Atilim üniversitesi ceh sunum
-
Upload
epicrouters -
Category
Technology
-
view
666 -
download
5
description
Transcript of Atilim üniversitesi ceh sunum
![Page 1: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/1.jpg)
EYÜP ÇELİKBilgi Teknolojileri Güvenlik
Uzmanı(IT Security Specialist)
AATTIILLIIMM
![Page 2: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/2.jpg)
Bilişim Güvenliği
1. Bilişim Güvenliğinin Önemi2. Güvenliğin Temel Dayanakları3. Hacker Sınıfları
1. White Hat Hacker (Beyaz Şapka)2. Black Hat Hacker (Siyah Şapka)
1. Lamer2. Crackers
3. Gray Hat Hacker (Gri Şapka)4. Hacking Terminolojisi5. Bilgi Güvenliği Testleri
1. Black Box (Siyah Kutu)2. White Box (Beyaz Kutu)3. Gray Box (Gri Kutu)
AATTIILLIIMM
![Page 3: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/3.jpg)
Discovery (Keşif)
1. Discovery Evresi2. Footprinting (Bilgi Toplama)
1. Nmap - Zenmap2. W3AF3. Maltego4. NsLookup5. Whois6. TraceRouth(Tracert)7. E-Mail Header8. Msn Messenger9. Robots
AATTIILLIIMM
![Page 4: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/4.jpg)
Nmap - ZenMapAATTIILLIIMM
![Page 5: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/5.jpg)
W3AFAATTIILLIIMM
![Page 6: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/6.jpg)
E-Mail HeaderAATTIILLIIMM
![Page 7: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/7.jpg)
RobotsAATTIILLIIMM
![Page 8: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/8.jpg)
Scanning (Tarama)AATTIILLIIMM
1. ICMP2. Port Scanning
1. Nmap - Zenmap2. Look@Lan3. SuperScan
![Page 9: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/9.jpg)
PING (ICMP ECHO REQUEST)AATTIILLIIMM
![Page 10: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/10.jpg)
NmapAATTIILLIIMM
![Page 11: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/11.jpg)
Look@LanAATTIILLIIMM
![Page 12: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/12.jpg)
SuperScan 3.00AATTIILLIIMM
![Page 13: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/13.jpg)
Şifre Denemeleri
1. Dictonary Attack (Sözlük Saldırısı)2. BruteForce (Deneme Yanılma)3. Hybrid4. Sosyal Mühendislik
AATTIILLIIMM
![Page 14: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/14.jpg)
Şifre Denemeleri
1. Uzaktan Şifre Denemeleri1. Netbios – SMB2. RDP3. SSH4. FTP5. Telnet6. SMTP
2. Araçlar1. Enum+2. Smbbf3. Nat4. Hydra5. Tsgrinder
AATTIILLIIMM
![Page 15: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/15.jpg)
TsgrinderAATTIILLIIMM
![Page 16: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/16.jpg)
Zararlı Kodlar
1. Virüs - Solucan2. Trojan3. Keylogger4. Binder5. Backdoor6. Shell7. Exploit8. Antivirüslerin Çalışma Mantığı
AATTIILLIIMM
![Page 17: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/17.jpg)
VirüsAATTIILLIIMM
![Page 18: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/18.jpg)
TrojanAATTIILLIIMM
![Page 19: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/19.jpg)
TrojanAATTIILLIIMM
![Page 20: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/20.jpg)
Keylogger (Yazılımsal)
AATTIILLIIMM
![Page 21: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/21.jpg)
Keylogger (Donanımsal)
AATTIILLIIMM
![Page 22: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/22.jpg)
ÖrnekAATTIILLIIMM
![Page 23: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/23.jpg)
BinderAATTIILLIIMM
![Page 24: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/24.jpg)
ShellAATTIILLIIMM
![Page 25: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/25.jpg)
ExploitAATTIILLIIMM
![Page 26: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/26.jpg)
Vulnerability Scanners
1. Acunetix2. N-Stalker3. Nessus4. Core Impact5. Shadow Security Scanner
AATTIILLIIMM
![Page 27: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/27.jpg)
AcunetixAATTIILLIIMM
![Page 28: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/28.jpg)
Shadow SSAATTIILLIIMM
![Page 29: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/29.jpg)
Saldırı Evresi
1. Servis Engelleme Saldırıları1. DOS – Flood (Denial Of Service)2. DDOS (Distrbuted Denial Of Service)3. Botnet
2. XSS (Cross Site Scripting)3. Phishing (Olta)4. SQL Injection5. PHP – Apache Sistemler
1. RFI (Remote File Include)2. LFI (Local File Include)
6. ASP – IIS Sistemler1. Msw3prt2. WebDav3. RPC DCOM Exploit
7. Unicode (Evrensel Kod) Zaafiyetlerini Kullanma8. Hafıza Taşması Saldırıları (Buffer Overflow)9. Google Hacking Database10. Zero Day Attack (0 Gün Saldırısı)
AATTIILLIIMM
![Page 30: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/30.jpg)
DOS (Smurf)AATTIILLIIMM
![Page 31: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/31.jpg)
DDOSAATTIILLIIMM
![Page 32: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/32.jpg)
XSSAATTIILLIIMM
![Page 33: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/33.jpg)
Phishing (Olta)AATTIILLIIMM
![Page 34: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/34.jpg)
SQL InjectionAATTIILLIIMM
http://testasp.vulnweb.com/Login.asp
![Page 35: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/35.jpg)
RFIAATTIILLIIMM
![Page 36: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/36.jpg)
WebDavAATTIILLIIMM
![Page 37: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/37.jpg)
DCOM RPCAATTIILLIIMM
![Page 38: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/38.jpg)
UNICODE
1. "/></a></><img src=1.gif onerror=alert(1)>
AATTIILLIIMM
2. %22%2F%3E%3C%2Fa%3E%3C%2F%3E%3Cimg%20src%3D1.gif%20onerror%3Dalert%281%29%3E
![Page 39: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/39.jpg)
Penetration Test Tools
1. BackTrack v42. Samurai Framework v9.53. MetaSploit4. Rapid7
AATTIILLIIMM
![Page 40: Atilim üniversitesi ceh sunum](https://reader035.fdocuments.net/reader035/viewer/2022081511/558993ded8b42af5758b463c/html5/thumbnails/40.jpg)
Ulusal Güvenlik
1. Kurum Güvenliği2. Siber Saldırı Senaryoları
AATTIILLIIMM