際際滷

際際滷Share a Scribd company logo
CYBER HACKING DEV DAYS
Presented by AES Cyber team, Technovalley
What is hacking?
Hacking is an act of penetrating computer systems to gain
knowledge about the system and how it works. This is considered illegal
since it is like breaking into someones house.
What are Hackers?
Hackers are people who try to gain unauthorized access to
computers. This is normally done through the use of a 'backdoor'
program installed on your machine. A lot of Hackers also try to gain
access to resources through the use of password cracking software,
which tries billions of passwords to find the correct one for accessing a
computer
What damage they can do?
Hackers can see everything you are doing
Can access any file on your disk
Damage/Destroy a system
Sneak into your social media accounts
Can compromise a nations security
Can access your phone data through WIFI/Apps
Steal company secrets, deface your websites, terrorist activities and etc etc etc
...........
Can also prevent a attack by thinking like a criminal
Hi-Tech ATM Robbery In Thiruvananthapuram
http://www.ndtv.com/kerala-news/hi-tech-atm-robbery-in-
thiruvananthapuram-many-duped-1441771
http://english.manoramaonline.com/news/just-in/atm-robbery-in-
thiruvananthapuram-police-foreigners.html
http://www.deccanchronicle.com/nation/crime/090816/hi-tech-atm-robbery-
in-thiruvananthapuram.html
What are we going to Learn ?
Introduction to Ethical Hacking, Ethics, and Legality
Defining Ethical Hacking
Understanding the Purpose of Ethical Hacking
What Do Ethical Hackers Do?
Goals Attackers Try to Achieve
An Ethical Hackers Skill Set
Ethical Hacking Terminology
The Phases of Ethical Hacking
Identifying Types of Hacking Technologies
Live Demos
Shopping site hacking
CCTV hacking
System password cracking
Private data hacking
Fishing
Email threatening
Minimum Requirement
PC with active internet connection for each candidate
Minimum internet speed of 1Mbps
Confirmation QR code from Technovalley
Projector and sound system
30 Seating capacity
Benefits for Participent
EC-Council accredited Technovalley workshop certificate.
Free membership to Technovalley hacker group.
25% discount for the CEH Certification.
T-Shirt with EC-Council and Technovalley branding.
Cyber hacking dev days by aes team
About AES Cyber team
We are the accredited partner of EC-Council
EC-Council is affiliated with DOD (Department of Defence) USA, ANSI
(American National Standard Institute) USA and also affiliated with many
government bodies and organizations.
Thank you

More Related Content

What's hot (19)

Hacker
HackerHacker
Hacker
Ramasubbu .P
Hacking
HackingHacking
Hacking
Asma Khan
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2
Mian Khayyam
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
Rwik Kumar Dutta
PowerPoint Presentation: Hacking
PowerPoint Presentation: HackingPowerPoint Presentation: Hacking
PowerPoint Presentation: Hacking
BareetSingh
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
hamza javed
Hacking
HackingHacking
Hacking
j naga sai
Hacking
HackingHacking
Hacking
Ravi Raj
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
Michael Asres
Hacking
HackingHacking
Hacking
Rahul Pandit
Hacking Technology
Hacking Technology Hacking Technology
Hacking Technology
soukigirishkumar1
Internet security tutorial
Internet security tutorialInternet security tutorial
Internet security tutorial
iuvmtech
Hackers
HackersHackers
Hackers
ohHELLOmynameisTOMMY
Hacking
Hacking Hacking
Hacking
Nafeesa Naeem
Hacking
HackingHacking
Hacking
akam bajalan
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
miltonnancy
Hacking and privacy threats
Hacking and privacy threatsHacking and privacy threats
Hacking and privacy threats
BahaarAbdullah
Hacking
HackingHacking
Hacking
yashasvisingh43
Mohammed Al Hadi Hacking And Hackers
Mohammed Al Hadi Hacking And HackersMohammed Al Hadi Hacking And Hackers
Mohammed Al Hadi Hacking And Hackers
GoldenPartsAE101
Hacking and its types V2
Hacking and its types V2Hacking and its types V2
Hacking and its types V2
Mian Khayyam
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
Rwik Kumar Dutta
PowerPoint Presentation: Hacking
PowerPoint Presentation: HackingPowerPoint Presentation: Hacking
PowerPoint Presentation: Hacking
BareetSingh
Hacking and its types
Hacking and its typesHacking and its types
Hacking and its types
hamza javed
Hacking
HackingHacking
Hacking
Ravi Raj
Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)Cybercrime (Computer Hacking)
Cybercrime (Computer Hacking)
Michael Asres
Internet security tutorial
Internet security tutorialInternet security tutorial
Internet security tutorial
iuvmtech
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
miltonnancy
Hacking and privacy threats
Hacking and privacy threatsHacking and privacy threats
Hacking and privacy threats
BahaarAbdullah
Mohammed Al Hadi Hacking And Hackers
Mohammed Al Hadi Hacking And HackersMohammed Al Hadi Hacking And Hackers
Mohammed Al Hadi Hacking And Hackers
GoldenPartsAE101

Similar to Cyber hacking dev days by aes team (20)

Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
Nargis Parveen
Hacking
HackingHacking
Hacking
NishaPariyar
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptxJshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
atulkumaratulkumar18
ethical hacking
ethical hackingethical hacking
ethical hacking
samprada123
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
cyber cure
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
Jaishreeethicalhackingppt-171011183223.pptx
Jaishreeethicalhackingppt-171011183223.pptxJaishreeethicalhackingppt-171011183223.pptx
Jaishreeethicalhackingppt-171011183223.pptx
jaiswalanita056588
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
Shravan Sanidhya
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
Waseem Rauf
Ethical hacking for information security
Ethical hacking for information securityEthical hacking for information security
Ethical hacking for information security
Jayanth Vinay
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
Umesh Mahawar
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Chetanmalviya8
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Shivam Sahu
Hacking
HackingHacking
Hacking
VipinYadav257
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Md Mudassir
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
VaishnaviKhandelwal6
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
Shawon Raffi
Hacking and its terms
Hacking and its termsHacking and its terms
Hacking and its terms
kunalverma12345
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Alapan Banerjee
Ethical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptxEthical hacking Chapter 1 - Overview.pptx
Ethical hacking Chapter 1 - Overview.pptx
Nargis Parveen
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptxJshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
Jshsh jyaya uuha b8avba usbsusbus sjsjjk.pptx
atulkumaratulkumar18
ethical hacking
ethical hackingethical hacking
ethical hacking
samprada123
Summer training in jaipur
Summer training in jaipurSummer training in jaipur
Summer training in jaipur
cyber cure
CSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptxCSSE-Ethical-Hacking-ppt.pptx
CSSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
Jaishreeethicalhackingppt-171011183223.pptx
Jaishreeethicalhackingppt-171011183223.pptxJaishreeethicalhackingppt-171011183223.pptx
Jaishreeethicalhackingppt-171011183223.pptx
jaiswalanita056588
Presentation on Ethical Hacking ppt
Presentation on Ethical Hacking pptPresentation on Ethical Hacking ppt
Presentation on Ethical Hacking ppt
Shravan Sanidhya
Fundamental of ethical hacking
Fundamental of ethical hackingFundamental of ethical hacking
Fundamental of ethical hacking
Waseem Rauf
Ethical hacking for information security
Ethical hacking for information securityEthical hacking for information security
Ethical hacking for information security
Jayanth Vinay
Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)Ethical Hacking PPT (CEH)
Ethical Hacking PPT (CEH)
Umesh Mahawar
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
VishnuVarma47
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)PowerPoint Presentation On Ethical Hacking in Brief (Simple)
PowerPoint Presentation On Ethical Hacking in Brief (Simple)
Shivam Sahu
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Md Mudassir
Ethical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu aroraEthical hacking ppt by shantanu arora
Ethical hacking ppt by shantanu arora
VaishnaviKhandelwal6
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
Shawon Raffi
Hacking and its terms
Hacking and its termsHacking and its terms
Hacking and its terms
kunalverma12345

More from ABIN VARGHESE (10)

Water Pollution
Water PollutionWater Pollution
Water Pollution
ABIN VARGHESE
Step count sensor
Step count sensorStep count sensor
Step count sensor
ABIN VARGHESE
Technovalley RedHat
Technovalley RedHatTechnovalley RedHat
Technovalley RedHat
ABIN VARGHESE
Smart Remote
Smart RemoteSmart Remote
Smart Remote
ABIN VARGHESE
Entrepreneurship Development Programme
Entrepreneurship Development ProgrammeEntrepreneurship Development Programme
Entrepreneurship Development Programme
ABIN VARGHESE
WiFi Cluster Block Diagram
WiFi Cluster Block DiagramWiFi Cluster Block Diagram
WiFi Cluster Block Diagram
ABIN VARGHESE
ATM based cluster Wi-Fi & locker system
ATM based cluster Wi-Fi & locker systemATM based cluster Wi-Fi & locker system
ATM based cluster Wi-Fi & locker system
ABIN VARGHESE
Autonomous drone project part 1
Autonomous drone project part 1Autonomous drone project part 1
Autonomous drone project part 1
ABIN VARGHESE
Intelligent irrigation system
Intelligent irrigation systemIntelligent irrigation system
Intelligent irrigation system
ABIN VARGHESE
Research and research methodology
Research and research methodologyResearch and research methodology
Research and research methodology
ABIN VARGHESE
Step count sensor
Step count sensorStep count sensor
Step count sensor
ABIN VARGHESE
Technovalley RedHat
Technovalley RedHatTechnovalley RedHat
Technovalley RedHat
ABIN VARGHESE
Entrepreneurship Development Programme
Entrepreneurship Development ProgrammeEntrepreneurship Development Programme
Entrepreneurship Development Programme
ABIN VARGHESE
WiFi Cluster Block Diagram
WiFi Cluster Block DiagramWiFi Cluster Block Diagram
WiFi Cluster Block Diagram
ABIN VARGHESE
ATM based cluster Wi-Fi & locker system
ATM based cluster Wi-Fi & locker systemATM based cluster Wi-Fi & locker system
ATM based cluster Wi-Fi & locker system
ABIN VARGHESE
Autonomous drone project part 1
Autonomous drone project part 1Autonomous drone project part 1
Autonomous drone project part 1
ABIN VARGHESE
Intelligent irrigation system
Intelligent irrigation systemIntelligent irrigation system
Intelligent irrigation system
ABIN VARGHESE
Research and research methodology
Research and research methodologyResearch and research methodology
Research and research methodology
ABIN VARGHESE

Recently uploaded (20)

MIPLM subject matter expert Dr Alihan Kaya
MIPLM subject matter expert Dr Alihan KayaMIPLM subject matter expert Dr Alihan Kaya
MIPLM subject matter expert Dr Alihan Kaya
MIPLM
compiler design BCS613C question bank 2022 scheme
compiler design BCS613C question bank 2022 schemecompiler design BCS613C question bank 2022 scheme
compiler design BCS613C question bank 2022 scheme
Suvarna Hiremath
General Quiz at Maharaja Agrasen College | Amlan Sarkar | Prelims with Answer...
General Quiz at Maharaja Agrasen College | Amlan Sarkar | Prelims with Answer...General Quiz at Maharaja Agrasen College | Amlan Sarkar | Prelims with Answer...
General Quiz at Maharaja Agrasen College | Amlan Sarkar | Prelims with Answer...
Amlan Sarkar
MICROECONOMICS: RENT AND THEORIES OF RENT
MICROECONOMICS: RENT AND THEORIES OF RENTMICROECONOMICS: RENT AND THEORIES OF RENT
MICROECONOMICS: RENT AND THEORIES OF RENT
DrSundariD
Antifungal agents by Mrs. Manjushri Dabhade
Antifungal agents by Mrs. Manjushri DabhadeAntifungal agents by Mrs. Manjushri Dabhade
Antifungal agents by Mrs. Manjushri Dabhade
Dabhade madam Dabhade
Week 6 - EDL 290F - No Drop Ride (2025).pdf
Week 6 - EDL 290F - No Drop Ride (2025).pdfWeek 6 - EDL 290F - No Drop Ride (2025).pdf
Week 6 - EDL 290F - No Drop Ride (2025).pdf
Liz Walsh-Trevino
CLEFT LIP AND PALATE: NURSING MANAGEMENT.pptx
CLEFT LIP AND PALATE: NURSING MANAGEMENT.pptxCLEFT LIP AND PALATE: NURSING MANAGEMENT.pptx
CLEFT LIP AND PALATE: NURSING MANAGEMENT.pptx
PRADEEP ABOTHU
DUODENUM ANATOMY & Clinical Anatomy.pptx
DUODENUM ANATOMY & Clinical Anatomy.pptxDUODENUM ANATOMY & Clinical Anatomy.pptx
DUODENUM ANATOMY & Clinical Anatomy.pptx
Sid Roy
EDL 290F Week 5 - Facing Headwinds and Hairpin Turns (2025).pdf
EDL 290F Week 5  - Facing Headwinds and Hairpin Turns (2025).pdfEDL 290F Week 5  - Facing Headwinds and Hairpin Turns (2025).pdf
EDL 290F Week 5 - Facing Headwinds and Hairpin Turns (2025).pdf
Liz Walsh-Trevino
STOMACH Gross Anatomy & Clinical Anatomy.pptx
STOMACH Gross Anatomy & Clinical Anatomy.pptxSTOMACH Gross Anatomy & Clinical Anatomy.pptx
STOMACH Gross Anatomy & Clinical Anatomy.pptx
Sid Roy
20250402 ACCA TeamScienceAIEra 20250402 v10.pptx
20250402 ACCA TeamScienceAIEra 20250402 v10.pptx20250402 ACCA TeamScienceAIEra 20250402 v10.pptx
20250402 ACCA TeamScienceAIEra 20250402 v10.pptx
home
Gold Spot Dairy Store Jordan Minnesota 55352
Gold Spot Dairy Store Jordan Minnesota 55352Gold Spot Dairy Store Jordan Minnesota 55352
Gold Spot Dairy Store Jordan Minnesota 55352
Forklift Trucks in Minnesota
Pass SAP C_C4H47_2503 in 2025 | Latest Exam Questions & Study Material
Pass SAP C_C4H47_2503 in 2025 | Latest Exam Questions & Study MaterialPass SAP C_C4H47_2503 in 2025 | Latest Exam Questions & Study Material
Pass SAP C_C4H47_2503 in 2025 | Latest Exam Questions & Study Material
Jenny408767
Introduction to Systematic Reviews - Prof Ejaz Khan
Introduction to Systematic Reviews - Prof Ejaz KhanIntroduction to Systematic Reviews - Prof Ejaz Khan
Introduction to Systematic Reviews - Prof Ejaz Khan
Systematic Reviews Network (SRN)
Karin Clavel - Collection Wall: Inspiring connection and collaboration
Karin Clavel - Collection Wall: Inspiring connection and collaborationKarin Clavel - Collection Wall: Inspiring connection and collaboration
Karin Clavel - Collection Wall: Inspiring connection and collaboration
voginip
Unit 3: Combustion in Spark Ignition Engines
Unit 3: Combustion in Spark Ignition EnginesUnit 3: Combustion in Spark Ignition Engines
Unit 3: Combustion in Spark Ignition Engines
NileshKumbhar21
Knownsense 2025 prelims- U-25 General Quiz.pdf
Knownsense 2025 prelims- U-25 General Quiz.pdfKnownsense 2025 prelims- U-25 General Quiz.pdf
Knownsense 2025 prelims- U-25 General Quiz.pdf
Pragya - UEM Kolkata Quiz Club
Different perspectives on dugout canoe heritage of Soomaa.pdf
Different perspectives on dugout canoe heritage of Soomaa.pdfDifferent perspectives on dugout canoe heritage of Soomaa.pdf
Different perspectives on dugout canoe heritage of Soomaa.pdf
Aivar Ruukel
Urinary Tract Infection & Sexually Transmt ted Diseases.pptx
Urinary Tract Infection & Sexually Transmt ted Diseases.pptxUrinary Tract Infection & Sexually Transmt ted Diseases.pptx
Urinary Tract Infection & Sexually Transmt ted Diseases.pptx
Ashish Umale
MIPLM subject matter expert Dr Alihan Kaya
MIPLM subject matter expert Dr Alihan KayaMIPLM subject matter expert Dr Alihan Kaya
MIPLM subject matter expert Dr Alihan Kaya
MIPLM
compiler design BCS613C question bank 2022 scheme
compiler design BCS613C question bank 2022 schemecompiler design BCS613C question bank 2022 scheme
compiler design BCS613C question bank 2022 scheme
Suvarna Hiremath
General Quiz at Maharaja Agrasen College | Amlan Sarkar | Prelims with Answer...
General Quiz at Maharaja Agrasen College | Amlan Sarkar | Prelims with Answer...General Quiz at Maharaja Agrasen College | Amlan Sarkar | Prelims with Answer...
General Quiz at Maharaja Agrasen College | Amlan Sarkar | Prelims with Answer...
Amlan Sarkar
MICROECONOMICS: RENT AND THEORIES OF RENT
MICROECONOMICS: RENT AND THEORIES OF RENTMICROECONOMICS: RENT AND THEORIES OF RENT
MICROECONOMICS: RENT AND THEORIES OF RENT
DrSundariD
Antifungal agents by Mrs. Manjushri Dabhade
Antifungal agents by Mrs. Manjushri DabhadeAntifungal agents by Mrs. Manjushri Dabhade
Antifungal agents by Mrs. Manjushri Dabhade
Dabhade madam Dabhade
Week 6 - EDL 290F - No Drop Ride (2025).pdf
Week 6 - EDL 290F - No Drop Ride (2025).pdfWeek 6 - EDL 290F - No Drop Ride (2025).pdf
Week 6 - EDL 290F - No Drop Ride (2025).pdf
Liz Walsh-Trevino
CLEFT LIP AND PALATE: NURSING MANAGEMENT.pptx
CLEFT LIP AND PALATE: NURSING MANAGEMENT.pptxCLEFT LIP AND PALATE: NURSING MANAGEMENT.pptx
CLEFT LIP AND PALATE: NURSING MANAGEMENT.pptx
PRADEEP ABOTHU
DUODENUM ANATOMY & Clinical Anatomy.pptx
DUODENUM ANATOMY & Clinical Anatomy.pptxDUODENUM ANATOMY & Clinical Anatomy.pptx
DUODENUM ANATOMY & Clinical Anatomy.pptx
Sid Roy
EDL 290F Week 5 - Facing Headwinds and Hairpin Turns (2025).pdf
EDL 290F Week 5  - Facing Headwinds and Hairpin Turns (2025).pdfEDL 290F Week 5  - Facing Headwinds and Hairpin Turns (2025).pdf
EDL 290F Week 5 - Facing Headwinds and Hairpin Turns (2025).pdf
Liz Walsh-Trevino
STOMACH Gross Anatomy & Clinical Anatomy.pptx
STOMACH Gross Anatomy & Clinical Anatomy.pptxSTOMACH Gross Anatomy & Clinical Anatomy.pptx
STOMACH Gross Anatomy & Clinical Anatomy.pptx
Sid Roy
20250402 ACCA TeamScienceAIEra 20250402 v10.pptx
20250402 ACCA TeamScienceAIEra 20250402 v10.pptx20250402 ACCA TeamScienceAIEra 20250402 v10.pptx
20250402 ACCA TeamScienceAIEra 20250402 v10.pptx
home
Pass SAP C_C4H47_2503 in 2025 | Latest Exam Questions & Study Material
Pass SAP C_C4H47_2503 in 2025 | Latest Exam Questions & Study MaterialPass SAP C_C4H47_2503 in 2025 | Latest Exam Questions & Study Material
Pass SAP C_C4H47_2503 in 2025 | Latest Exam Questions & Study Material
Jenny408767
Karin Clavel - Collection Wall: Inspiring connection and collaboration
Karin Clavel - Collection Wall: Inspiring connection and collaborationKarin Clavel - Collection Wall: Inspiring connection and collaboration
Karin Clavel - Collection Wall: Inspiring connection and collaboration
voginip
Unit 3: Combustion in Spark Ignition Engines
Unit 3: Combustion in Spark Ignition EnginesUnit 3: Combustion in Spark Ignition Engines
Unit 3: Combustion in Spark Ignition Engines
NileshKumbhar21
Different perspectives on dugout canoe heritage of Soomaa.pdf
Different perspectives on dugout canoe heritage of Soomaa.pdfDifferent perspectives on dugout canoe heritage of Soomaa.pdf
Different perspectives on dugout canoe heritage of Soomaa.pdf
Aivar Ruukel
Urinary Tract Infection & Sexually Transmt ted Diseases.pptx
Urinary Tract Infection & Sexually Transmt ted Diseases.pptxUrinary Tract Infection & Sexually Transmt ted Diseases.pptx
Urinary Tract Infection & Sexually Transmt ted Diseases.pptx
Ashish Umale

Cyber hacking dev days by aes team

  • 1. CYBER HACKING DEV DAYS Presented by AES Cyber team, Technovalley
  • 2. What is hacking? Hacking is an act of penetrating computer systems to gain knowledge about the system and how it works. This is considered illegal since it is like breaking into someones house.
  • 3. What are Hackers? Hackers are people who try to gain unauthorized access to computers. This is normally done through the use of a 'backdoor' program installed on your machine. A lot of Hackers also try to gain access to resources through the use of password cracking software, which tries billions of passwords to find the correct one for accessing a computer
  • 4. What damage they can do? Hackers can see everything you are doing Can access any file on your disk Damage/Destroy a system Sneak into your social media accounts Can compromise a nations security Can access your phone data through WIFI/Apps Steal company secrets, deface your websites, terrorist activities and etc etc etc ........... Can also prevent a attack by thinking like a criminal
  • 5. Hi-Tech ATM Robbery In Thiruvananthapuram http://www.ndtv.com/kerala-news/hi-tech-atm-robbery-in- thiruvananthapuram-many-duped-1441771 http://english.manoramaonline.com/news/just-in/atm-robbery-in- thiruvananthapuram-police-foreigners.html http://www.deccanchronicle.com/nation/crime/090816/hi-tech-atm-robbery- in-thiruvananthapuram.html
  • 6. What are we going to Learn ? Introduction to Ethical Hacking, Ethics, and Legality Defining Ethical Hacking Understanding the Purpose of Ethical Hacking What Do Ethical Hackers Do? Goals Attackers Try to Achieve An Ethical Hackers Skill Set Ethical Hacking Terminology The Phases of Ethical Hacking Identifying Types of Hacking Technologies
  • 7. Live Demos Shopping site hacking CCTV hacking System password cracking Private data hacking Fishing Email threatening
  • 8. Minimum Requirement PC with active internet connection for each candidate Minimum internet speed of 1Mbps Confirmation QR code from Technovalley Projector and sound system 30 Seating capacity
  • 9. Benefits for Participent EC-Council accredited Technovalley workshop certificate. Free membership to Technovalley hacker group. 25% discount for the CEH Certification. T-Shirt with EC-Council and Technovalley branding.
  • 11. About AES Cyber team We are the accredited partner of EC-Council EC-Council is affiliated with DOD (Department of Defence) USA, ANSI (American National Standard Institute) USA and also affiliated with many government bodies and organizations.