ethical hacking full report
#24
Presented By-
Nikhil Singh(54)
Anshu Gupta(16)
Julee Dutta(59)

Ethical Hacking
PHASES OF HACKING
Reconnaissance- preparatory phase ,gather information
Scanning-scan target system
Gaining Access-vulnerability discovered ,real hacking
Maintaining Access-active access for future attack
Covering Tracks-remove all traces of attack
Using free Sites
WEB SERVER
WAYS OF DOS ATTACK
PING OF DEATH
TEARDROP
SYN ATTACK
LAND ATTACK
PING OF DEATH
In this attack, the target system is pinged with a data packet that exceeds the maximum bytes allowed by TCP/IP, which is 65 536. This would have almost always caused the remote system to hang, reboot or crash.

The following Ping command creates a giant datagram of the size 65540 for Ping. It might hang the victim's computer:
C:\windows>ping -l 65540
TEARDROP ATTACK
The Teardrop attack exploits the vulnerability present in the reassembling of data packets.
Consider the following scenario-: (Note: _ _ _ = 1 Data Packet)
Normally a system receives data packets in the following form, with no overlapping Offset values.
_ _ _ _ _ _ _ _ _
(1 to 1500 bytes) (1501 to 3000 bytes) (3001 to 4500 bytes)
 
Now in a Teardrop attack, the data packets are sent to the target computer in the following format:
_ _ _ _ _ _ _ _ _
(1 to 1500 bytes) (1500 to 3000 bytes) (1001 to 3600 bytes)
When the target system receives something like the above, it simply cannot handle it and will crash or hang or reboot.
SYN ATTACK
The SYN attack exploits TCP/IP's three-way handshake. Thus in order to understand as to how SYN Attacks work, you need to first knows how TCP/IP establishes a connection between two systems.
1. Client --------SYN Packet--------------à Host
2. Host -------------SYN/ACK Packet----------à Client
3. Client --------------ACK-----------------------à Host
In a SYN attack, several SYN packets are sent to the server but all these SYN packets have a bad source IP Address.
They queue up, use up resources and memory or the target system and eventually crash, hang or reboot the system.
Land Attacks
A Land attack is similar to a SYN attack, the only difference being that instead of a bad IP Address, the IP address of the target system itself is used. This creates an infinite loop between the target system and the target system itself.
CALL FORGING
SMS FORGING

Technology Involved
Routing the sms through international gateways.
Message id is spoofed at international gateway.
Finally SMS is routed to destination SMs centre number.
As there is no authentication involved ,it is sent to destination number with spoofed id
your credit card number to any site that is not secured, to guard against frauds.
It is better to use a security program that gives control over the cookies and send information back to the sites as leaving the cookies unguarded might prove fatal
Website owners should watch traffic and check any irregularity on the site.Putting host-based intrusion detection devices on the server may do this.
Use of firewalls may be beneficial.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: clifford simak, ethical hacking ideas, we hire, ethical use of computer technology, funy jokes for freshar fairwel, peace ethical, techmaxbook exe,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: ethical hacking full report - by ViCkY10 - 27-01-2010, 06:15 PM
RE: ethical hacking full report - by bluejay_srs - 12-02-2010, 02:04 PM
ubgimi gpuaps cdihiu - by MichaelPn - 21-03-2014, 08:41 PM
RE: ethical hacking full report - by naga deepthi - 04-04-2010, 07:38 PM
RE: ethical hacking full report - by RAJIGILL - 07-10-2010, 11:50 AM
RE: ethical hacking full report - by projectsofme - 11-10-2010, 12:53 PM
RE: ethical hacking full report - by projectsofme - 18-10-2010, 01:04 PM
RE: ethical hacking full report - by lino - 11-11-2010, 02:51 PM
RE: ethical hacking full report - by rachana031 - 30-03-2011, 04:03 PM
RE: ethical hacking full report - by smart paper boy - 24-06-2011, 10:52 AM
RE: ethical hacking full report - by bugeorge - 29-07-2011, 08:31 PM
RE: ethical hacking full report - by prasad dp - 20-08-2011, 11:04 AM
RE: ethical hacking full report - by murali249 - 26-09-2011, 06:57 PM
RE: ethical hacking ppt - by seminar addict - 30-01-2012, 03:05 PM
vvgnms pdmosy wyedsl - by MichaelPn - 19-03-2014, 08:02 AM
vweplo hizcur mrhaso - by MichaelPn - 19-03-2014, 08:02 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 43,924 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 31,814 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 25,972 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 27,687 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 68,065 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  broadband mobile full report project topics 7 24,491 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 42,626 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 45,375 16-09-2015, 02:51 PM
Last Post: seminar report asees
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 28,434 01-05-2015, 03:36 PM
Last Post: seminar report asees
  service oriented architecture full report project report tiger 12 14,819 27-04-2015, 01:48 PM
Last Post: seminar report asees

Forum Jump: