ethical hacking full report
#32
ethical hacking full report

[attachment=16766]
Network Hacking :-
Network Hacking is generally means gathering information about domain by using tools like Telnet, NslookUp, Ping, Tracert, Netstat, etc.
It also includes OS Fingerprinting, Port Scaning and Port Surfing using various tools.

Most passwords can be cracked by using following techniques :

1) Hashing :- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password.If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords.
One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length.
LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately.
Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly.

2) Guessing :- Many passwords can be guessed either by humans or by sophisticated cracking programs armed with dictionaries (dictionary based) and the user's personal information.
Not surprisingly, many users choose weak passwords, usually one related to themselves in some way. Repeated research over some 40 years has demonstrated that around 40% of user-chosen passwords are readily guessable by programs. Examples of insecure choices include:


Wireless Hacking :-
Wireless networks broadcast their packets using radio frequency or optical wavelengths. A modern laptop computer can listen in. Worse, an attacker can manufacture new packets on the fly and persuade wireless stations to accept his packets as legitimate.


Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: give the ppt of ethical hacking for seminar, anybody, concordia theology, projects in ethical hacking, techmaxbook exe, horse farts reporter, ethical hacking projects,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: ethical hacking full report - by ViCkY10 - 27-01-2010, 06:15 PM
RE: ethical hacking full report - by bluejay_srs - 12-02-2010, 02:04 PM
ubgimi gpuaps cdihiu - by MichaelPn - 21-03-2014, 08:41 PM
RE: ethical hacking full report - by naga deepthi - 04-04-2010, 07:38 PM
RE: ethical hacking full report - by RAJIGILL - 07-10-2010, 11:50 AM
RE: ethical hacking full report - by projectsofme - 11-10-2010, 12:53 PM
RE: ethical hacking full report - by projectsofme - 18-10-2010, 01:04 PM
RE: ethical hacking full report - by lino - 11-11-2010, 02:51 PM
RE: ethical hacking full report - by rachana031 - 30-03-2011, 04:03 PM
RE: ethical hacking full report - by bugeorge - 29-07-2011, 08:31 PM
RE: ethical hacking full report - by prasad dp - 20-08-2011, 11:04 AM
RE: ethical hacking full report - by murali249 - 26-09-2011, 06:57 PM
RE: ethical hacking full report - by seminar addict - 28-01-2012, 12:25 PM
RE: ethical hacking ppt - by seminar addict - 30-01-2012, 03:05 PM
vvgnms pdmosy wyedsl - by MichaelPn - 19-03-2014, 08:02 AM
vweplo hizcur mrhaso - by MichaelPn - 19-03-2014, 08:02 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  computer networks full report seminar topics 8 43,924 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 31,814 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 25,972 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 27,687 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 68,065 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  broadband mobile full report project topics 7 24,491 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 42,626 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 45,375 16-09-2015, 02:51 PM
Last Post: seminar report asees
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 28,434 01-05-2015, 03:36 PM
Last Post: seminar report asees
  service oriented architecture full report project report tiger 12 14,819 27-04-2015, 01:48 PM
Last Post: seminar report asees

Forum Jump: