By: Mahmoud Ashraf - PowerPoint PPT Presentation

1 / 17
About This Presentation
Title:

By: Mahmoud Ashraf

Description:

Viruses, Worms, Trojan Horses and only professional hackers use Software Flaws and other ways. ... A port is a way for computers to ... Nmap. ProRat explaining ... – PowerPoint PPT presentation

Number of Views:61
Avg rating:3.0/5.0
Slides: 18
Provided by: cit74
Category:
Tags: ashraf | mahmoud | nmap | orifice

less

Transcript and Presenter's Notes

Title: By: Mahmoud Ashraf


1
  • By Mahmoud Ashraf

2
Introduction
  • Hackers use many types of hacking tools like
  • Viruses, Worms, Trojan Horses and only
    professional hackers use Software Flaws and other
    ways.

Hacker is someone who tries to break into
computer systems.
3
Programs used in hacking?
4
What is a Trojan Horse and how to prevent your
self from it?
  • A destructive programs that masquerades as a
    benign application. Unlike viruses , Trojan
    horses do not replicate themselves but they can
    be just as destructive. One of the most insidious
    types of Trojan horse is a program that claims to
    rid your computer of viruses but instead
    introduces viruses onto your computer.

5
How to prevent your self from Viruses, Worms,
Trojan Horses ?
  • The best way is to just use common sense. When
    going through your email, pay attention to what
    you are opening. If you aren't friends with a guy
    named John Doe, then you probably don't care
    about his vacation, so why open a picture from
    him? Just delete it and move on.
  • You can use technology to help you! Using
    anti-virus and anti-spyware software is a great
    way to not only keep your computer running
    smooth, but to keep you identity safe. This
    software is made to search of viruses not only on
    your computer, but in the emails your receive as
    well. There are a number of titles to choose from
    like Symantec Anti Virus and my personal favorite
    Kaspersky Anti Virus

6
What is a software flow and how to prevent your
self from it?
  • Every piece of software is composed of thousands
    if not millions of lines of code.
  • Essentially what this code is, is a set of
    instructions for the computer to follow in order
    to perform what ever function the software is
    designed to.
  • There are bound to be oversights and errors made
    by the people who write and design it.
  • .

7
  • The problem is that sometimes these oversights
    exposes weaknesses in software, and when the
    piece of software is made to manage things like
    client information or financial data, these
    weaknesses become targets for hackers who try to
    exploit them.
  • Depending on the exploit a hacker finds and the
    piece of software it is in, the problems
    experienced can range from data just being
    inaccurate or being deleted, to the hacker being
    able to take full control of your computer

8
How to prevent yourself from Software Flow?
  • How to protect yourself from Software flow?
  • make sure you keep your software up to date. Once
    a manufacture releases software, they will
    typically release updates for it as well to fix
    the exploits once they are discovered. For pieces
    of software made by Microsoft, the updates can be
    downloaded from their website updates.microsoft.co
    m.
  • Most other manufactures also post the updates on
    their websites, and many even build a feature
    into their software to download the updates
    automatically, Microsoft builds this feature into
    Windows and it is called "Microsoft Automatic
    Updates" Be sure to check often for updates,
    because many times not only do they fix bugs in
    the software, but they add functionality as well.

9
How to know what ports you have are open?
  • The are port scanner software designed to search
    a network host for open ports. This is often used
    by administrators to check the security of their
    networks and by crackers to compromise it.
  • The most popular programs are-
  • Superscan
  • Nmap

10
ProRat explaining
This is a photo of the program pro rat and now we
will explain how hackers make patches (Trojans)
with this software
11
(No Transcript)
12
  • Keep it as it is
  • You e-mail
  • As in the pic
  • As in the pic
  • Click on general settings

13
1.Dont change the port. 2.Add server
pass 3.Victims name 4. Click on server extensions
14
1.Choose anything I prefer SCR 2.Click on server
icon
15
1.Choose the icon you prefer. 2.To import a new
icon. 3.Click to creat server.
16
I wish my explanation was easy and Thank you.
17
  • Thank you for your interests and wish that you
    have got information to protect your self and
    Know How Hackers Think??
Write a Comment
User Comments (0)
About PowerShow.com