Hacking

1,710 views
1,549 views

Published on

Hacking Tips & Tricks

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
1,710
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Hacking

  1. 1. A defined “methodology adoptedby ethical hackers to discover thevulnerabilities existing in informationsystems’ operating environments.”
  2. 2.  For using Virtual Operating System in your PC or Laptop use VM Ware Workstation Software. Key For VMWARE WorkStation- M35PM-RP24K-9103V-4QA66
  3. 3. Q. Where the Passwords such as Admin, Login Passwords of the System are Stored ?Answer: In SAM (Security Account Manager) Files Passwords are stored in the form of Hashes. Path: C:WindowsSystem32Config
  4. 4.  By Displaying Command Prompt on the LOGIN Screen. By using utility of STICKY KEYS By Creating Backdoors.
  5. 5.  By using Change Access Control Lists (CACLS) Command. - Open CMD (in Windows 7 open CMD as an Administrator) - Use this Command : For Locking the Folder- CACLS <Folder Name> /E /P Everyone :N For Accessing the Folder CACLS <Folder Name> /E /P Everyone :F
  6. 6. • Open CMD as an Administrator.• Type the following commands: • C:UsersUser Account>DISKPART Press Enter • DISKPART> Select List Volume Press Enter • DISKPART> Select Volume <Volume Number> Press Enter • DISKPART> Remove letter <Drive letter> Press Enter YOUR DISK HAS BEEN HIDDEN NOW
  7. 7. • REPEAT ALL STEPS AS MENTIONED IN PREVIOUS SLIDE.• CHANGE THE FOURTH STEP AS: • DISKPART> Assign letter <Drive letter> Press Enter YOUR DISK AS BEEN VISIBLE NOW
  8. 8.  Process of Hiding Text in A Image File. To hide Secret Text behind an Image follow these Steps:  Open CMD.  Type in CMD: COPY /b File1.JPG + Text1.TXT My.JPG Press Enter YOUR TEXT IS COPIED TO THE IMAGE FILE
  9. 9. Phishing
  10. 10. Phishing
  11. 11. • Key Loggers are the Softwares that keep all the LOG files in its Record of every key pressed on the key board.• Some of the Key Loggers are: ARDAMAX Key Logger Home Key Logger Family Key Logger Golden Key logger And Many More…………..• Warning : Key Loggers can be Detected by the Antiviruses for that we have to put off our antivirus program
  12. 12. SQL Injection (Website Hacking) • Type any of following points in Google to get Admin Login pages: • INURL: admin.asp • INURL: adminlogin.asp • INURL: admin.aspx • INURL: adminlogin.aspx • INURL: admin.asp • INURL: admin.php • INURL: adminlogin.phpTry This In Place Of Username & Password : login’telnet’=‘telnet’
  13. 13. Fake Emailing Some Websites for sending fake emails……… www.fakemailer.info www.fakemailer.net www.fakesend.com Some free fake mailing Sites……. www.mailz.funfuz.co.uk www.emkei.cz
  14. 14. Watch Live CCTV Cameras of Foreign CountriesO This Process is known as Google Digging.O For viewing live CCTV footages just type this code in Google…..Inurl:view /index.shtml

×