TYPES OF HACKING
TYPES OF HACKING
TYPES OF HACKING
2. Website Hacking
3. Network Hacking
4. Email Hacking
5. Ethical Hacking
6. Password Hacking
7. Computer Hacking
ADVANTAGES & DISADVANTAGES OF HACKING:
Advantages of Hacking
To recover lost information, especially in case you lost your password.
To have a computer system that prevents malicious hackers from gaining access.
ADVANTAGES & DISADVANTAGES OF HACKING:
Disadvantages of Hacking
• Privacy violation.
2. Phishing
4. Cross-Site Scripting
5. Denial-of-Service (DoS)
7. Credential Reuse
Types of
Attacks
• 1 Malware
Types of
Attacks
Phishing
Types of
Attacks
SQL Injection Attack
Types of
Attacks
• Cross-Site Scripting (XSS):
Types of
Attacks
• Process of Denial-of-Service (DoS).
Types of
Attacks
• Session Hijacking and Man-in-the-Middle Attacks
Types of
Attacks
• Credential Reuse:
Tips to Prevent Hacking
Encrypt Files While Storing and Transferring
Use Browser Extensions to Block Malicious Sites and Harmful Downloads
Install a Strong Anti-Malware Program
Sanitize Your PC Manually
Enable Encryption Using BitLocker for Windows 10
Enable Two-Factor Authentication
Don’t Log in Via Existing Third-Party Platforms
Don’t Share Any Information via HTTP Sites
Recognize Signs of Fake or Malware-Infected Websites
Learn to Recognize Fake vs. Legitimate Software and Applications
Recognize Phishing Emails
Be Vigilant While Downloading Anything from the Internet
Beware of Phishing SMS Messages
Additional Tips on How to Prevent Being Hacked
THE INDIAN IT ACT 2000
SECTION 3 - AUTHENTICATION OF ELECTRONIC RECORDS BY USE OF DIGITAL SIGNATURE
SECTION 3A - AUTHENTICATION OF ELECTRONIC RECORDS BY USE OF ELECTRONIC SIGNATURE
SECTION 4 - ELECTRONIC RECORDS
SECTION 5 - LEGAL RECOGNITION OF ELECTRONIC SIGNATURES
SECTION 14 - SECURE ELECTRONIC RECORD
SECTION 15 - SECURE ELECTRONIC SIGNATURE
SECTION 18 - FUNCTIONS OF CONTROLLER
SECTION 21 - LICENCE TO ISSUE ELECTRONIC SIGNATURE CERTIFICATES
SECTION 22 - APPLICATION FOR LICENSE
SECTION 43 - PENALTY FOR DAMAGE TO COMPUTER, COMPUTER SYSTEM, ETC
SECTION 43A - COMPENSATION FOR FAILURE TO PROTECT DATA
TYPES OF STEALTH SCANS
• Inverse Mapping
• Slow Scan
• Half Open Scan
• FIN Scan
• Xmas Tree Scan
• Null Scan
• UDP Scan
• Dumb or Idle Scan
Half Open Scan
FIN Scan
Xmas Tree Scan
NULL Scan
UDP Scan
Dumb Scan
Packet Sniffing
• Use of encryption
• Email Worms
• Internet Worms
• Ease of detection/mitigation
• Speed of attack
• Traffic volume
• Manner of execution
• Tracing of source(s):
TYPES OF DOS AND DDOS ATTACKS
• Teardrop Attack
TYPES OF DOS AND DDOS ATTACKS
•Flooding Attack
TYPES OF DOS AND DDOS ATTACKS
• IP Fragmentation Attack
TYPES OF DOS AND DDOS ATTACKS
• Volumetric Attack
• Application-based Attack
Brute force attack
The term “brute force” define the The attack in brute force use bots to do In manual brute force credential cracking With the tools the attacker will attempt
simplistic way in which the attack takes their bidding. With this type of attack, is time-consuming, and this can be done things like inputting numerous password
place. The attack is held with guessing the attackers will have a list of real or through using brute force attack software combinations and accessing web
credentials to gain unauthorized access. commonly used credentials and assign and tools to aid them. applications by searching for the correct
Primitive as they are, brute force attacks their bots to attack websites using these session ID, among others
can be very effective. credentials.
Phishing attack
• Email phishing
• Spear phishing
• Whaling
• Angler phishing
Man in the middle attack
• While doing this we made some assumption:
1. The data which we are entered is valid,
2. The data is sending to the server in original format or in correct form
3. During the transmission third parties cannot see, intercept or change your data.
• If we are using some websites and online services which are not secure, we could face some security risks
such as phishing, fraud, impersonation, malware, and many others.
The two main types of MITM attacks
• Baiting
• Scareware
• Pretexting
• Phishing
• Spear phishing
STEGANOGRAPHY TECHNIQUES
Secure Cover Selection comes with finding the correct block of image to carry malware to destroy the data.
After this the hackers always compare their chosen image medium with the malware blocks. If an image block is
exactly matches with the malware, the hackers use that image block to fit it into the carrier image, then he will
create an identical image infected with the malware. This image subsequently passes quickly through threat
detection methods.
0
R G B
1
A session starts when you log into a service and ends when you log out.
for example, your banking application. The attack relies on the attacker’s knowledge of your session
cookie, so it is also called cookie hijacking or cookie side-jacking. Although any computer’s
session could be hijacked, session hijacking most commonly applies to browser sessions and web applications.
PREVENT SESSION HIJACKING
• Use a VPN
• Phishing Attacks
• Website Defacement
• Information Gathering
• Website Mirroring
• Vulnerability Scanning
• Session Hijacking
• Multiple Web Servers, One Database (At a Machine Rather than the Web server)
• Presentation Layer
• Business Layer
• Security Misconfiguration
• Malware
• Injection Attacks
• Phishing Scam
• Brute Force
SQL INJECTION
• In a SQL injection attack, an attacker submits an information to a website that has been
deliberately formulated in such a way that it results in that website misinterpreting it and
• SQL injection attacks pose a serious security threat to organizations. A successful SQL injection attack
can result in confidential data being deleted, lost or stolen; websites being defaced; unauthorized
access to systems or accounts and, ultimately, compromise of individual machines or entire networks.
SQL injection examples
• Below is an example of how a SQL injection attack could be carried out in practice. The attack is designed to
gain access to all data about a user from the database table USERS without knowing a username or matching
password.
• The SQL application code might be:
• SELECT * FROM Users WHERE Username=’$username’ AND
Password=’$password’
• Using a web interface, when prompted for their username and password, an attack might enter:
• 1′ OR ‘1’ = ‘1
and
1′ OR ‘1’ = ‘1
• By entering this deliberately formulated username and password pair, the attacker has effectively injected two
whole OR conditions into the authentication process.
TYPES OF SQL INJECTIONS
•In-band SQLi
•Error-based SQLi
•Union-based SQLi
•Inferential (Blind) SQLi
Boolean
Time-based
• Out-of-band SQLi
SQL INJECTION VULNERABILITIES
• Routine application database audits should be used to determine if your application has been compromised
• Querying the database for common HTML tags used by worms can reveal signs that the application is
spreading malware. These tags include "iframe", "http-equiv="refresh"" or the IP address of known malicious
servers
• An easier way to detect a compromise is by examining webpages created from dynamic content for
unexpected behavior, including the addition of hidden iframes -- code elements used to embed an HTTP
document in another HTTP document -- in the HTML. These routine audits help detect a compromised
system, but this method only allows for fixes to be created after the fact.
• Recovering an application from an exploited state, especially when data may have been altered, can be an
extremely costly process and does not prevent future attacks.
PREVENT SQL INJECTION
• Scan regularly
Introduction to Wireless network
• A wireless network is a set of two or more devices connected with each other via radio
waves within a limited space range.
• Most wireless LANs (WLANs) are based on the IEEE 802.11standards and amendments,
such as 802.11a, 802.11b, 802.11g, and802.11n. The 802.11 standard included only
rudimentary security features and was fraught with vulnerabilities.
• The 802.11i amendment is the latest security solution that addressesthe 802.11
weaknesses.
• The Wi-Fi Alliance created additional security certifications known as Wi-Fi Protected
Access (WPA) and WPA2 to fill the gap between the original 802.11 standard and the
• Kismet:- Kismet is a powerful tool for wireless sniffing that is found in Kali distribution.
It latest 802.11i
can also amendment.
be downloaded from its official webpage − https://www.kismetwireless.net.
'Wireless encryption techniques
• WEP: Wired Equivalent Privacy
• WPA: Wi-Fi Protected Access
• WPA2: Wi-Fi Protected Access with EAP
• 802.11 I
• LEAP
Wireless Sniffing
• Email traffic
• FTP passwords
• Web traffics
• Telnet passwords
• Router configuration
• Chat sessions
• DNS traffic
Types of Sniffing,
• Passive Sniffing
• Active Sniffing
• Active Sniffing Techniques
• MAC Flooding
• • DHCP Attacks
• • DNS Poisoning
• • Spoofing Attacks
• • ARP Poisoning
Wireless hacking techniques,
• Asymmetric encryption
(public key cryptography
Cryptography attacks,
• Cipher text only attack
• Known-plain text attack
• Chosen-plaintext
• Chosen-cipher text attack
• Chosen key attack
• Adaptive chosen-plain text attack
• Timing attack
• Rubber hose attack
DES and AES, Digital signatures
AES
What is Pen Testing
• It is conducted to find the security risk which might be present in the system.
• If a system is not secured, then any attacker can disrupt or take authorized
access to that system.
• Security risk is normally an accidental error that occurs while developing and
implementing the software. For example, configuration errors, design errors,
and software bugs, etc.
• Black Box
• Grey Box
• White Box
Nessus
GFI LANguard
Retina
CORE IMPACT
ISS Internet Scanner
X-Scan:
Security Auditor’s Research Assistant
QualysGuard
Security Administrator’s Integrated Network Tool6
Microsoft Baseline Security Analyzer