windows hacking
Post on 13-Dec-2014
1.020 Views
Preview:
DESCRIPTION
TRANSCRIPT
Company name
WINDOWSHACKING
HACKING - DEFINITION
• The Art of exploring various security breaches is termed as Hacking.
• It’s an anti-society activity.
• It says, there always exists more than one way to solve the problem.
• The terms Hacker and Hacking are being misinterpreted and misunderstood with negative side-lines.
HACKERS – WHO ARE THEY?
Hackers are Intelligent Computer Professionals.
To gain in-depth knowledge of a system, what’s happening at the backend, behind the screen.
To find possible security vulnerabilities in a system.
They create security awareness by sharing knowledge. It’s a team work.
HATS OFF?
• White Hat Hackers – They use their knowledge and skill set for good, constructive intents. They find out new security loopholes and their solutions.
• Black Hat Hacker- They use their knowledge and skill set for illegal activities, destructive intents.
E.g.- to gain money (online robbery), to take revenge. Disgruntled Employees is the best example of Black Hats. Attackers (Black Hat Hackers) are not at all concerned with security professionals (White Hat hackers). Actually these hackers are Bad Guys!!!
CRACKERS/ATTACKERS
An Individuals who break into computers with malicious intent.
Motive/Intent
To seek unauthorized access into a system and cause damage or destroy or reveal confidential information.
To compromise the system to deny services to legitimate users for troubling, harassing them or for taking revenge.
PHREAKS
• Phreaks – These are persons who use computer devices and software to break into phone networks.
• Motive/Intention- To find loopholes in security in phone network and to make phone calls at free of cost!!!
• Effects- You may have to big amount of phone bills, for doing nothing!!!
SCRIPT KIDDIES
Script Kiddies – These are persons not having technical skills to hack computers.
Motive/Intention- They use the available information about known vulnerabilities to break into remote systems.
It’s an act performed for a fun or out of curiosity.like me..!!!
HACKERS USE OF OS
MetasploiteBack TrackUbuntuOsxWindows
Password cracking
Live CD(Back Track , ubuntu)
Windows Inside
Using software Windows xp CD to repair
DIFFERENT WAYS OF PASSWORD CRACK
Using Software
Password Recovery
Programm
NT Password&
Hiren Boot CDOphcrack
SAMInside
Windows Password Crack
Kon-Boot
LCP
Johan The Ripper
Pwdump &
RemoteDLL
Cain & Abel
Step 1 :- Cain & Abel home screen shot
Step 2 :- Select Cracker in LM &NTLM Hashes screen shot
Step 3 :- Add NT Hashes
Step 4 :- Ophcrack table
Step 5 :- Click Start
Step 6 :- Got your password
LUSRMGR.MSC
Login administrator & changes the other account password
USING CMD
Step 1:- cmd in type “net user”
Step 2:- cmd in type “net user username *”
“reset password”
ADVANTAGE
• Identify any and all networks they will test
• Detail the testing interval
• Detail the testing process
• Create their plan and then share it with stakeholders
• Get the plan approved
DRAWBACK
• Allowing the company's financial and banking details to be seen
• malicious code, viruses, malware and other destructive and harmful things on a computer system
• They may misuse their knowledge
CONCLUSION
• Security is important because prevention is better than cure.
• Regular auditing ,vigilant intrusion detection & computer security awareness are essiantial part of security efforts .
THANK YOU
top related