ETHICAL Hacking

Preview:

DESCRIPTION

ETHICAL Hacking. Eyüp ÇELİK BİLGİ TEKNOLOJİLERİ GÜVENLİK UZMANI. Hacking Evresi. Hacking Evresi. Password Cracking. Active Online Attack. Dictionary Attack. Brute-Force Attack. Keylogger. Donanimsal Keyloggerlar. YAZILIMSAL KEYLOGGERLAR. TROJANLAR. PaSSIVE ONLINE ATTACK. SNIFFING. - PowerPoint PPT Presentation

Citation preview

EYÜP ÇELİKBİLGİ TEKNOLOJİLERİ GÜVENLİK

UZMANI

Footprinting Scanning Enumeration

Hacking Gaining Access

Privilege

Escalation

Hiding Files

Cover Trackin

g

Password Cracking

Vulnerability Management

Active Online Attack

Passive Online Attack

Manuel Password Cracking

Dictionary Attack

Brute-Force Attack

Hybrid Attack

Keylogger

Spyware

Trojan

Donanımsal Keylogger

PC/BIOS Embedded

Keylogger Keyboard

External Keylogger• PS/2-USB Keylogger• Wi-Fi Keylogger• Bluetooth Keylogger

Yazılımsal Keylogger

Application Keylogger

Kernel Keylogger

Rootkit Keylogger

Sniffing

MITM (MAN IN THE MIDLE)

Bilgi Toplama

Şifre Tahmin

Discover Devices

Gain Access

Take Control

Automated Exploitation

Manuel Exploitation

Command Shell SessionMeterpreter SessionManuel Authentication

Yetki Yükseltme

Rootkit

ADS (Alternate Data Stream)

Events

Most Recent Used

Recommended