5. 2. By creating the Backdoor (Exploiting the Stick Key Feature of Windows)
6. We can exploit the loop hole by replacing sethc.exe with cmd.exe
7. Countermeasures
• Don’t keep your admin account logged in in
you absence.
• Set BIOS password to prevent USB boot.
• Encrypt you drives using tools like Bitlocker,
True Crypt.
9. Example - 1
Encrypted Form
8 1 3 11 9 14 7
Decrypted Form
H A C K I N G
Key- Letter’s Positions in Alphabet
10. Example – 2
Encrypted Form-
44 2 222 55 444 66 4
Decrypted Form-
H A C K I N G
Key- Telephone Keypad
11. Need of Encryption
• To protect a user's identity and privacy.
• To add an extra layer of protection for
the confidential information residing on
your PC and devices.
12. Steganography
• Steganography is the hiding of a secret
message within an ordinary message/file and
the extraction of it at its destination.
• Binding Method
20. Google Hacking
• Technique that uses Google Search and other
Google applications to find security holes in
the configuration and computer code that
websites use.
• intitle
• Inurl
Tool – Google Hacks