2017-01-172017-01-172017-01-12http://hdl.handle.net/20.500.12688/8019Ο σκοπός αυτής της πτυχιακής είναι να αναδείξει κάποιες τεχνικές hacking είτε από κακόβουλο λογισµικό είτε από µια γκάµα εξειδικευµένων εργαλείων για τέτοιες δουλειές όπως το λειτουργικό σύστηµα kali linux.In the first chapter we will cover theoretical background. -What are hackers, hacker types and hacking history.-What is hacking, active hacking, passive hacking. -What is malicious software, different malware types.-Malware infects target in the form of Trojan horse thus creating a botnet. -Malicius Trojan horse software infects target through a game and begins to monitor and record what the user types.In the third chapter will follow practical techniques. -Breaking wpa2 personal LANs and after techniques of the man in the middle in other computer systems. -Attacks on PCs with backdoor implantation techniques and access the machine by Metasploit Framework platform. -Sql injection attacks into vunerable websites for extracting information from databases.Attribution-NonCommercial-NoDerivs 3.0 United StatesΚακόβουλο λογισμικό, active hacking, passive hacking.Malware, active hacking, passive hacking.