Beruflich Dokumente
Kultur Dokumente
Who is a Hacker ?
HACKER
TYPES OF HACKER
White
hat
Grey hat
Blue Hat
Black Hat
Script kiddie
Hacktivist
SCRIPT KIDDIE
A person
Hacktivist
Hacktivism
engineering.
Password cracking .
Packet and password
sniffing.
IP spoofing .
Trojan Horses .
Worms & Viruses.
Trap Door or back door.
TCP-SYN flooding.
SCOCIAL ENGINEERING
Password Cracking
IP SPOOFING
TROZAN HORSES
Working Of Viruses
TCP-SYN Flooding
When a system (called the client) attempts to establish a TCP
connection to a system providing a service (the server), the
client and server exchange a set sequence of messages .
Firewalls
Password Protection and generation of
safe passwords
Encryption
IP spoofing and SYN-flooding
IP Restriction
Education and awareness
Internet Firewalls
Firewalls
Shadow password
Generation of "secure" passwords
Encryption
Encryption
IP Restriction
IP Restriction
A FIREWALLS PROTECTION
Conclusion
The only system which is truly secure is one
which is switched off and unplugged, locked in a
titanium lined safe, buried in a concrete bunker,
and is surrounded by nerve gas and very highly
paid armed guards. Even then, I wouldn't stake
my life on it."
It is true that we cant finish hacking but its true
that we can stop Hacking.
THANK YOU!!!