system hacking ppt
TRANSCRIPT
![Page 1: System hacking PPT](https://reader036.vdocuments.us/reader036/viewer/2022081422/58eca5541a28ab821a8b45c1/html5/thumbnails/1.jpg)
SYSTEM HACKING
Presented ByXYZ
Under GuidanceSiddharth Vairagi
PRESENTATION OF PROJECT DONE DURING SUMMER TRAINING
INDIAN INSTITUTE OF TECHNICAL COMPUTER APPLICATION
![Page 2: System hacking PPT](https://reader036.vdocuments.us/reader036/viewer/2022081422/58eca5541a28ab821a8b45c1/html5/thumbnails/2.jpg)
Content• passive online attack• Active online attack• Offline attack• Non technical attack
![Page 3: System hacking PPT](https://reader036.vdocuments.us/reader036/viewer/2022081422/58eca5541a28ab821a8b45c1/html5/thumbnails/3.jpg)
System HackingPassword Hacking:
TYPES OF PASSWORD HACKING
There are of four types of password attack1.passive online attack2.Active online attack3.Offline attack4.Non technical attack
![Page 4: System hacking PPT](https://reader036.vdocuments.us/reader036/viewer/2022081422/58eca5541a28ab821a8b45c1/html5/thumbnails/4.jpg)
In passive online attacks an attacker don’t contact with authorizing party for stealing password, in other words he attempts password hacking but without communicating with victim or victim account. Types of passive online attacks includes wire sniffing, Man in the middle attack and reply attack.
PASSIVE ONLINE ATTACK
![Page 5: System hacking PPT](https://reader036.vdocuments.us/reader036/viewer/2022081422/58eca5541a28ab821a8b45c1/html5/thumbnails/5.jpg)
This type of attack can be directly termed as password guessing. An attacker tries number of passwords one by one against victim to crack his/her password.
ACTIVE ONLINE ATTACK
![Page 6: System hacking PPT](https://reader036.vdocuments.us/reader036/viewer/2022081422/58eca5541a28ab821a8b45c1/html5/thumbnails/6.jpg)
OFFLINE ATTACK
Types• CMD Attack• Tool Attack• Bypass Attack• Bypassing Windows
![Page 7: System hacking PPT](https://reader036.vdocuments.us/reader036/viewer/2022081422/58eca5541a28ab821a8b45c1/html5/thumbnails/7.jpg)
CMD ATTACK•Copy the CMD from system32•And pest the desktop.•then CMD rename sethc•and Cut the sethc file pest the system32 , and replaced.=> Computer Restart
1=> Command Use from Password Changed"net user username **********"
2=> Command use from add the users"net user newusername ********* \add"
3=> Command use from created admin of user"net localgroup addminitration ******* \add"
![Page 8: System hacking PPT](https://reader036.vdocuments.us/reader036/viewer/2022081422/58eca5541a28ab821a8b45c1/html5/thumbnails/8.jpg)
TOOLS ATTACK
•Hiren Boot
•Ophcrack
•L0phcrack
•Reset Windows Password
![Page 9: System hacking PPT](https://reader036.vdocuments.us/reader036/viewer/2022081422/58eca5541a28ab821a8b45c1/html5/thumbnails/9.jpg)
BYPASS ATTACK
![Page 10: System hacking PPT](https://reader036.vdocuments.us/reader036/viewer/2022081422/58eca5541a28ab821a8b45c1/html5/thumbnails/10.jpg)
BYPASSING WINDOWS
Kon Boot
![Page 11: System hacking PPT](https://reader036.vdocuments.us/reader036/viewer/2022081422/58eca5541a28ab821a8b45c1/html5/thumbnails/11.jpg)
• www.iitca.co.in•https://www.eccouncil.org
Reference
![Page 12: System hacking PPT](https://reader036.vdocuments.us/reader036/viewer/2022081422/58eca5541a28ab821a8b45c1/html5/thumbnails/12.jpg)