A defined “methodology adopted
by ethical hackers to discover the
vulnerabilities existing in information
systems’ operating environments.”
 For using Virtual Operating System in your
PC or Laptop use VM Ware Workstation
Software.
Key For VMWARE WorkStation-
M35PM-RP24K-9103V-4QA66
Q. Where the Passwords such as Admin, Login
Passwords of the System are Stored ?
Answer: In SAM (Security Account Manager) Files
Passwords are stored in the form of Hashes.
Path: C:WindowsSystem32Config
 By DisplayingCommand Prompt on the
LOGIN Screen.
By using utility of STICKY KEYS
 By Creating Backdoors.
 By using Change Access Control Lists (CACLS)
Command.
- Open CMD (in Windows 7 open CMD as an
Administrator)
- Use this Command :
 For Locking the Folder-
CACLS <Folder Name> /E /P Everyone :N
 For Accessing the Folder
CACLS <Folder Name> /E /P Everyone :F
• Open CMD as an Administrator.
• Type the following commands:
• C:UsersUser Account>DISKPART Press Enter
• DISKPART> Select List Volume Press Enter
• DISKPART> Select Volume <Volume Number> Press Enter
• DISKPART> Remove letter <Drive letter> Press Enter
YOUR DISK HAS BEEN HIDDEN NOW
• REPEAT ALL STEPS AS MENTIONED IN PREVIOUS SLIDE.
• CHANGE THE FOURTH STEPAS:
• DISKPART> Assign letter <Drive letter> Press Enter
YOUR DISK AS BEEN VISIBLE NOW
Process of Hiding Text in A Image File.
To hide Secret Text behind an Image follow these
Steps:
 Open CMD.
 Type in CMD:
COPY /b File1.JPG + Text1.TXT My.JPG Press Enter
YOUR TEXT IS COPIED TO THE IMAGE FILE
Phishing
Phishing
• Key Loggers are the Softwares that keep all the LOG files in
its Record of every key pressed on the key board.
• Some of the Key Loggers are:
ARDAMAX Key Logger
Home Key Logger
Family Key Logger
Golden Key logger
And Many More…………..
• Warning : Key Loggers can be Detected by the
Antiviruses for that we have to put off our
antivirus program
SQL Injection (Website Hacking)
• Type any of following points in Google to get Admin
Login pages:
• INURL: admin.asp
• INURL: adminlogin.asp
• INURL: admin.aspx
• INURL: adminlogin.aspx
• INURL: admin.asp
• INURL: admin.php
• INURL: adminlogin.php
Try This In Place Of Username & Password :
login’telnet’=‘telnet’
Fake Emailing
 Some Websites for sending fake emails………
www.fakemailer.info
www.fakemailer.net
www.fakesend.com
 Some free fake mailing Sites…….
www.mailz.funfuz.co.uk
www.emkei.cz
Watch Live CCTV Cameras of
Foreign Countries
O This Process is known as Google Digging.
O For viewing live CCTV footages just type this
code in Google…..
Inurl:view /index.shtml
Hacking_PPT
Hacking_PPT

Hacking_PPT

  • 4.
    A defined “methodologyadopted by ethical hackers to discover the vulnerabilities existing in information systems’ operating environments.”
  • 5.
     For usingVirtual Operating System in your PC or Laptop use VM Ware Workstation Software. Key For VMWARE WorkStation- M35PM-RP24K-9103V-4QA66
  • 6.
    Q. Where thePasswords such as Admin, Login Passwords of the System are Stored ? Answer: In SAM (Security Account Manager) Files Passwords are stored in the form of Hashes. Path: C:WindowsSystem32Config
  • 12.
     By DisplayingCommandPrompt on the LOGIN Screen. By using utility of STICKY KEYS  By Creating Backdoors.
  • 13.
     By usingChange Access Control Lists (CACLS) Command. - Open CMD (in Windows 7 open CMD as an Administrator) - Use this Command :  For Locking the Folder- CACLS <Folder Name> /E /P Everyone :N  For Accessing the Folder CACLS <Folder Name> /E /P Everyone :F
  • 14.
    • Open CMDas an Administrator. • Type the following commands: • C:UsersUser Account>DISKPART Press Enter • DISKPART> Select List Volume Press Enter • DISKPART> Select Volume <Volume Number> Press Enter • DISKPART> Remove letter <Drive letter> Press Enter YOUR DISK HAS BEEN HIDDEN NOW
  • 15.
    • REPEAT ALLSTEPS AS MENTIONED IN PREVIOUS SLIDE. • CHANGE THE FOURTH STEPAS: • DISKPART> Assign letter <Drive letter> Press Enter YOUR DISK AS BEEN VISIBLE NOW
  • 16.
    Process of HidingText in A Image File. To hide Secret Text behind an Image follow these Steps:  Open CMD.  Type in CMD: COPY /b File1.JPG + Text1.TXT My.JPG Press Enter YOUR TEXT IS COPIED TO THE IMAGE FILE
  • 18.
  • 19.
  • 20.
    • Key Loggersare the Softwares that keep all the LOG files in its Record of every key pressed on the key board. • Some of the Key Loggers are: ARDAMAX Key Logger Home Key Logger Family Key Logger Golden Key logger And Many More………….. • Warning : Key Loggers can be Detected by the Antiviruses for that we have to put off our antivirus program
  • 21.
    SQL Injection (WebsiteHacking) • Type any of following points in Google to get Admin Login pages: • INURL: admin.asp • INURL: adminlogin.asp • INURL: admin.aspx • INURL: adminlogin.aspx • INURL: admin.asp • INURL: admin.php • INURL: adminlogin.php Try This In Place Of Username & Password : login’telnet’=‘telnet’
  • 22.
    Fake Emailing  SomeWebsites for sending fake emails……… www.fakemailer.info www.fakemailer.net www.fakesend.com  Some free fake mailing Sites……. www.mailz.funfuz.co.uk www.emkei.cz
  • 23.
    Watch Live CCTVCameras of Foreign Countries O This Process is known as Google Digging. O For viewing live CCTV footages just type this code in Google….. Inurl:view /index.shtml