You are on page 1of 54

AAKANKSHA INTERNATIONAL SCHOOL-THE GURUKUL, NAGAUR

ETHICAL HACKING WORKSHOP BY RAJAN KHANDELWAL(CYBER CRIME SECURITY EXPERT CERTIFIED) SACHIN PUNIYA (TRAINER UNDER ANKIT FADIYA & SUNNY VAGELA)

S OEN GMAIL .COM


S RIGHT CLICK ON IT OR PRESS CONTROL+U. S ITS PAGE SOURCE VIEW COPY ALL THE PAGE

S OPEN NOTEPAD AND PASTE IT


S EDIT FIND ACTION CHANGE FILE TO NOKIA.PHP S AND SAVE THAT FILE AS GMAIL.HTML S NOW THAT FILE IS ON LOCAL MACHINE BUT TO

SEND THAT TO ANY VICTIM WE SHOULD HAVE TO UPLOAD THAT ON ANY WESITE THROUGH WHICH IT WOULD BE GETTING LINKED.

S ANY WEBHOSTING SITE

S WWW.T35.COM,WWW.110MB.COM,WWW.BYTEHOSTI

NG.COM,000WEBHOST.COM
S MAKE YOUR ACCOUNT THEN GO TO CONTROL

PANEL FILE MANAGER


MAKE NEW FOLDER MAKE NEW DIRECTORY UPLOAD NOKIA.PHP FILE ,GMAIL.HTML(FAKE

PAGE).

S What is key logger?

It is a tool which keeps record of what ever you write on


pc or notepad file username password etc.

Two types of key logger


1.local key logger family key logger. 2.remote key logger general keylogger.

S It is science of hiding information. S It is hiding text files in pictures audio mp3 files ,video

files.
S Basically used by terrorist in 9/11 attacks on USA

S When u find admin age then u need to enter username

password
S Write 'or' '= in user Name n password Field
S Use proxies while hacking S If time Left i Will teach You error based SQL injection and

xss vulnrabilits

You might also like