26
EYÜP ÇELİK BİLGİ TEKNOLOJİLERİ GÜVENLİK UZMANI

ETHICAL Hacking

  • Upload
    idalee

  • View
    75

  • Download
    0

Embed Size (px)

DESCRIPTION

ETHICAL Hacking. Eyüp ÇELİK BİLGİ TEKNOLOJİLERİ GÜVENLİK UZMANI. Hacking Evresi. Hacking Evresi. Password Cracking. Active Online Attack. Dictionary Attack. Brute-Force Attack. Keylogger. Donanimsal Keyloggerlar. YAZILIMSAL KEYLOGGERLAR. TROJANLAR. PaSSIVE ONLINE ATTACK. SNIFFING. - PowerPoint PPT Presentation

Citation preview

Page 1: ETHICAL  Hacking

EYÜP ÇELİKBİLGİ TEKNOLOJİLERİ GÜVENLİK

UZMANI

Page 2: ETHICAL  Hacking

Footprinting Scanning Enumeration

Hacking Gaining Access

Privilege

Escalation

Hiding Files

Cover Trackin

g

Page 3: ETHICAL  Hacking

Password Cracking

Vulnerability Management

Page 4: ETHICAL  Hacking

Active Online Attack

Passive Online Attack

Manuel Password Cracking

Page 5: ETHICAL  Hacking

Dictionary Attack

Brute-Force Attack

Hybrid Attack

Keylogger

Spyware

Trojan

Page 6: ETHICAL  Hacking
Page 7: ETHICAL  Hacking
Page 8: ETHICAL  Hacking

Donanımsal Keylogger

PC/BIOS Embedded

Keylogger Keyboard

External Keylogger• PS/2-USB Keylogger• Wi-Fi Keylogger• Bluetooth Keylogger

Yazılımsal Keylogger

Application Keylogger

Kernel Keylogger

Rootkit Keylogger

Page 9: ETHICAL  Hacking
Page 10: ETHICAL  Hacking
Page 11: ETHICAL  Hacking
Page 12: ETHICAL  Hacking

Sniffing

MITM (MAN IN THE MIDLE)

Page 13: ETHICAL  Hacking
Page 14: ETHICAL  Hacking
Page 15: ETHICAL  Hacking

Bilgi Toplama

Şifre Tahmin

Page 16: ETHICAL  Hacking

Discover Devices

Gain Access

Take Control

Page 17: ETHICAL  Hacking
Page 18: ETHICAL  Hacking
Page 19: ETHICAL  Hacking

Automated Exploitation

Manuel Exploitation

Page 20: ETHICAL  Hacking
Page 21: ETHICAL  Hacking
Page 22: ETHICAL  Hacking
Page 23: ETHICAL  Hacking

Command Shell SessionMeterpreter SessionManuel Authentication

Page 24: ETHICAL  Hacking

Yetki Yükseltme

Page 25: ETHICAL  Hacking

Rootkit

ADS (Alternate Data Stream)

Page 26: ETHICAL  Hacking

Events

Most Recent Used