windows hacking

24
Company name WINDOWS HACKING

Upload: mayur-sutariya

Post on 13-Dec-2014

1.016 views

Category:

Education


2 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Windows Hacking

Company name

WINDOWSHACKING

Page 2: Windows Hacking

HACKING - DEFINITION

• The Art of exploring various security breaches is termed as Hacking.

• It’s an anti-society activity.

• It says, there always exists more than one way to solve the problem.

• The terms Hacker and Hacking are being misinterpreted and misunderstood with negative side-lines.

Page 3: Windows Hacking

HACKERS – WHO ARE THEY?

Hackers are Intelligent Computer Professionals.

To gain in-depth knowledge of a system, what’s happening at the backend, behind the screen.

To find possible security vulnerabilities in a system.

They create security awareness by sharing knowledge. It’s a team work.

Page 4: Windows Hacking

HATS OFF?

• White Hat Hackers – They use their knowledge and skill set for good, constructive intents. They find out new security loopholes and their solutions.

• Black Hat Hacker- They use their knowledge and skill set for illegal activities, destructive intents.

E.g.- to gain money (online robbery), to take revenge. Disgruntled Employees is the best example of Black Hats. Attackers (Black Hat Hackers) are not at all concerned with security professionals (White Hat hackers). Actually these hackers are Bad Guys!!!

Page 5: Windows Hacking

CRACKERS/ATTACKERS

An Individuals who break into computers with malicious intent.

Motive/Intent

To seek unauthorized access into a system and cause damage or destroy or reveal confidential information.

To compromise the system to deny services to legitimate users for troubling, harassing them or for taking revenge.

Page 6: Windows Hacking

PHREAKS

• Phreaks – These are persons who use computer devices and software to break into phone networks.

• Motive/Intention- To find loopholes in security in phone network and to make phone calls at free of cost!!!

• Effects- You may have to big amount of phone bills, for doing nothing!!!

Page 7: Windows Hacking

SCRIPT KIDDIES

Script Kiddies – These are persons not having technical skills to hack computers.

Motive/Intention- They use the available information about known vulnerabilities to break into remote systems.

It’s an act performed for a fun or out of curiosity.like me..!!!

Page 8: Windows Hacking

HACKERS USE OF OS

MetasploiteBack TrackUbuntuOsxWindows

Page 9: Windows Hacking

Password cracking

Live CD(Back Track , ubuntu)

Windows Inside

Using software Windows xp CD to repair

DIFFERENT WAYS OF PASSWORD CRACK

Page 10: Windows Hacking

Using Software

Password Recovery

Programm

NT Password&

Hiren Boot CDOphcrack

SAMInside

Windows Password Crack

Kon-Boot

LCP

Johan The Ripper

Pwdump &

RemoteDLL

Page 11: Windows Hacking
Page 12: Windows Hacking

Cain & Abel

Step 1 :- Cain & Abel home screen shot

Page 13: Windows Hacking

Step 2 :- Select Cracker in LM &NTLM Hashes screen shot

Page 14: Windows Hacking

Step 3 :- Add NT Hashes

Page 15: Windows Hacking

Step 4 :- Ophcrack table

Page 16: Windows Hacking

Step 5 :- Click Start

Page 17: Windows Hacking

Step 6 :- Got your password

Page 18: Windows Hacking

LUSRMGR.MSC

Login administrator & changes the other account password

Page 19: Windows Hacking

USING CMD

Step 1:- cmd in type “net user”

Page 20: Windows Hacking

Step 2:- cmd in type “net user username *”

“reset password”

Page 21: Windows Hacking

ADVANTAGE

• Identify any and all networks they will test

• Detail the testing interval

• Detail the testing process

• Create their plan and then share it with stakeholders

• Get the plan approved

Page 22: Windows Hacking

DRAWBACK

• Allowing the company's financial and banking details to be seen

• malicious code, viruses, malware and other destructive and harmful things on a computer system

• They may misuse their knowledge

Page 23: Windows Hacking

CONCLUSION

• Security is important because prevention is better than cure.

• Regular auditing ,vigilant intrusion detection & computer security awareness are essiantial part of security efforts .

Page 24: Windows Hacking

THANK YOU