Your SlideShare is downloading. ×
0
A defined “methodology adopted
by ethical hackers to discover the
vulnerabilities existing in information
systems’ operati...
 For using Virtual Operating System in your
PC or Laptop use VM Ware Workstation
Software.
Key For VMWARE WorkStation-
M3...
Q. Where the Passwords such as Admin, Login
Passwords of the System are Stored ?
Answer: In SAM (Security Account Manager)...
 By DisplayingCommand Prompt on the
LOGIN Screen.
By using utility of STICKY KEYS
 By Creating Backdoors.
 By using Change Access Control Lists (CACLS)
Command.
- Open CMD (in Windows 7 open CMD as an
Administrator)
- Use this ...
• Open CMD as an Administrator.
• Type the following commands:
• C:UsersUser Account>DISKPART Press Enter
• DISKPART> Sele...
• REPEAT ALL STEPS AS MENTIONED IN PREVIOUS SLIDE.
• CHANGE THE FOURTH STEPAS:
• DISKPART> Assign letter <Drive letter> Pr...
Process of Hiding Text in A Image File.
To hide Secret Text behind an Image follow these
Steps:
 Open CMD.
 Type in CM...
Phishing
Phishing
• Key Loggers are the Softwares that keep all the LOG files in
its Record of every key pressed on the key board.
• Some of...
SQL Injection (Website Hacking)
• Type any of following points in Google to get Admin
Login pages:
• INURL: admin.asp
• IN...
Fake Emailing
 Some Websites for sending fake emails………
www.fakemailer.info
www.fakemailer.net
www.fakesend.com
 Some fr...
Watch Live CCTV Cameras of
Foreign Countries
O This Process is known as Google Digging.
O For viewing live CCTV footages j...
Hacking_PPT
Hacking_PPT
Hacking_PPT
Hacking_PPT
Hacking_PPT
Hacking_PPT
Hacking_PPT
Hacking_PPT
Hacking_PPT
Hacking_PPT
Hacking_PPT
Upcoming SlideShare
Loading in...5
×

Hacking_PPT

82

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
82
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Hacking_PPT "

  1. 1. A defined “methodology adopted by ethical hackers to discover the vulnerabilities existing in information systems’ operating environments.”
  2. 2.  For using Virtual Operating System in your PC or Laptop use VM Ware Workstation Software. Key For VMWARE WorkStation- M35PM-RP24K-9103V-4QA66
  3. 3. Q. Where the Passwords such as Admin, Login Passwords of the System are Stored ? Answer: In SAM (Security Account Manager) Files Passwords are stored in the form of Hashes. Path: C:WindowsSystem32Config
  4. 4.  By DisplayingCommand Prompt on the LOGIN Screen. By using utility of STICKY KEYS  By Creating Backdoors.
  5. 5.  By using Change Access Control Lists (CACLS) Command. - Open CMD (in Windows 7 open CMD as an Administrator) - Use this Command :  For Locking the Folder- CACLS <Folder Name> /E /P Everyone :N  For Accessing the Folder CACLS <Folder Name> /E /P Everyone :F
  6. 6. • Open CMD as an Administrator. • Type the following commands: • C:UsersUser Account>DISKPART Press Enter • DISKPART> Select List Volume Press Enter • DISKPART> Select Volume <Volume Number> Press Enter • DISKPART> Remove letter <Drive letter> Press Enter YOUR DISK HAS BEEN HIDDEN NOW
  7. 7. • REPEAT ALL STEPS AS MENTIONED IN PREVIOUS SLIDE. • CHANGE THE FOURTH STEPAS: • DISKPART> Assign letter <Drive letter> Press Enter YOUR DISK AS BEEN VISIBLE NOW
  8. 8. Process of Hiding Text in A Image File. To hide Secret Text behind an Image follow these Steps:  Open CMD.  Type in CMD: COPY /b File1.JPG + Text1.TXT My.JPG Press Enter YOUR TEXT IS COPIED TO THE IMAGE FILE
  9. 9. Phishing
  10. 10. Phishing
  11. 11. • Key Loggers are the Softwares that keep all the LOG files in its Record of every key pressed on the key board. • Some of the Key Loggers are: ARDAMAX Key Logger Home Key Logger Family Key Logger Golden Key logger And Many More………….. • Warning : Key Loggers can be Detected by the Antiviruses for that we have to put off our antivirus program
  12. 12. SQL Injection (Website Hacking) • Type any of following points in Google to get Admin Login pages: • INURL: admin.asp • INURL: adminlogin.asp • INURL: admin.aspx • INURL: adminlogin.aspx • INURL: admin.asp • INURL: admin.php • INURL: adminlogin.php Try This In Place Of Username & Password : login’telnet’=‘telnet’
  13. 13. Fake Emailing  Some Websites for sending fake emails……… www.fakemailer.info www.fakemailer.net www.fakesend.com  Some free fake mailing Sites……. www.mailz.funfuz.co.uk www.emkei.cz
  14. 14. Watch Live CCTV Cameras of Foreign Countries O This Process is known as Google Digging. O For viewing live CCTV footages just type this code in Google….. Inurl:view /index.shtml
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×