Vous êtes sur la page 1sur 22

CYBER SECURITY

Team Leader : Pratyush Sinha,


Mohit Banka
Kartikey
Certificate No. : TM2443
RECONNAISANCE

COVERING
SCANNING
TRACKS

MAINTANING
GAINING ACCESS
ACCESS
MODULE 1
1. RECONNAISANCE
1.1 WHAT IS RECONNAISANCE??
• FOOTPRITNING IS THE THE PRE-ATTACK PHASE IN WHICH WE TRY TO COLLECT AS
MUCH INFORMAION WE CAN ABOUT THE VICTIM.

• IN OTHER WORDS IT IS A TYPE OF BLACK BOX TESTING IN WHICH THE USER TRIES
TO GRAB INFORMATION ABOUT THE VICTIM.THE INFORMATION MAY CONTAIN THE
GEOGRAPHICAL AREA OF THE VICTIMTHE IP ADDRESS OF THE VICTIM’S
COMPUTER,HIS IS ETC.

• FOOTPRINTING IS ALSO KNOW AS RECONNAISANCE.


1.2 WHY RECONNAISANCE??
• FOOTPRINTING IS A VERY ESSENTIAL NECESSITY BEFORE THE ACTUAL HACKING
BEGINS.SOME OF THE REASONS ARE :

• 1.MAXIMUM INFORMATION OF THE TARGET CAN BE OBTAINED WHICH LEADS TO


MAXIMUM PROBABLITY OF SUCCESSFUL HACKING.

• 2.IT SAVES A LOT OF TIME BECAUSE OF THE PRE BUILT BLUEPRINT ABOUT THE
VICTIM.

• 3.IT ALSO HELPS TO CHECK SHARED AND DEDICATED SERVERS ONLINE.


2.0 RECONNAISANCE THROUGH THE WEB
• AS THE INTERNET EXPANDS EVERYDAY,SPREADIUNG OUT IT’S
CAPABILITIES,MANY OF THE HACKS ARE AVAILABLE ONLINE ITSELF.

• SOME OF THE FREEWARE WEBSITES THE OFFER MANY INFORMATION ABOUT THE
VICTIM’S COMPUTER ARE:
• 1.1 WHATISMYIP.COM
• 1.2 YOUGETSIGNAL.COM
• 1.3 LULLAR
• 1.4 DOMAINTOOLS.COM
• 1.5 EXPLOIT-DB.COM
WHATISMYIP.COM
DOMAINTOOLS.COM
HTTRACK WEBSITE COPIER
• WHATS MORE BETTER THAN HACKING A
WEBSITE??
• OF COURSE, DOWNLOADING THE ENTIRE
WEBSITE FOR YOUR OWN PERSONAL USE!!

• HTTRACK IS A POWERFUL TOOL THAT


ALLOWS YOU TO WWW WEBSITES TO YOUR
LOCAL ID COMPUTER DIRECTLY.
PRECAUTIONS!!!
WHATEVER THE USER DOES,THERE STILL IS SOME SCOPE OF VULNERIBILITY TO THE
HACK.SOME OF THEM ARE :

1.MAKE SURE WHOIS DETAILS ARE HIDDEN

2.PERIODCALLY CHECK THE EXPOSURE TO WEBSITES.

3.ONE CAN STOP CRAWLING ON THESE SITES BY SPIDERS AND BOTS COMING
FROM SEARCHH ENGINES.
MODULE 2
2.0 WHAT IS SCANNING?

SCANNING IS THE PROCESS OR TECHIQUE OF INTELLIGECE INFORMATION


GATHERING BY THE ATTACKER.
IT IS USED TO FIND IP ADDRESS,OPERATING SYSTEM,SYSTEM ARCHTECTURE
AND SERVICES RUNNING ON THE COMPUTER.
TYPES OF SCANNING.

1.PORT SCANNING
A SERIES OF MESSAGES SEND BY SOMEONE TO BREAK INTO A COMPUTER TO LEARN ABOUT
SERVICES LIKE PORT ADDRESS AND PORT NUMBER.

2.NETWORK SCANNING
A PROCESDIRE OF IDENTIFYING ACTIVE HOSTS ON A NETWORK

3. VULNERIBILITY SCANNING
IDENTIFYING VULNERIBILITIES OF OPERATING SYSTEM PRESENT IN A NETWORK
SCANNING
TOOLS
1.ANGRY IP SCANNER
2.NMAP VULNERIBILTY SCANNER
MODULE 3
2. GOOGLE HACKING
GOOGLE IS THE MOST FAMOUS SEARCH ENGINE,THE MOST WIDELY KNOWN.

GOOGLE HACKING IS A COMPUTER HACKING TECHNIQUE THAT USES GOOGLE SEARCH AND OTHER GOOGLE APPS TO FIND SECURITY HOLES AND CONFIGURATION AND COMPUTER CODES THAT THE WEBSITE USES.
2.1 GOOGLE DORKS

GOOGLE DORKS ARE VERY SPECIFIC KEYWORKDS THAT HAVE A PARTICULAR


MEANING AND ONLY SEARCH FOR ACCOUNTED RESULTS.
A Google dork query, sometimes just referred to as a dork, is a search string
that uses advanced search operators to find information that is not readily
available on a website. Google dorking, also known as Google hacking,
can return information that is difficult to locate through simple search
queries.
2.2 FINDING UNSECURED
CCTV CAMERAS
GOOGLE DORKS ARE VERY USEFUL THAT HELP IN FINDING UNSECURED CCTV CAMERAS.

FOR EXAMPLE:
/VIEW/SHTML
LIVEAPPLET INURL:LVAPPL

THIS IS A FREE CCTV CAMERA IN NEW YORK!!


http://www.kip.uni-heidelberg.de/view/index.shtml?videos=one
2.3 FINDING
ADMININSTRATOR PANELS
ADMINISTRATIVE PANELS ARE SECURE LOGIN GATEWAYS.
TO ACCESS THEM:

“adminlogin.asp”
“admin.apsx login”

THE LINK ADDRESS TO IIT BOMBAY ADMIN PANEL :


http://www.iitb.ac.in/en/about-iit-bombay/iit-bombay-administration
2.4 USEFULNESS OF GOOGLE
HACKS
SOME USEFULNESS OF GOOGLE HACKS:
1.THE ROLE OF DEFINE
2.SMART SEARCHING OF BOOKS
3.TIME ZONE
4.SERIAL KEY DEFINED SEARCHING

Vous aimerez peut-être aussi