Hacking_PPT

338 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
338
On SlideShare
0
From Embeds
0
Number of Embeds
4
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Hacking_PPT

  1. 1. A defined “methodology adopted by ethical hackers to discover the vulnerabilities existing in information systems’ operating environments.”
  2. 2.  For using Virtual Operating System in your PC or Laptop use VM Ware Workstation Software. Key For VMWARE WorkStation- M35PM-RP24K-9103V-4QA66
  3. 3. Q. Where the Passwords such as Admin, Login Passwords of the System are Stored ? Answer: In SAM (Security Account Manager) Files Passwords are stored in the form of Hashes. Path: C:WindowsSystem32Config
  4. 4.  By DisplayingCommand Prompt on the LOGIN Screen. By using utility of STICKY KEYS  By Creating Backdoors.
  5. 5.  By using Change Access Control Lists (CACLS) Command. - Open CMD (in Windows 7 open CMD as an Administrator) - Use this Command :  For Locking the Folder- CACLS <Folder Name> /E /P Everyone :N  For Accessing the Folder CACLS <Folder Name> /E /P Everyone :F
  6. 6. • Open CMD as an Administrator. • Type the following commands: • C:UsersUser Account>DISKPART Press Enter • DISKPART> Select List Volume Press Enter • DISKPART> Select Volume <Volume Number> Press Enter • DISKPART> Remove letter <Drive letter> Press Enter YOUR DISK HAS BEEN HIDDEN NOW
  7. 7. • REPEAT ALL STEPS AS MENTIONED IN PREVIOUS SLIDE. • CHANGE THE FOURTH STEPAS: • DISKPART> Assign letter <Drive letter> Press Enter YOUR DISK AS BEEN VISIBLE NOW
  8. 8. Process of Hiding Text in A Image File. To hide Secret Text behind an Image follow these Steps:  Open CMD.  Type in CMD: COPY /b File1.JPG + Text1.TXT My.JPG Press Enter YOUR TEXT IS COPIED TO THE IMAGE FILE
  9. 9. Phishing
  10. 10. Phishing
  11. 11. • Key Loggers are the Softwares that keep all the LOG files in its Record of every key pressed on the key board. • Some of the Key Loggers are: ARDAMAX Key Logger Home Key Logger Family Key Logger Golden Key logger And Many More………….. • Warning : Key Loggers can be Detected by the Antiviruses for that we have to put off our antivirus program
  12. 12. SQL Injection (Website Hacking) • Type any of following points in Google to get Admin Login pages: • INURL: admin.asp • INURL: adminlogin.asp • INURL: admin.aspx • INURL: adminlogin.aspx • INURL: admin.asp • INURL: admin.php • INURL: adminlogin.php Try This In Place Of Username & Password : login’telnet’=‘telnet’
  13. 13. Fake Emailing  Some Websites for sending fake emails……… www.fakemailer.info www.fakemailer.net www.fakesend.com  Some free fake mailing Sites……. www.mailz.funfuz.co.uk www.emkei.cz
  14. 14. Watch Live CCTV Cameras of Foreign Countries O This Process is known as Google Digging. O For viewing live CCTV footages just type this code in Google….. Inurl:view /index.shtml

×