Etchcal Hacking and Cyber Crime Investigation

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 24

Ethical Hacking IT Security, Cyber Crime

Investigation & Penetration Testing


Mr. Vishwesh.S.Satapute
Co-Founder Cypherkode Infosec

#whoami
Pen-Tester Trainer (OSCP).
Interested in finding loop holes in networks.
Learning some new concepts and ninja techniques.
Pursuing my BE in Computer Engineering (RGIT,
Versova).
Interested in hardware hacking.

What is Hacking?

TYPE OF H@CK3rS
WHITE HAT

Hacking - Process
Foot Printing
Scanning
Gaining Access
Maintaining Access

HACKING VS CRACKING
Hacker
The person who hack
Cracker
System intruder/destroyer

Hacking with malicious intention is cracking.


The basic difference is hackers do not do anything
disastrous.
Cracking yield more devastating results.
Cracking is crime.
Cyber crime are the results of cracking ,not hacking

How you all use


Which are your famous sites ?
How you share your information on
social media sites ?
Social Engineering

Attacking Method

#CYBER CRIMES
List of cyber crimes are as follows: Hacking of computer systems and
networks.
Financial crimes such as siphoning of
money from banks, credit card
frauds, money laundering.
Cyber pornography involving
production & distribution of
pornographic material, including
child pornography.

#CYBER CRIMES
Online Gambling, Launching of virus, worms,
Trojans , DOS Attack, Sale of illegal articles
such as narcotics, weapons, wildlife, etc.
Harassments such as cyber stalking, cyber
defamation, indecent and abusing mails.
Intellectual property crimes such as theft of
computer source code, software piracy,
copyright infringement, trademark violations.

#Indian Hackers

ATMS.
Jobs.
ACROSS INDIA level fraud.
Target any age group.

Scams & Frauds


How hackers use Facebook.
Recent cyber crimes using Facebook.
Facebook records all information.
Securing Facebook by filters.

#Cyber Crime in
Organizations
Spam mails.
Theft of source code.
Exchange of business secrets and
documents.
Insider attacks on personal database.
Use of office computer for running other
business.
External cyber attacks on an organization
resulting in denial-of-service.

#Cyber Warfare
Cyberwarfare is any virtual conflict
initiated as a politically motivated
attack on an enemy's computer and
information systems.
Waged via the Internet, these attacks
disable financial and organizational
systems by stealing or altering
classified data to undermine
networks, websites and services.

#Cyber Warfare Attacks


The Original Logic Bomb.
Moonlight Maze.
Titan Rain.

#Cyber Warfare India VS


Pakistan
Why India is the weaker side?

#Safe Guard Yourself

Information : general not specific.


TP Ids.
Insta-alert facility: Credit card n banks.
DO NOT TRUST ANYONE.
Social engg, pictures, 2 ids same person.
Always LOGOUT or SIGNOUT.
WI-FI security.
HTTPS & LOCK.

#Personal Information
Leaks
Personal information
identifies you, your location
or your financial assets.
Known: name, age, sex,
picture, phone number,
address, ID numbers such as
SSN, Bank Account Numbers,
Credit Card Numbers.
Less Unknowns: hobbies,
interests, school mascot,
gaming identities.
This info can be used for
phishing scams/pretexting.

#Network Pentesting

#Basic Pentest

#Safety Punchs :P
Do not share personal information such as your
name, age, sex, picture, location Etc.
Create nicknames that do not reflect your own
name or anything personal.
Never respond to online communication that is
inappropriate.
Never agree to meet in person someone you met
online.
Never open e-mails from people you do not know.
Never click on links you dont know about it.

#Connect me
Email: Vishwesh.satapute[at]cypherkode[dot]com
Vsatapute[at]gmail[dot]com

Facebook: www.facebook.com/funkymalware
www.facebook.com/CypherkodeInfosec

Mobile & Whatsapp:- +91 9768036518


Website:- www.cypherkode.com (UC)

You might also like