Κακόβουλο λογισμικό, active hacking, passive hacking.
Malware, active hacking, passive hacking.
View/ Open
Date
2017-01-12Author
Καραντωνάκης, Γεώργιος
Karantonakis, Georgios
Metadata
Show full item recordAbstract
Ο σκοπός αυτής της πτυχιακής είναι να αναδείξει κάποιες τεχνικές hacking είτε από κακόβουλο
λογισµικό είτε από µια γκάµα εξειδικευµένων εργαλείων για τέτοιες δουλειές όπως το λειτουργικό σύστηµα kali linux. In the first chapter we will cover theoretical background. -What are hackers, hacker types and hacking history.-What is hacking, active hacking, passive hacking. -What is malicious software, different malware types.-Malware infects target in the form of Trojan horse thus creating a botnet. -Malicius Trojan horse software infects target through a game and begins to monitor and record what the user types.In the third chapter will follow practical techniques. -Breaking wpa2 personal LANs and after techniques of the man in the middle in other computer systems. -Attacks on PCs with backdoor implantation techniques and access the machine by Metasploit Framework platform. -Sql injection attacks into vunerable websites for extracting information from databases.
Collections
The following license files are associated with this item:
This website uses cookies to ensure you get the best browsing experience.
Continue
More info