Title: CEH workshop by CS Infotech
1ltinc0gnito /gt
2Introduction to Information Security
3Hacking in general
Is hacking illegal??
- You can be punished if-
- You are hacking someone
- You are planning to hack someone
- You are thinking to hack someone
4Two Content Layout with Table
Types of Hackers
White hat
Grey Hat
- First bullet point here
- Second bullet point here
- Third bullet point here
Class Group 1 Group 2
Class 1 82 95
Class 2 76 88
Class 3 84 90
Black Hat
5Other types of hackers
- Elites
- Script Kiddies
- Neophyte
- Blue Hat
- Hacktavist
- Nation State
- Organised Criminal Gangs
6Networking Basics
- Types of Network
- LAN
- WAN
- MAN
- Protocols
- HTTP
- HTTPs
- TCP/IP
- UDP
- SMTP
- SMTPs
- DNS
- FTP
7Information Gathering
- google dorks
- who-is
- social networking sites
- wappalyzer
- janta khoj
- pipl
- shodan
- maltego
- etc
8(No Transcript)
9Gmail Hacking
10Call forging, email spoofing, IP Spoofing, MAC
Spoofing
11Social Engineering
Any act that influences a person to take action
that may or may not be in their best interest.
12But why social engineering attacks happen?
13Why do social engineering ?
14Phishing
Phishing attack happens when someone tries to
trick you into sharing personal information
online. These attacks are one of the highest
visibility problems for banking and e-commerce
sites with the potential to destroy a customers
livelihood.
15(No Transcript)
16(No Transcript)
17(No Transcript)
18STEGANOGRAPHY
- Hiding text in plain sight
19Malware
20Types of Malware
- Virus
- Worm
- Trojan
- Backdoor
- Adware
- BOTNET
- Vulnerability
- Exploit
21Data Tampering
22SQL Injection
23SQL Injection
24XSS
25Port Scanning
26Metasploit
27Wireless Security
28(No Transcript)
29For workshops you can contact us onD-24, Lower
Ground Kalka JiNew Delhi (110019), Indiaor
give us a call on 91-9990303336 011-41066768
or mail us on hr_at_csinfotech.org
,query_at_csinfotech.org
30(No Transcript)