windows hacking

Post on 13-Dec-2014

1.016 Views

Category:

Education

2 Downloads

Preview:

Click to see full reader

DESCRIPTION

 

TRANSCRIPT

Company name

WINDOWSHACKING

HACKING - DEFINITION

• The Art of exploring various security breaches is termed as Hacking.

• It’s an anti-society activity.

• It says, there always exists more than one way to solve the problem.

• The terms Hacker and Hacking are being misinterpreted and misunderstood with negative side-lines.

HACKERS – WHO ARE THEY?

Hackers are Intelligent Computer Professionals.

To gain in-depth knowledge of a system, what’s happening at the backend, behind the screen.

To find possible security vulnerabilities in a system.

They create security awareness by sharing knowledge. It’s a team work.

HATS OFF?

• White Hat Hackers – They use their knowledge and skill set for good, constructive intents. They find out new security loopholes and their solutions.

• Black Hat Hacker- They use their knowledge and skill set for illegal activities, destructive intents.

E.g.- to gain money (online robbery), to take revenge. Disgruntled Employees is the best example of Black Hats. Attackers (Black Hat Hackers) are not at all concerned with security professionals (White Hat hackers). Actually these hackers are Bad Guys!!!

CRACKERS/ATTACKERS

An Individuals who break into computers with malicious intent.

Motive/Intent

To seek unauthorized access into a system and cause damage or destroy or reveal confidential information.

To compromise the system to deny services to legitimate users for troubling, harassing them or for taking revenge.

PHREAKS

• Phreaks – These are persons who use computer devices and software to break into phone networks.

• Motive/Intention- To find loopholes in security in phone network and to make phone calls at free of cost!!!

• Effects- You may have to big amount of phone bills, for doing nothing!!!

SCRIPT KIDDIES

Script Kiddies – These are persons not having technical skills to hack computers.

Motive/Intention- They use the available information about known vulnerabilities to break into remote systems.

It’s an act performed for a fun or out of curiosity.like me..!!!

HACKERS USE OF OS

MetasploiteBack TrackUbuntuOsxWindows

Password cracking

Live CD(Back Track , ubuntu)

Windows Inside

Using software Windows xp CD to repair

DIFFERENT WAYS OF PASSWORD CRACK

Using Software

Password Recovery

Programm

NT Password&

Hiren Boot CDOphcrack

SAMInside

Windows Password Crack

Kon-Boot

LCP

Johan The Ripper

Pwdump &

RemoteDLL

Cain & Abel

Step 1 :- Cain & Abel home screen shot

Step 2 :- Select Cracker in LM &NTLM Hashes screen shot

Step 3 :- Add NT Hashes

Step 4 :- Ophcrack table

Step 5 :- Click Start

Step 6 :- Got your password

LUSRMGR.MSC

Login administrator & changes the other account password

USING CMD

Step 1:- cmd in type “net user”

Step 2:- cmd in type “net user username *”

“reset password”

ADVANTAGE

• Identify any and all networks they will test

• Detail the testing interval

• Detail the testing process

• Create their plan and then share it with stakeholders

• Get the plan approved

DRAWBACK

• Allowing the company's financial and banking details to be seen

• malicious code, viruses, malware and other destructive and harmful things on a computer system

• They may misuse their knowledge

CONCLUSION

• Security is important because prevention is better than cure.

• Regular auditing ,vigilant intrusion detection & computer security awareness are essiantial part of security efforts .

THANK YOU

top related