SlideShare a Scribd company logo
A defined “methodology adopted
by ethical hackers to discover the
vulnerabilities existing in information
systems’ operating environments.”
 For using Virtual Operating System in your
PC or Laptop use VM Ware Workstation
Software.
Key For VMWARE WorkStation-
M35PM-RP24K-9103V-4QA66
Q. Where the Passwords such as Admin, Login
Passwords of the System are Stored ?
Answer: In SAM (Security Account Manager) Files
Passwords are stored in the form of Hashes.
Path: C:WindowsSystem32Config
 By DisplayingCommand Prompt on the
LOGIN Screen.
By using utility of STICKY KEYS
 By Creating Backdoors.
 By using Change Access Control Lists (CACLS)
Command.
- Open CMD (in Windows 7 open CMD as an
Administrator)
- Use this Command :
 For Locking the Folder-
CACLS <Folder Name> /E /P Everyone :N
 For Accessing the Folder
CACLS <Folder Name> /E /P Everyone :F
• Open CMD as an Administrator.
• Type the following commands:
• C:UsersUser Account>DISKPART Press Enter
• DISKPART> Select List Volume Press Enter
• DISKPART> Select Volume <Volume Number> Press Enter
• DISKPART> Remove letter <Drive letter> Press Enter
YOUR DISK HAS BEEN HIDDEN NOW
• REPEAT ALL STEPS AS MENTIONED IN PREVIOUS SLIDE.
• CHANGE THE FOURTH STEPAS:
• DISKPART> Assign letter <Drive letter> Press Enter
YOUR DISK AS BEEN VISIBLE NOW
Process of Hiding Text in A Image File.
To hide Secret Text behind an Image follow these
Steps:
 Open CMD.
 Type in CMD:
COPY /b File1.JPG + Text1.TXT My.JPG Press Enter
YOUR TEXT IS COPIED TO THE IMAGE FILE
Phishing
Phishing
• Key Loggers are the Softwares that keep all the LOG files in
its Record of every key pressed on the key board.
• Some of the Key Loggers are:
ARDAMAX Key Logger
Home Key Logger
Family Key Logger
Golden Key logger
And Many More…………..
• Warning : Key Loggers can be Detected by the
Antiviruses for that we have to put off our
antivirus program
SQL Injection (Website Hacking)
• Type any of following points in Google to get Admin
Login pages:
• INURL: admin.asp
• INURL: adminlogin.asp
• INURL: admin.aspx
• INURL: adminlogin.aspx
• INURL: admin.asp
• INURL: admin.php
• INURL: adminlogin.php
Try This In Place Of Username & Password :
login’telnet’=‘telnet’
Fake Emailing
 Some Websites for sending fake emails………
www.fakemailer.info
www.fakemailer.net
www.fakesend.com
 Some free fake mailing Sites…….
www.mailz.funfuz.co.uk
www.emkei.cz
Watch Live CCTV Cameras of
Foreign Countries
O This Process is known as Google Digging.
O For viewing live CCTV footages just type this
code in Google…..
Inurl:view /index.shtml
Hacking_PPT
Hacking_PPT

More Related Content

What's hot

How to download
How to downloadHow to download
How to download
GeoMedeelel
 
Fix runtime error 217
Fix runtime error 217Fix runtime error 217
Fix runtime error 217
SarahLamusu
 
Windows 8.1 Deployment - Tools, Tools, Tools
Windows 8.1 Deployment - Tools, Tools, ToolsWindows 8.1 Deployment - Tools, Tools, Tools
Windows 8.1 Deployment - Tools, Tools, Tools
Roel van Bueren
 
Explanation of Operating System ! Designed By: A jay Kumar
Explanation of Operating System ! Designed By: A jay KumarExplanation of Operating System ! Designed By: A jay Kumar
Explanation of Operating System ! Designed By: A jay Kumar
ajayskumars
 
Installation guide_Rajeev
Installation guide_RajeevInstallation guide_Rajeev
Installation guide_Rajeev
Akhilesh Kumar Sharma
 
How To Prevent Virus Part1
How To Prevent Virus Part1How To Prevent Virus Part1
How To Prevent Virus Part1
Politeknik Transkrian
 
How to install windows 7 operating system
How to install  windows 7 operating system How to install  windows 7 operating system
How to install windows 7 operating system
MLG College of Learning, Inc
 
Post exploitation using powershell
Post exploitation using powershellPost exploitation using powershell
Post exploitation using powershell
Mihir Shah
 

What's hot (8)

How to download
How to downloadHow to download
How to download
 
Fix runtime error 217
Fix runtime error 217Fix runtime error 217
Fix runtime error 217
 
Windows 8.1 Deployment - Tools, Tools, Tools
Windows 8.1 Deployment - Tools, Tools, ToolsWindows 8.1 Deployment - Tools, Tools, Tools
Windows 8.1 Deployment - Tools, Tools, Tools
 
Explanation of Operating System ! Designed By: A jay Kumar
Explanation of Operating System ! Designed By: A jay KumarExplanation of Operating System ! Designed By: A jay Kumar
Explanation of Operating System ! Designed By: A jay Kumar
 
Installation guide_Rajeev
Installation guide_RajeevInstallation guide_Rajeev
Installation guide_Rajeev
 
How To Prevent Virus Part1
How To Prevent Virus Part1How To Prevent Virus Part1
How To Prevent Virus Part1
 
How to install windows 7 operating system
How to install  windows 7 operating system How to install  windows 7 operating system
How to install windows 7 operating system
 
Post exploitation using powershell
Post exploitation using powershellPost exploitation using powershell
Post exploitation using powershell
 

Viewers also liked

Crisis or Opportunity
Crisis or OpportunityCrisis or Opportunity
Crisis or Opportunity
Diane Hillmann
 
R57shell
R57shellR57shell
R57shell
ady36
 
por TELE-satellite-1107
por TELE-satellite-1107por TELE-satellite-1107
por TELE-satellite-1107
TELE-satellite por
 
Load
LoadLoad
Load
grateful7
 
fra TELE-satellite-1107
fra TELE-satellite-1107fra TELE-satellite-1107
fra TELE-satellite-1107
TELE-satellite fra
 
Tell-n-sell April 30 to May 06
Tell-n-sell April 30 to May 06Tell-n-sell April 30 to May 06
Tell-n-sell April 30 to May 06
nelsonprada123
 
TSS intro slides general
TSS intro slides generalTSS intro slides general
TSS intro slides general
Science City Bristol
 
The Seer - By Orson Pratt
The Seer - By Orson PrattThe Seer - By Orson Pratt
The Seer - By Orson Pratt
David Marques
 
Appcelerator Alloy MVC
Appcelerator Alloy MVCAppcelerator Alloy MVC
Appcelerator Alloy MVC
Fokke Zandbergen
 
X path
X pathX path
X path
Sagar Guhe
 
Dr.eduardo apresentaçao
Dr.eduardo apresentaçaoDr.eduardo apresentaçao
Dr.eduardo apresentaçao
NEG'S Desarrollo de Sitios Web
 
What`s New in Java 8
What`s New in Java 8What`s New in Java 8
What`s New in Java 8
Mohsen Zainalpour
 
Port Android To Windows App
Port Android To Windows AppPort Android To Windows App
Port Android To Windows App
Cheah Eng Soon
 
Skyworth
SkyworthSkyworth
MIT Article October 2006
MIT Article October 2006MIT Article October 2006
MIT Article October 2006
Patrick Byrne
 
The Theme Of Scat
The Theme Of ScatThe Theme Of Scat
The Theme Of Scat
Michelle Carraway
 
Wordpress 3.5 -install-appserv
Wordpress 3.5 -install-appservWordpress 3.5 -install-appserv
Wordpress 3.5 -install-appserv
Boonlert Aroonpiboon
 
가상화와 보안 발표자료
가상화와 보안 발표자료가상화와 보안 발표자료
가상화와 보안 발표자료
hanbeom Park
 
Programming Without Coding Technology (PWCT) Features - Framework & Extension
Programming Without Coding Technology (PWCT) Features - Framework & ExtensionProgramming Without Coding Technology (PWCT) Features - Framework & Extension
Programming Without Coding Technology (PWCT) Features - Framework & Extension
Mahmoud Samir Fayed
 
Teste
TesteTeste

Viewers also liked (20)

Crisis or Opportunity
Crisis or OpportunityCrisis or Opportunity
Crisis or Opportunity
 
R57shell
R57shellR57shell
R57shell
 
por TELE-satellite-1107
por TELE-satellite-1107por TELE-satellite-1107
por TELE-satellite-1107
 
Load
LoadLoad
Load
 
fra TELE-satellite-1107
fra TELE-satellite-1107fra TELE-satellite-1107
fra TELE-satellite-1107
 
Tell-n-sell April 30 to May 06
Tell-n-sell April 30 to May 06Tell-n-sell April 30 to May 06
Tell-n-sell April 30 to May 06
 
TSS intro slides general
TSS intro slides generalTSS intro slides general
TSS intro slides general
 
The Seer - By Orson Pratt
The Seer - By Orson PrattThe Seer - By Orson Pratt
The Seer - By Orson Pratt
 
Appcelerator Alloy MVC
Appcelerator Alloy MVCAppcelerator Alloy MVC
Appcelerator Alloy MVC
 
X path
X pathX path
X path
 
Dr.eduardo apresentaçao
Dr.eduardo apresentaçaoDr.eduardo apresentaçao
Dr.eduardo apresentaçao
 
What`s New in Java 8
What`s New in Java 8What`s New in Java 8
What`s New in Java 8
 
Port Android To Windows App
Port Android To Windows AppPort Android To Windows App
Port Android To Windows App
 
Skyworth
SkyworthSkyworth
Skyworth
 
MIT Article October 2006
MIT Article October 2006MIT Article October 2006
MIT Article October 2006
 
The Theme Of Scat
The Theme Of ScatThe Theme Of Scat
The Theme Of Scat
 
Wordpress 3.5 -install-appserv
Wordpress 3.5 -install-appservWordpress 3.5 -install-appserv
Wordpress 3.5 -install-appserv
 
가상화와 보안 발표자료
가상화와 보안 발표자료가상화와 보안 발표자료
가상화와 보안 발표자료
 
Programming Without Coding Technology (PWCT) Features - Framework & Extension
Programming Without Coding Technology (PWCT) Features - Framework & ExtensionProgramming Without Coding Technology (PWCT) Features - Framework & Extension
Programming Without Coding Technology (PWCT) Features - Framework & Extension
 
Teste
TesteTeste
Teste
 

Similar to Hacking_PPT

Cyber security and ethical hacking 9
Cyber security and ethical hacking 9Cyber security and ethical hacking 9
Cyber security and ethical hacking 9
Mehedi Hasan
 
Primer on password security
Primer on password securityPrimer on password security
Primer on password security
securityxploded
 
ethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.ppt
ricagip499
 
Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018
Paula Januszkiewicz
 
Desktop and Server Security
Desktop and Server SecurityDesktop and Server Security
Desktop and Server Security
Abhinit Kumar Sharma
 
Desktop and server securityse
Desktop and server securityseDesktop and server securityse
Desktop and server securityse
Appin Ara
 
So you want to be a security expert
So you want to be a security expertSo you want to be a security expert
So you want to be a security expert
Royce Davis
 
Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)
abend_cve_9999_0001
 
PowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue KidPowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue Kid
Matthew Johnson
 
AWS Summit Nordics - Getting Started With AWS
AWS Summit Nordics - Getting Started With AWSAWS Summit Nordics - Getting Started With AWS
AWS Summit Nordics - Getting Started With AWS
Amazon Web Services
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
BeyondTrust
 
An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...
An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...
An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...
Soya Aoyama
 
Duck Hunter - The return of autorun
Duck Hunter - The return of autorunDuck Hunter - The return of autorun
Duck Hunter - The return of autorun
Nimrod Levy
 
Nimrod duck hunter copy
Nimrod duck hunter   copyNimrod duck hunter   copy
Nimrod duck hunter copy
Nimrod Levy
 
hiren boot CD
hiren boot CDhiren boot CD
hiren boot CD
shaikmohammedsalman
 
Mimikatz
MimikatzMimikatz
Mimikatz
rishabh sharma
 
XP Days 2019: First secret delivery for modern cloud-native applications
XP Days 2019: First secret delivery for modern cloud-native applicationsXP Days 2019: First secret delivery for modern cloud-native applications
XP Days 2019: First secret delivery for modern cloud-native applications
Vlad Fedosov
 
Owning computers without shell access 2
Owning computers without shell access 2Owning computers without shell access 2
Owning computers without shell access 2
Royce Davis
 
Reset Forgotten Admin Password on Windows Server 2008
Reset Forgotten Admin Password on Windows Server 2008Reset Forgotten Admin Password on Windows Server 2008
Reset Forgotten Admin Password on Windows Server 2008
windowspassword
 
Owning computers without shell access dark
Owning computers without shell access darkOwning computers without shell access dark
Owning computers without shell access dark
Royce Davis
 

Similar to Hacking_PPT (20)

Cyber security and ethical hacking 9
Cyber security and ethical hacking 9Cyber security and ethical hacking 9
Cyber security and ethical hacking 9
 
Primer on password security
Primer on password securityPrimer on password security
Primer on password security
 
ethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.ppt
 
Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018
 
Desktop and Server Security
Desktop and Server SecurityDesktop and Server Security
Desktop and Server Security
 
Desktop and server securityse
Desktop and server securityseDesktop and server securityse
Desktop and server securityse
 
So you want to be a security expert
So you want to be a security expertSo you want to be a security expert
So you want to be a security expert
 
Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)
 
PowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue KidPowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue Kid
 
AWS Summit Nordics - Getting Started With AWS
AWS Summit Nordics - Getting Started With AWSAWS Summit Nordics - Getting Started With AWS
AWS Summit Nordics - Getting Started With AWS
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
 
An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...
An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...
An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...
 
Duck Hunter - The return of autorun
Duck Hunter - The return of autorunDuck Hunter - The return of autorun
Duck Hunter - The return of autorun
 
Nimrod duck hunter copy
Nimrod duck hunter   copyNimrod duck hunter   copy
Nimrod duck hunter copy
 
hiren boot CD
hiren boot CDhiren boot CD
hiren boot CD
 
Mimikatz
MimikatzMimikatz
Mimikatz
 
XP Days 2019: First secret delivery for modern cloud-native applications
XP Days 2019: First secret delivery for modern cloud-native applicationsXP Days 2019: First secret delivery for modern cloud-native applications
XP Days 2019: First secret delivery for modern cloud-native applications
 
Owning computers without shell access 2
Owning computers without shell access 2Owning computers without shell access 2
Owning computers without shell access 2
 
Reset Forgotten Admin Password on Windows Server 2008
Reset Forgotten Admin Password on Windows Server 2008Reset Forgotten Admin Password on Windows Server 2008
Reset Forgotten Admin Password on Windows Server 2008
 
Owning computers without shell access dark
Owning computers without shell access darkOwning computers without shell access dark
Owning computers without shell access dark
 

Recently uploaded

OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 

Recently uploaded (20)

OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 

Hacking_PPT

  • 1.
  • 2.
  • 3.
  • 4. A defined “methodology adopted by ethical hackers to discover the vulnerabilities existing in information systems’ operating environments.”
  • 5.  For using Virtual Operating System in your PC or Laptop use VM Ware Workstation Software. Key For VMWARE WorkStation- M35PM-RP24K-9103V-4QA66
  • 6. Q. Where the Passwords such as Admin, Login Passwords of the System are Stored ? Answer: In SAM (Security Account Manager) Files Passwords are stored in the form of Hashes. Path: C:WindowsSystem32Config
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.  By DisplayingCommand Prompt on the LOGIN Screen. By using utility of STICKY KEYS  By Creating Backdoors.
  • 13.  By using Change Access Control Lists (CACLS) Command. - Open CMD (in Windows 7 open CMD as an Administrator) - Use this Command :  For Locking the Folder- CACLS <Folder Name> /E /P Everyone :N  For Accessing the Folder CACLS <Folder Name> /E /P Everyone :F
  • 14. • Open CMD as an Administrator. • Type the following commands: • C:UsersUser Account>DISKPART Press Enter • DISKPART> Select List Volume Press Enter • DISKPART> Select Volume <Volume Number> Press Enter • DISKPART> Remove letter <Drive letter> Press Enter YOUR DISK HAS BEEN HIDDEN NOW
  • 15. • REPEAT ALL STEPS AS MENTIONED IN PREVIOUS SLIDE. • CHANGE THE FOURTH STEPAS: • DISKPART> Assign letter <Drive letter> Press Enter YOUR DISK AS BEEN VISIBLE NOW
  • 16. Process of Hiding Text in A Image File. To hide Secret Text behind an Image follow these Steps:  Open CMD.  Type in CMD: COPY /b File1.JPG + Text1.TXT My.JPG Press Enter YOUR TEXT IS COPIED TO THE IMAGE FILE
  • 17.
  • 20. • Key Loggers are the Softwares that keep all the LOG files in its Record of every key pressed on the key board. • Some of the Key Loggers are: ARDAMAX Key Logger Home Key Logger Family Key Logger Golden Key logger And Many More………….. • Warning : Key Loggers can be Detected by the Antiviruses for that we have to put off our antivirus program
  • 21. SQL Injection (Website Hacking) • Type any of following points in Google to get Admin Login pages: • INURL: admin.asp • INURL: adminlogin.asp • INURL: admin.aspx • INURL: adminlogin.aspx • INURL: admin.asp • INURL: admin.php • INURL: adminlogin.php Try This In Place Of Username & Password : login’telnet’=‘telnet’
  • 22. Fake Emailing  Some Websites for sending fake emails……… www.fakemailer.info www.fakemailer.net www.fakesend.com  Some free fake mailing Sites……. www.mailz.funfuz.co.uk www.emkei.cz
  • 23. Watch Live CCTV Cameras of Foreign Countries O This Process is known as Google Digging. O For viewing live CCTV footages just type this code in Google….. Inurl:view /index.shtml