HaKTuts - PowerPoint PPT Presentation

About This Presentation
Title:

HaKTuts

Description:

All About Ethical Hacking,Books related to ethical hacking,pentesting and networking,Hacker vs ethical hacker,Paid android app,Decompile android app, Forensic Tools, Vapt Tools,Tech News, Mobile Hacking, Network Hacking, Virus Writing, Proxy Servers, Security Tools,Tips and tricks – PowerPoint PPT presentation

Number of Views:42
Slides: 2
Provided by: haktuts
Category: Other

less

Transcript and Presenter's Notes

Title: HaKTuts


1
Ethical hacking and pentesting from beginners to
advance are given below Introduction Hackers
Hierarchy Hackers Keyword Virus Types of
Virus Protect from virus IP and MAC Concept of
IP Types of IP MAC Spoofing Anonymous
Surfing Steganography Tools of Steganography Detec
ting Steganography Cryptography Types of
Cryptography Email Hacking Password Cracking Rar
Password Cracking PDF Password Cracking Windows
Password Cracking Information Gathering Android Ro
oting Andoid Device Lock Screen Bypass of Android
Device Pentesting Android Device Some Useful
Android Stuff iOS Jailbreak iOS Device Jailbreak
tools for iOS Device SSH For iOS Keylogger Virtual
ization Benefits of Virtualization Setup Virtual
Machine Install ubuntu via virtual
machine Backtrack Command For Backtrack Informatio
n Gathering Via NMAP Backtrack Payload Kali Wifi
Hacking Crack WEP Encryption Crack WPA/WPA2
Encryption How to speed up the hacking
process Desktop Phishing Cross site
scripting Remote attack SQL Injection Click
Jacking Attack How to hack facebook account Spoof
Call Spoof SMS Fake/Spoof mail Kill Wifi Of
Entire Network Bypass Applocker In Android Dual
WhatsApp Without Root Use WhatsApp on PC and
Android Simultaneously Multi User in
Android Create an Undeletable Folder using
CMD Run Multiple Window On Any Android
Device Share Internet without Wifi
Router Increase Swap Space In Android Increase
Internal Storage in Android Cydia Tweaks For
iOS Optimize Download Speed of IDM Download
Torrent File Using IDM Bypass Phone and Sms
Verfication of Any Website Windows Tricks Trace
IP Address of Victim Kali Linux Nethunter for
Android Device Install Android Lollipop Install
Kali Linux on Android Device Install Windows in
Android Device Download Youtube Playlist Via
IDM Use Android Device As WebCam Firefox Addons
For Pentest Windows Shortcut Notepad Tricks Lock
Unlock Windows PC with USB Restore Usb Drive
Back to Full Capacity Send Messages on Facebook
When Blocked Download Apk Files Via Browser Share
PC Internet with Android Device via USB Delete
Files Permanently Using CMD How to run linux in
windows. Ethical hacking  which encompasses
formal and methodical penetration testing, white
hat hacking, and vulnerability testing involves
the same tools, tricks, and techniques that
criminal hackers use, but with one major
difference Ethical hacking is performed with the
targets permission in a professional
setting. The intent of ethical hacking is to
discover vulnerabilities from a malicious
attackers viewpoint to better secure systems.
Ethical hacking is part of an overall information
risk management program that allows for ongoing
security improvements. Ethical hacking can also
ensure that vendors claims about the security of
their products are legitimate. Hackers A type of
person interested in exploration,usually of a
computer. Hack (v) Cut with rough or heavy and
blows. EgHack of the dead branches . In other
words,manage or cope .Lots of people leave
because they can't hack it. List Of Some Notable
HackersKevin Mitnick Known worldwide as the
most famous hacker and for having been the
first to serve a prison sentence for infiltrating
computer systems. He started dabbling when he was
a minor, using the practice known as phone
phreaking. Although he has never worked in
programming, Mitnick is totally convinced that
you can cause severe damage with a telephone and
some calls. These days, totally distanced from
his old hobbies and after passing many years
behind bars, he works as a security consultant
for multinational companies through his company
Mitnick Security. Gary McKinnon This
41-year-old Scotsman, also known as Solo, is the
perpetrator of whats considered the biggest hack
in the history of computer science into a
military system. Not satisfied with this, in the
years 2001 and 2002, he made a mockery of the
information security of NASA itself and the
Pentagon. Currently he is at liberty awarding his
extradition to the U.S. and prohibited access to
a computer with Internet connection. Vladimir
Levin This Russian biochemist and mathematician
was accused of having committed one of the
biggest bank robberies of all times by means of
the cracking technique. From Saint Petersburg,
Levin managed to transfer funds estimated at
approximately 10 million dollars from Citibank in
New York to accounts he had opened in distant
parts of the world. He was arrested by INTERPOL
in 1995 at Heathrow airport (England). Although
he managed to rob more than 10 million dollars,
he was only sentenced to three years in prison.
Currently he is free.Kevin Poulsen Today he
may be a journalist and collaborates with
authorities to track paedophiles on the Internet,
but Poulsen has a dark past as a cracker and
phreaker. The event that brought him the most
notoriety was taking over Los Angeles phone lines
in 1990. A radio station was offering a Porsche
as a prize for whoever managed to be caller
number 102. It goes without saying that Poulsen
was the winner of the contest.Timothy LloydIn
1996, information services company Omega,
provider of NASA and the United States Navy,
suffered losses of around 10 million dollars. And
it was none other than Tim Lloyd, an x-employee
fired some weeks earlier, who was the cause of
this financial disaster. Lloyd left a virtually
activated information bomb in the companys
codes, which finally detonated July 31 of that
same year.Robert Morris Son of one of the
forerunners in the creation of the virus, in 1988
Morris managed to infect no fewer than 6,000
computers connected to the ArpaNet network (one
of the precursors to the internet) He did it from
the prestigious Massachusetts Institute of
Technology (MIT) and for his criminal activities
he earned a four year prison sentence, which was
finally reduced to community service.David
Smith Not all hackers can boast of creating the
virus that spread the fastest to computers the
width and breadth of the globe David Smith can.
In 1999, the father of the Melissa virus managed
to infect and crash 100,000 email accounts with
his malicious creation. Smith, who was thirty
years old at the time, was sentenced and freed on
bail. MafiaBoy In February of 2000, many of the
most important online companies in the US, such
as eBay, Yahoo and Amazon, suffered a technical
glitch called Denial of Service, which caused a
total of 1700 million dollars in losses. But did
these sites know that the perpetrator of the
attack was a 16 year-old Canadian who responded
to the alias MafiaBoy? Surely not, although it
didnt take them long to find out, thanks to his
bragging about his bad deed to his classmates at
school. Masters of Deception (MoD) MoD was a New
York cyber-gang that reached its apogee in the
early 90s. Under the cover of different aliases,
its biggest attacks involved taking over
telephone lines and centres of the Internet, then
still in its infancy. During this time McD
starred in the historic battles of the hackers,
along with other groups like the Legion of Doom
(LoD), as they sought to destroy each other until
the computers couldnt take it anymore. Richard
Stallman Since the early 80s when he was a
hacker specializing in artificial intelligence,
this hippie-looking New Yorker has been one of
the most active militants in favor of free
software. At MIT he firmly opposed the
privatization of the software used by the
institutes laboratory, so much so they he
created what today is known as GNU and the
concept of CopyLeft. Popular systems like Linux
utilize the GNU mode and Stallman is currently
one of the gurus of software democratization.Lis
t of some Hacker Groups1984 network liberty
allianceis a loose group of software
programmers, artists, social activists and
militants, interested in computers and networks
and considering them tools to empower and link
the various actors of the social movement around
the world. Anonymous originated in 2003 ,is a
loosely associated international network of
activist and hacktivist entities. A website
nominally associated with the group describes it
as "an internet gathering" with "a very loose and
decentralized command structure that operates on
ideas rather than directives".2 The group
became known for a series of well-publicized
publicity stunts and distributed
denial-of-service (DDoS) attacks on government,
religious, and corporate websites. Chaos Computer
Club is based in Germany and other
German-speaking countries. Famous among older
hackers.Cult of the Dead Cow also known as cDc
or cDc Communications, is a computer hacker and
DIY media organization founded in 1984 inLubbock,
Texas. The group maintains a weblog on its site,
also titled "Cult of the Dead Cow". New media are
released first through the blog, which also
features thoughts and opinions of the group's
members. Decocidio is an anonymous, autonomous
collective of hacktivists which is part of Earth
First!,a radical environmental protest
organisation, and adheres to Climate Justice
Action. In their hacks the group shows
affiliation with the autonomous Hackbloc
collective. Jester is a computer vigilante who
describes himself as grey hat hacktivist. He
claims to be responsible for attacks on
WikiLeaks, 4chan, Iranian President Mahmoud
Ahmadinejad, and Islamist websites. He claims to
be acting out of American patriotism. The Jester
uses a denial-of-service (DoS) tool known as
"XerXeS", that he claims to have developed.One of
The Jester's habits is to tweet "TANGO DOWN" on
Twitter whenever he successfully takes down a
website. LulzSec a black hat computer hacker
group that claimed responsibility for several
high profile attacks, including the compromise of
user accounts from Sony Pictures in 2011. The
group also claimed responsibility for taking the
CIA website offline. Some security professionals
have commented that LulzSec has drawn attention
to insecure systems and the dangers of password
reuse. It has gained attention due to its high
profile targets and the sarcastic messages it has
posted in the aftermath of its attacks. One of
the founders of LulzSec was a computer security
specialist who used the online moniker Sabu. The
man accused of being Sabu has helped law
enforcement track down other members of the
organization as part of a plea deal. At least
four associates of LulzSec were arrested in March
2012 as part of this investigation. British
authorities had previously announced the arrests
of two teenagers they allege are LulzSec members
T-flow and Topiary. milw0rm is a group of
"hacktivists best known for penetrating the
computers of the Bhabha Atomic Research Centre
(BARC) in Mumbai, the primary nuclear research
facility of India, on June 3, 1998.The group
conducted hacks for political reasons, including
the largest mass hack up to that time, inserting
an anti-nuclear weapons agenda and peace message
on its hacked websites. The group's logo featured
the slogan "Putting the power back in the hands
of the people. Telecomix is a decentralized
cluster of net activists, committed to the
freedom of expression. Telecomix is a name used
by both WeRebuild and Telecomix. WeRebuild is a
collaborative project used to propose and discuss
laws as well as to collect information about
politics and politicians. The Telecomix is the
operative body that executes schemes and
proposals presented by the WeRebuild. On
September 15, 2011, Telecomix diverted all
connections to the Syrian web, and redirected
internauts to a page with instructions to bypass
censorship.
Write a Comment
User Comments (0)
About PowerShow.com