Professional Documents
Culture Documents
A Technical Seminar by
Vikas Bandaru
(2220212132)
GITAM University,
Hyderabad Campus
Contents
2. Legal Limits
3. Extreme Care
Who are Ethical Hackers?
Application Servers
Network Security
Wireless Security
Phases of Hacking
1. Reconnaissance
2. Scanning
3. Gaining Access
4. Maintaining Access
5. Clearing Tracks
Reconnaissance
Information Gathering
Sniffing the Network
Social Engineering
Types:
Active Reconnaissance – probing the network
Risky, raises suspicion
Passive Reconnaissance – without the target’s
knowledge
Social Engineering, Dumpster Diving
Scanning
• http://www.cert.org
• http://www.eccouncil.org
• http://www.ethicalhacker.net
• http://www.astalavista.com
• http://hack-o-crack.blogspot.in
• http://www.offensive-security.org
Any Queries??