to compromise security of network switches. So that switches star behaving like a hub and switches and hub are two different things.
  • 29. What is MAC address? Switches turns into hub. User 1 User 2 Mac hood hacker
  • 30. MACAttack  If User 1 sending information to User 2 and hacker sends bogus MAC address, then switch behaves as hub. So attacker gets sensitive information like password, protected files, credit card number and more.  Due to Mac address you are identified in a computer network
  • 31. MACAttack  Physical Address: This is your identification in a network. E.g.: 08-00-27-00-S4-7E .  When spoofing attack is done, attacker pretends to be someone else by falsifying data and there by gain restricted sources and steals personal information.  By changing MAC address we pretend that we are something else.
  • 32. We all have seen that all websites start from either ‘https’ or ‘http’. So, what is http and https in relation to hacking HTTP (HyperText Transfer Protocol) and HTTPS (HyperText Transfer Protocol Secure)
  • 34. When We use HTTP A SENDS PASSWORD B RECEIVES PASSWORD HACKER HACKES LINKS GETS PASSWORD
  • 35. When We use HTTPs A SENDS PASSWORD B RECEIVES MESSAGE ENCRYPTED DECRYPTED
  • 36.  Proxy means to represent someone else in your name.  To mask your IP under a proxy server to show that you live in a different country and to make yourself untraceable.
  • 37. Attacker server target Attacker not connected directly by target but uses other server.
  • 38. Attacker 117.119.22.21 Webserver 111.121.14.65 Proxy 111.121.14.65 There is not direct connection of attacker and web server but attacker uses proxy to hide its identity in a network.
  • 39. Types of PROXY • Direct Attack • Logged Attack Proxy Attacker Target Attacker USA Target
  • 40. • Using proxy changing Continued… Attacker Using proxy changing Target We can use proxy changing, so that target will never know our destination.
  • 41.  Go to Google chrome and then type hide me. Then go to free proxy. Then you can access Google of any country like Germany, USA, Netherland.  You can also use Hideme.be.  Hide.me simply hide your identity to which country you belongs.  Go to Google and type proxy list hide my ass. In this you get IP address of different countries to use as proxy IP address. How to se Proxy changing

Editor's Notes

  1. SFSDFSF