Download - Windows Hacking
![Page 1: Windows Hacking](https://reader034.vdocuments.site/reader034/viewer/2022051412/5492ec9db479597e6a8b5a27/html5/thumbnails/1.jpg)
Company name
WINDOWSHACKING
![Page 2: Windows Hacking](https://reader034.vdocuments.site/reader034/viewer/2022051412/5492ec9db479597e6a8b5a27/html5/thumbnails/2.jpg)
HACKING - DEFINITION
• The Art of exploring various security breaches is termed as Hacking.
• It’s an anti-society activity.
• It says, there always exists more than one way to solve the problem.
• The terms Hacker and Hacking are being misinterpreted and misunderstood with negative side-lines.
![Page 3: Windows Hacking](https://reader034.vdocuments.site/reader034/viewer/2022051412/5492ec9db479597e6a8b5a27/html5/thumbnails/3.jpg)
HACKERS – WHO ARE THEY?
Hackers are Intelligent Computer Professionals.
To gain in-depth knowledge of a system, what’s happening at the backend, behind the screen.
To find possible security vulnerabilities in a system.
They create security awareness by sharing knowledge. It’s a team work.
![Page 4: Windows Hacking](https://reader034.vdocuments.site/reader034/viewer/2022051412/5492ec9db479597e6a8b5a27/html5/thumbnails/4.jpg)
HATS OFF?
• White Hat Hackers – They use their knowledge and skill set for good, constructive intents. They find out new security loopholes and their solutions.
• Black Hat Hacker- They use their knowledge and skill set for illegal activities, destructive intents.
E.g.- to gain money (online robbery), to take revenge. Disgruntled Employees is the best example of Black Hats. Attackers (Black Hat Hackers) are not at all concerned with security professionals (White Hat hackers). Actually these hackers are Bad Guys!!!
![Page 5: Windows Hacking](https://reader034.vdocuments.site/reader034/viewer/2022051412/5492ec9db479597e6a8b5a27/html5/thumbnails/5.jpg)
CRACKERS/ATTACKERS
An Individuals who break into computers with malicious intent.
Motive/Intent
To seek unauthorized access into a system and cause damage or destroy or reveal confidential information.
To compromise the system to deny services to legitimate users for troubling, harassing them or for taking revenge.
![Page 6: Windows Hacking](https://reader034.vdocuments.site/reader034/viewer/2022051412/5492ec9db479597e6a8b5a27/html5/thumbnails/6.jpg)
PHREAKS
• Phreaks – These are persons who use computer devices and software to break into phone networks.
• Motive/Intention- To find loopholes in security in phone network and to make phone calls at free of cost!!!
• Effects- You may have to big amount of phone bills, for doing nothing!!!
![Page 7: Windows Hacking](https://reader034.vdocuments.site/reader034/viewer/2022051412/5492ec9db479597e6a8b5a27/html5/thumbnails/7.jpg)
SCRIPT KIDDIES
Script Kiddies – These are persons not having technical skills to hack computers.
Motive/Intention- They use the available information about known vulnerabilities to break into remote systems.
It’s an act performed for a fun or out of curiosity.like me..!!!
![Page 8: Windows Hacking](https://reader034.vdocuments.site/reader034/viewer/2022051412/5492ec9db479597e6a8b5a27/html5/thumbnails/8.jpg)
HACKERS USE OF OS
MetasploiteBack TrackUbuntuOsxWindows
![Page 9: Windows Hacking](https://reader034.vdocuments.site/reader034/viewer/2022051412/5492ec9db479597e6a8b5a27/html5/thumbnails/9.jpg)
Password cracking
Live CD(Back Track , ubuntu)
Windows Inside
Using software Windows xp CD to repair
DIFFERENT WAYS OF PASSWORD CRACK
![Page 10: Windows Hacking](https://reader034.vdocuments.site/reader034/viewer/2022051412/5492ec9db479597e6a8b5a27/html5/thumbnails/10.jpg)
Using Software
Password Recovery
Programm
NT Password&
Hiren Boot CDOphcrack
SAMInside
Windows Password Crack
Kon-Boot
LCP
Johan The Ripper
Pwdump &
RemoteDLL
![Page 11: Windows Hacking](https://reader034.vdocuments.site/reader034/viewer/2022051412/5492ec9db479597e6a8b5a27/html5/thumbnails/11.jpg)
![Page 12: Windows Hacking](https://reader034.vdocuments.site/reader034/viewer/2022051412/5492ec9db479597e6a8b5a27/html5/thumbnails/12.jpg)
Cain & Abel
Step 1 :- Cain & Abel home screen shot
![Page 13: Windows Hacking](https://reader034.vdocuments.site/reader034/viewer/2022051412/5492ec9db479597e6a8b5a27/html5/thumbnails/13.jpg)
Step 2 :- Select Cracker in LM &NTLM Hashes screen shot
![Page 14: Windows Hacking](https://reader034.vdocuments.site/reader034/viewer/2022051412/5492ec9db479597e6a8b5a27/html5/thumbnails/14.jpg)
Step 3 :- Add NT Hashes
![Page 15: Windows Hacking](https://reader034.vdocuments.site/reader034/viewer/2022051412/5492ec9db479597e6a8b5a27/html5/thumbnails/15.jpg)
Step 4 :- Ophcrack table
![Page 16: Windows Hacking](https://reader034.vdocuments.site/reader034/viewer/2022051412/5492ec9db479597e6a8b5a27/html5/thumbnails/16.jpg)
Step 5 :- Click Start
![Page 17: Windows Hacking](https://reader034.vdocuments.site/reader034/viewer/2022051412/5492ec9db479597e6a8b5a27/html5/thumbnails/17.jpg)
Step 6 :- Got your password
![Page 18: Windows Hacking](https://reader034.vdocuments.site/reader034/viewer/2022051412/5492ec9db479597e6a8b5a27/html5/thumbnails/18.jpg)
LUSRMGR.MSC
Login administrator & changes the other account password
![Page 19: Windows Hacking](https://reader034.vdocuments.site/reader034/viewer/2022051412/5492ec9db479597e6a8b5a27/html5/thumbnails/19.jpg)
USING CMD
Step 1:- cmd in type “net user”
![Page 20: Windows Hacking](https://reader034.vdocuments.site/reader034/viewer/2022051412/5492ec9db479597e6a8b5a27/html5/thumbnails/20.jpg)
Step 2:- cmd in type “net user username *”
“reset password”
![Page 21: Windows Hacking](https://reader034.vdocuments.site/reader034/viewer/2022051412/5492ec9db479597e6a8b5a27/html5/thumbnails/21.jpg)
ADVANTAGE
• Identify any and all networks they will test
• Detail the testing interval
• Detail the testing process
• Create their plan and then share it with stakeholders
• Get the plan approved
![Page 22: Windows Hacking](https://reader034.vdocuments.site/reader034/viewer/2022051412/5492ec9db479597e6a8b5a27/html5/thumbnails/22.jpg)
DRAWBACK
• Allowing the company's financial and banking details to be seen
• malicious code, viruses, malware and other destructive and harmful things on a computer system
• They may misuse their knowledge
![Page 23: Windows Hacking](https://reader034.vdocuments.site/reader034/viewer/2022051412/5492ec9db479597e6a8b5a27/html5/thumbnails/23.jpg)
CONCLUSION
• Security is important because prevention is better than cure.
• Regular auditing ,vigilant intrusion detection & computer security awareness are essiantial part of security efforts .
![Page 24: Windows Hacking](https://reader034.vdocuments.site/reader034/viewer/2022051412/5492ec9db479597e6a8b5a27/html5/thumbnails/24.jpg)
THANK YOU