Windows Hacking

2,172 views

Published on

0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,172
On SlideShare
0
From Embeds
0
Number of Embeds
16
Actions
Shares
0
Downloads
142
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Windows Hacking

  1. 1. Company name<br />WINDOWS<br />HACKING<br />
  2. 2. Hacking - definition<br /><ul><li>The Art of exploring various security breaches is termed as Hacking.
  3. 3. It’s an anti-society activity.
  4. 4. It says, there always exists more than one way to solve the problem.
  5. 5. The terms Hacker and Hacking are being misinterpreted and misunderstood with negative side-lines.</li></li></ul><li>Hackers – Who are they?<br /><ul><li>Hackers are Intelligent Computer Professionals.
  6. 6. To gain in-depth knowledge of a system, what’s happening at the backend, behind the screen.
  7. 7. To find possible security vulnerabilities in a system.
  8. 8. They create security awareness by sharing knowledge. It’s a team work.</li></li></ul><li>Hats Off?<br /><ul><li>White Hat Hackers – They use their knowledge and skill set for good, constructive intents. They find out new security loopholes and their solutions.
  9. 9. Black Hat Hacker- They use their knowledge and skill set for illegal activities, destructive intents. </li></ul>E.g.- to gain money (online robbery), to take revenge. Disgruntled Employees is the best example of Black Hats. Attackers (Black Hat Hackers) are not at all concerned with security professionals (White Hat hackers). Actually these hackers are Bad Guys!!!<br />
  10. 10. Crackers/Attackers<br /><ul><li>An Individuals who break into computers with malicious intent.
  11. 11. Motive/Intent
  12. 12. To seek unauthorized access into a system and cause damage or destroy or reveal confidential information.
  13. 13. To compromise the system to deny services to legitimate users for troubling, harassing them or for taking revenge. </li></li></ul><li>Phreaks<br /><ul><li>Phreaks – These are persons who use computer devices and software to break into phone networks.
  14. 14. Motive/Intention- To find loopholes in security in phone network and to make phone calls at free of cost!!!
  15. 15. Effects- You may have to big amount of phone bills, for doing nothing!!!</li></li></ul><li>Script Kiddies<br />Script Kiddies – These are persons not having technical skills to hack computers.<br /> Motive/Intention- They use the available information about known vulnerabilities to break into remote systems. <br /> It’s an act performed for a fun or out of curiosity.like me..!!!<br />
  16. 16. HACKERS use of oS<br />Metasploite<br />Back Track<br />Ubuntu<br />Osx<br />Windows<br />
  17. 17. Different ways of password crack<br />Live CD(Back Track , ubuntu)<br />Windows Inside<br />Password cracking<br />Using software<br />Windows xp CD to repair<br />
  18. 18. Windows Password Crack<br />NT Password<br />&<br />Hiren Boot CD<br />Pwdump <br />&<br />RemoteDLL<br />Ophcrack<br />Using <br />Software<br />Johan The Ripper<br />SAMInside<br />Password Recovery Programm<br />LCP<br />Kon-Boot<br />
  19. 19.
  20. 20. Cain & Abel<br />Step 1 :- Cain & Abel home screen shot<br />
  21. 21. Step 2 :- Select Cracker in LM &NTLM Hashes screen shot<br />
  22. 22. Step 3 :- Add NT Hashes<br />
  23. 23. Step 4 :- Ophcrack table<br />
  24. 24. Step 5 :- Click Start <br />
  25. 25. Step 6 :- Got your password <br />
  26. 26. Lusrmgr.msc<br />Login administrator & changes the other account password<br />
  27. 27. Using cmd<br />Step 1:- cmd in type “net user”<br />
  28. 28. Step 2:- cmd in type “net user username *”<br /> “reset password”<br />
  29. 29. advantage<br /><ul><li>Identify any and all networks they will test
  30. 30. Detail the testing interval
  31. 31. Detail the testing process
  32. 32. Create their plan and then share it with stakeholders
  33. 33. Get the plan approved</li></li></ul><li>Drawback<br /><ul><li>Allowing the company's financial and banking details to be seen
  34. 34. malicious code, viruses, malware and other destructive and harmful things on a computer system
  35. 35. They may misuse their knowledge</li></li></ul><li>Conclusion<br /><ul><li> Security is important because prevention is better than cure.
  36. 36. Regular auditing ,vigilant intrusion detection & computer security awareness are essiantial part of security efforts .</li></li></ul><li>THANK YOU<br />

×