Who is a Hacker

Embed Size (px)

Citation preview

  • 8/13/2019 Who is a Hacker

    1/2

    Who is a Hacker?Hackers VS CrackersSteps of a HackerIP AddressesThe Anatomy of an IP Address

    Finding a Remote IP AddressHiding Your IP AddressTracing an IP AddressNetwork Address TranslationInternal VS External IP AddressesMAC AddressesMAC Addresses SpoofingProxy ServersProxy BouncingOnion RoutingHTTP Tunneling

    Unblocking WebsitesUnblocking TorrentsNetwork ReconnaissancePing sweepingTracerouteDNS and WHOIS LookupsPort ScanningDaemon Banner GrabbingOS FingerprintingMetasploitSecurity Auditing

    Penetration Testing & VulnerabilityAssessmentEmail SpoofingSMS SpoofingCall SpoofingGoogle HackingTrojansFully Undetectable TrojansKeyloggersSpywareMobile Phone Spying

    Alternate Data Stream ManipulationCracking PasswordsSocial Engineering AttacksBIOS PasswordsSaved PasswordsWiFi Password CrackingMD5 DecodingRainbow Table Attacks

    Man in the Browser AttacksPhishing AttacksFake Login Screen AttacksURL Shortening AttacksLink Manipulation Attacks

    Open Redirection AttacksCross Site Scripting (XSS Attacks)URL EncodingData SniffingPassive Sniffing

    Active SniffingARP Poisoning AttacksMAC Flooding AttacksMan in Middle Sniffing AttacksDOS Attacks using ARP TablesMAC Duplication Attacks

    DOS AttacksD-DOS AttacksReflective DOS AttacksBotnetsSQL InjectionUnion Query Attacks

    Always True AttacksBypassing Login PromptsInformation Stealing AttackImproper Error Handling

    Advanced SQL Injection Attacks

    SQL Injection using BacktrackWireless HackingIntroduction to Wireless NetworksWireless SecurityPoisoned HotspotsWar DrivingWar Driving & GPS MappingDe-Authentication AttacksWireless Data SniffersHow are Wireless ConnectionsEstablished?

    MAC Filtering AttacksDOS Attacks against Wireless NetworksWEP Security LoopholesCracking WEP, WPA, WPA2: Tools

    ARP Request Relay AttackFake Authentication AttackCracking WEP KeysCaffe Latte Attack

  • 8/13/2019 Who is a Hacker

    2/2

    SaltingWindows Login Password CrackingOffline Attacks and Online AttacksSYSKEY CrackingPrivilege Escalation Attacks

    SHA1 & SHA2 DecodingNetwork Password CrackingDistributed Password CrackingCaptchaCracking CaptchaMeet in Middle AttacksHTTP Referrer SpoofingSteganographySteganalysisQuery StringsHTTP Request Attacks

    Cookies Related AttacksSession Hijacking Attacks

    Cracking WPA & WPA2Computer ForensicsHoneypots25 Attacks with BacktrackFuzzing

    Social Engineering ToolkitSite Cloning AttacksQR Code AttacksSpearphishing AttacksMass Mail AttackFirewalkingHow to get a Shell on Victim's Computer?Reverse Shell Attacks

    Advanced MetasploitMeterpreterPost Exploitation Attacks