You are on page 1of 15

NETWORK SECURITY

ETHICAL HACKING INDUSTRY GUIDE: Mr. Dheeraj Malhotra(N.S.A) FACULTY GUIDE: Mrs. Taru Jindal

BY VISHNU SHARMA

ABOUT HP
Hewlett-Packard Company, commonly referred to as H P, is an American multinational information technology corporation headqu artered in Palo Alto, California, USA. The company was founded in a one-car garage in Palo Alto by Stanford University classmates Bill Hewlett and Dave Pa ckard founded HP in 1939. HP specializes in developing and manufacturing computi ng, data storage, and networking hardware, designing software and delive ring services. HP is a technology company that operates in more than 170 countries around

In 2007, HP's revenue was $104 billion, making HP t he first IT Company in history to report revenues exc eeding $100 billion. Major company changes include a spin-off in 1999, w hich led to its merger with Compaq in 2002, and the acquisition o f EDS in 2008, which led to combined revenues of $1 18.4 billion in 2008 and a Fortune 500 ranking of 9 in 2009. Lo Apotheker HP's current CEO. Ray Lane, Managing Partner at Kleiner Perkins Cauf ield & Byers, is non-executive Chairman.

FACT AND FIGURES


HP ship more than 1 million printers per week. HP ship 48 million PC units annually. One out of every three servers shipped worldwide is from HP. HP Software makes calls possible for more than 300 million mobile phone customers around the globe. HP helps 50 million customers store and share over 4 billion photos online. HP supports the top 200 banks and more than 130 of the worlds major stock exchanges.

INTRODUCTION Sony Admits That Web Site Was Hacked June 4, 2011, 12:12 am By THE NEW YORK TIMES Google discloses China attack Wed Jun 1, 6:33 pm ET CBI website hacked by 'Pak Cyber Army'
Press Trust of India, Updated: December 04, 2010 22 :51 IST

Hackers Skills Exploit Developer


Operating systems Microsoft: easy target Linux Networking protocols Knowledge of routers, routing protocols Bypassing firewalls Antivirus internals Programming C, C++, Delphi Assembly PHP/ASP.Net/JSP Web Application Developme nt

COMMON SCENARIO

TRAINING PERIOD
Introduction System Hacking Foot printing Social Engineering Web Application Vulnerabilities Exploit Writing Buffer Overflow & Reverse Engg. Defence Internet Content Filtering Techniq ues ISMS Introduction Spying Technologies

Software Piracy and Warez Payloads variants Data Loss Prevention Case Studies

PROJECT
Keystroke logging (often called key logging) is the act ion of tracking (or logging) the keys struck on a keyboard, typically i n a covert manner so that the person using the keyboard is unaware tha t their actions are being monitored. TYPE OF KEYLOGGER:
SOFTWARE-BASED KEYLOGGERS HARDWARE BASED KEYLOGGERS.

HARDWARE KEYLOGGER

SOFTWARE KEYLOGGER

NETWORK SCANNER
Network enumerating is a computing activity in which user names, and info on groups, shares and servi ces of networked computers are retrieved. It should not be confused with Network mappi ng which only retrieves information about which servers are connected to a specific network and what operating system is run on them.

CONCLUSION

You might also like