Upload
karan-bhatia
View
221
Download
0
Embed Size (px)
Citation preview
8/13/2019 Who is a Hacker
1/2
Who is a Hacker?Hackers VS CrackersSteps of a HackerIP AddressesThe Anatomy of an IP Address
Finding a Remote IP AddressHiding Your IP AddressTracing an IP AddressNetwork Address TranslationInternal VS External IP AddressesMAC AddressesMAC Addresses SpoofingProxy ServersProxy BouncingOnion RoutingHTTP Tunneling
Unblocking WebsitesUnblocking TorrentsNetwork ReconnaissancePing sweepingTracerouteDNS and WHOIS LookupsPort ScanningDaemon Banner GrabbingOS FingerprintingMetasploitSecurity Auditing
Penetration Testing & VulnerabilityAssessmentEmail SpoofingSMS SpoofingCall SpoofingGoogle HackingTrojansFully Undetectable TrojansKeyloggersSpywareMobile Phone Spying
Alternate Data Stream ManipulationCracking PasswordsSocial Engineering AttacksBIOS PasswordsSaved PasswordsWiFi Password CrackingMD5 DecodingRainbow Table Attacks
Man in the Browser AttacksPhishing AttacksFake Login Screen AttacksURL Shortening AttacksLink Manipulation Attacks
Open Redirection AttacksCross Site Scripting (XSS Attacks)URL EncodingData SniffingPassive Sniffing
Active SniffingARP Poisoning AttacksMAC Flooding AttacksMan in Middle Sniffing AttacksDOS Attacks using ARP TablesMAC Duplication Attacks
DOS AttacksD-DOS AttacksReflective DOS AttacksBotnetsSQL InjectionUnion Query Attacks
Always True AttacksBypassing Login PromptsInformation Stealing AttackImproper Error Handling
Advanced SQL Injection Attacks
SQL Injection using BacktrackWireless HackingIntroduction to Wireless NetworksWireless SecurityPoisoned HotspotsWar DrivingWar Driving & GPS MappingDe-Authentication AttacksWireless Data SniffersHow are Wireless ConnectionsEstablished?
MAC Filtering AttacksDOS Attacks against Wireless NetworksWEP Security LoopholesCracking WEP, WPA, WPA2: Tools
ARP Request Relay AttackFake Authentication AttackCracking WEP KeysCaffe Latte Attack
8/13/2019 Who is a Hacker
2/2
SaltingWindows Login Password CrackingOffline Attacks and Online AttacksSYSKEY CrackingPrivilege Escalation Attacks
SHA1 & SHA2 DecodingNetwork Password CrackingDistributed Password CrackingCaptchaCracking CaptchaMeet in Middle AttacksHTTP Referrer SpoofingSteganographySteganalysisQuery StringsHTTP Request Attacks
Cookies Related AttacksSession Hijacking Attacks
Cracking WPA & WPA2Computer ForensicsHoneypots25 Attacks with BacktrackFuzzing
Social Engineering ToolkitSite Cloning AttacksQR Code AttacksSpearphishing AttacksMass Mail AttackFirewalkingHow to get a Shell on Victim's Computer?Reverse Shell Attacks
Advanced MetasploitMeterpreterPost Exploitation Attacks