Independent Security Researcher
|| HACKING IS MY PASSION BECAUSE WE BELIEVE IN SECURITY ||
Specialists :Ethical Hacking and Cyber Security Session hijacking,Advance SQL Injection,Cross site scripting,Social Engineering,Ajax injection,LDAP injection,CSRF,Brute force attack,user Enumeration,i-fame busting,Remote Command execution,MobileTesting methodology,Cyber Crime Investigation,Cyber Forensics,Cyber Law,SEO.
Introduction Now Let's Start Brief in Ethical Hacking:-
- Know your enemy
- History and Trends
- Anatomy of a hack
- System Hacking
- Sniffers
- Denial of Service
- Buffer Overflows
- Social Engineering
Know your enemy
● Hacker – refers to a person who enjoys learning the details
of computer systems and stretch their capabilities.
● Hacking – describes the rapid development of new
programs or reverse engineering of already existing software to
make the code better and efficient.
● Cracker – refers to a person who uses his hacking skills for
offensive purposes.
● Phreak – a hacker variant with an interest in telephones and
telephone systems.
● Hactivism – refers to an act of hacking in order to
communicate a politically or socially motivated message. An
Internet enabled way to practice civil disobedience and protest.
● Ethical Hacker – refers to security professional who apply
their hacking skills for defensive purposes on behalf of its
owners.
● Ethical Hacking – is also known as penetration testing,
intrusion testing, red teaming.
● Ethical hacker looks for the following four basic questions:
● What information/locations/systems can an intruder gain
access?
● What can an intruder see on the target?
● What can an intruder do with available information?
● Does anyone at the target system notice the attempts?
Anatomy of a hack (Gaining Access):-
● Gaining access refers to the true attack phase.
● The exploit can occur over a LAN, locally, Internet, offline, as a
deception or theft.
● System Hacking
● Sniffers
● Social Engineering
● Denial of Service
● Session Hijacking
● Buffer Overflows
● Rootkits
● Hacking Web servers
● Web application vulnerabilities
● Web based password cracking
● SQL injection
● Hacking Wireless networks
● Virus and Worms
● Evading IDS, firewalls, Honeypots
● Cryptography
System Hacking
● Remote password guessing
● Privilege escalation.
● Password cracking
● Dictionary and Brute force attack
● Social engineering and Shoulder sniffing
● Dumpster Diving
● Key loggers
● Hiding files
● Steganography
Maintaining Access
● Maintaining access refers to the phase when the attacker tries to
retain his 'ownership' of the system.
● Install tools such as
● Rootkits.
● Trojans and its backdoors.
Social Engineering
● It is an art of using influence and persuasion to deceive people
for the purpose of obtaining information or to perform some
action.
● Even with all firewalls, authentication processes, VPN,
companies are still wide open to attacks.
● Humans are the weakest link in the security chain.
● It is the hardest form of attack to defend against.
!-- Born To Win--!
!--Hacking Is a Lifestyle--!