SlideShare a Scribd company logo
:- ಕನ್ನಡ ಎ ಲ್ಸ್ ್ಲೕಯ್ ಲ್ಸ್ ವಿಶೇಷ
ಪಾಸ್ವ ರ್ಡ್ ಕಾ್ರಾ್ರ್ಯಾ ಂಗ್ / Password Cracking
➢ What is Hashes / ಹಾ್ಯಾಷೆಸ್ ಅಂದರೇನು .?
➢ Password Comparison / ಪಾಸ್ವ ರ್ಡ್ ಕೆಲಸ ಮಾಡುವುದು ಹೇಗೆ .?
➢ Types of Password Cracking / ಪಾಸ್ವ ರ್ಡ್ ಕಾ್ರಾ್ರ್ಯಾ ಕ್ಕಿಂಗ್ನ ವಿಧಗಳು
➢ Why Wordlists is required / ವಡರ್ಡ್ಲಿಸ್ಕ್ಟಿಸ್ಟ್ಸ್ ಏಕೆ ಬೇಕು .?
➢ Windows / ವಿಂಡೋಸ್ Password Cracking
➢ Unix / ಯುನಿ ಲ್ಸ್ Password Cracking
➢ Online / ಆನೆ್ಲೖನ್ Password Cracking
What is Hashes / ಹಾ್ಯಾಷೆಸ್ ಅಂದರೇನು .?
A algorithm used to generate a unique value for unique input
➢ Hashes are One Way algorithm
➢ For every unique file/text a unique value is generated no
matter what ever computer, location is to used to generate
the hash.
Plain text Input Hash Value
Password Comparison /
ಪಾಸ್ವ ರ್ಡ್ ಕೆಲಸ ಮಾಡುವುದು ಹೇಗೆ .?
Types of Password Cracking
ಪಾಸ್ವ ರ್ಡ್ ಕಾ್ರಾ್ರ್ಯಾ ಕ್ಕಿಂಗ್ನ ವಿಧಗಳು
❏ Offline Password Cracking
System Passwords ex : Windows, Unix
❏ Online Password Cracking
Network Services ex: https, ssh, ftp, telnet, rdp etc
Online Password Cracking
Why Wordlists is required / ವಡರ್ಡ್ಲಿಸ್ಕ್ಟಿಸ್ಟ್ಸ್ ಏಕೆ ಬೇಕು .?
Password Cracking Methodology
Password Hash stored in Local storage: DAD1D5E9D1694D65DF584D40A783D311
List of Possible password(Assumption) = Wordlists
Plain text Hashes of wordlist Hash from SAM file Is Equal.?
admin 209C6174DA490CAEB422F3FA5A7AE634 DAD1D5E9D1694D65DF584D40A783D311False
bkob BE164992D3641283E62BEB7BAA419ED3 DAD1D5E9D1694D65DF584D40A783D311False
windows7 DAD1D5E9D1694D65DF584D40A783D311DAD1D5E9D1694D65DF584D40A783D311True
kannada C861074A0E0EC79988E9679E8D239D12 DAD1D5E9D1694D65DF584D40A783D311False
exploits 832FFAF6C4FB517B87495F554F072C47 DAD1D5E9D1694D65DF584D40A783D311False
Password Cracking Methodology
Windows:
1. Dump Password hashes onto a file using tool Ex:pwdump
2. Copy the hashes to your attacker machine
3. Crack it the respective hash cracker / password cracker tool.
Unix:
1. Copy both Passwd and Shadow file
2. Combine both passwd and shadow in the correct order
3. Run a password cracker with suitable method to crack the password.
Password Cracking Methodology
Complexity while performing Password Cracking
ಪಾಸ್ವ ರ್ಡ್ ಕಾ್ರಾ್ರ್ಯಾ ಂಗ್ ಮಾಡುವಾಗ ಬರುವ ಅಡಚಣೆಗಳು
File Containing the Password Hashes:
Windows: C:windowssystem32configSAM
1.It can only be accessed by Administrator access
2.You cannot directly access the file, need to use any tool to get the hashes
ex: pwdump
Unix: /etc/shadow
1.It can only accessed by root / sudo access
ಪಾಸ್ವ ರ್ಡ್ ಕಾ್ರಾಸಿ ಂಗ್ ಏಕೆ ಮಾಡಬೇಕು
Why Password Cracking
❖ Cracking found Hashes for Privilege Escalation
❖ Creating a backdoor Access on Previously Hacked Machine
❖ Cracking hashes found on databases
❖ Got one Administrator Access on Target Computer
Note : Probability of any password cracking depends on the
wordlists
ಪಾ್ರಾ ೕಗಿಕ/ ಪಾ್ರಾ ಕ್ಟಿಕ ಲ್ಸ್
Windows / ವಿಂಡೋಸ್ Password Cracking
Password Comparison /
ಪಾಸ್ವ ರ್ಡ್ ಕೆಲಸ ಮಾಡುವುದು ಹೇಗೆ .?
ಪಾ್ರಾ ೕಗಿಕ/ ಪಾ್ರಾ ಕ್ಟಿಕ ಲ್ಸ್
Unix / ಯುನಿ ಲ್ಸ್ Password Cracking
Online / ಆನೆ್ಲೖನ್ Password Cracking
Sl No. Cracked = Positive Not Cracked = Negative
1 Response Code = 302/301 Response Code = 200
2 Response Code = 200 Response Code = 302/301
3 Response length is Different Response length is Same
4 Response Code = 302/301 &
Destination = Profile, Home Page
Response Code = 302/301 &
Destination = Same as login page
ಪಾ್ರಾ ೕಗಿಕ/ ಪಾ್ರಾ ಕ್ಟಿಕ ಲ್ಸ್
Online / ಆನೆ್ಲೖನ್ Password Cracking
Kannda_Exploits_Password cracking

More Related Content

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
Marius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
Expeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
Pixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
marketingartwork
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
Skeleton Technologies
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
SpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
Rajiv Jayarajah, MAppComm, ACC
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
Christy Abraham Joy
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
Vit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
MindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Kannda_Exploits_Password cracking

  • 1. :- ಕನ್ನಡ ಎ ಲ್ಸ್ ್ಲೕಯ್ ಲ್ಸ್ ವಿಶೇಷ ಪಾಸ್ವ ರ್ಡ್ ಕಾ್ರಾ್ರ್ಯಾ ಂಗ್ / Password Cracking
  • 2. ➢ What is Hashes / ಹಾ್ಯಾಷೆಸ್ ಅಂದರೇನು .? ➢ Password Comparison / ಪಾಸ್ವ ರ್ಡ್ ಕೆಲಸ ಮಾಡುವುದು ಹೇಗೆ .? ➢ Types of Password Cracking / ಪಾಸ್ವ ರ್ಡ್ ಕಾ್ರಾ್ರ್ಯಾ ಕ್ಕಿಂಗ್ನ ವಿಧಗಳು ➢ Why Wordlists is required / ವಡರ್ಡ್ಲಿಸ್ಕ್ಟಿಸ್ಟ್ಸ್ ಏಕೆ ಬೇಕು .? ➢ Windows / ವಿಂಡೋಸ್ Password Cracking ➢ Unix / ಯುನಿ ಲ್ಸ್ Password Cracking ➢ Online / ಆನೆ್ಲೖನ್ Password Cracking
  • 3. What is Hashes / ಹಾ್ಯಾಷೆಸ್ ಅಂದರೇನು .? A algorithm used to generate a unique value for unique input ➢ Hashes are One Way algorithm ➢ For every unique file/text a unique value is generated no matter what ever computer, location is to used to generate the hash. Plain text Input Hash Value
  • 4. Password Comparison / ಪಾಸ್ವ ರ್ಡ್ ಕೆಲಸ ಮಾಡುವುದು ಹೇಗೆ .?
  • 5. Types of Password Cracking ಪಾಸ್ವ ರ್ಡ್ ಕಾ್ರಾ್ರ್ಯಾ ಕ್ಕಿಂಗ್ನ ವಿಧಗಳು ❏ Offline Password Cracking System Passwords ex : Windows, Unix ❏ Online Password Cracking Network Services ex: https, ssh, ftp, telnet, rdp etc
  • 7. Why Wordlists is required / ವಡರ್ಡ್ಲಿಸ್ಕ್ಟಿಸ್ಟ್ಸ್ ಏಕೆ ಬೇಕು .? Password Cracking Methodology
  • 8. Password Hash stored in Local storage: DAD1D5E9D1694D65DF584D40A783D311 List of Possible password(Assumption) = Wordlists Plain text Hashes of wordlist Hash from SAM file Is Equal.? admin 209C6174DA490CAEB422F3FA5A7AE634 DAD1D5E9D1694D65DF584D40A783D311False bkob BE164992D3641283E62BEB7BAA419ED3 DAD1D5E9D1694D65DF584D40A783D311False windows7 DAD1D5E9D1694D65DF584D40A783D311DAD1D5E9D1694D65DF584D40A783D311True kannada C861074A0E0EC79988E9679E8D239D12 DAD1D5E9D1694D65DF584D40A783D311False exploits 832FFAF6C4FB517B87495F554F072C47 DAD1D5E9D1694D65DF584D40A783D311False Password Cracking Methodology
  • 9. Windows: 1. Dump Password hashes onto a file using tool Ex:pwdump 2. Copy the hashes to your attacker machine 3. Crack it the respective hash cracker / password cracker tool. Unix: 1. Copy both Passwd and Shadow file 2. Combine both passwd and shadow in the correct order 3. Run a password cracker with suitable method to crack the password. Password Cracking Methodology
  • 10. Complexity while performing Password Cracking ಪಾಸ್ವ ರ್ಡ್ ಕಾ್ರಾ್ರ್ಯಾ ಂಗ್ ಮಾಡುವಾಗ ಬರುವ ಅಡಚಣೆಗಳು File Containing the Password Hashes: Windows: C:windowssystem32configSAM 1.It can only be accessed by Administrator access 2.You cannot directly access the file, need to use any tool to get the hashes ex: pwdump Unix: /etc/shadow 1.It can only accessed by root / sudo access
  • 11. ಪಾಸ್ವ ರ್ಡ್ ಕಾ್ರಾಸಿ ಂಗ್ ಏಕೆ ಮಾಡಬೇಕು Why Password Cracking ❖ Cracking found Hashes for Privilege Escalation ❖ Creating a backdoor Access on Previously Hacked Machine ❖ Cracking hashes found on databases ❖ Got one Administrator Access on Target Computer Note : Probability of any password cracking depends on the wordlists
  • 12. ಪಾ್ರಾ ೕಗಿಕ/ ಪಾ್ರಾ ಕ್ಟಿಕ ಲ್ಸ್ Windows / ವಿಂಡೋಸ್ Password Cracking
  • 13. Password Comparison / ಪಾಸ್ವ ರ್ಡ್ ಕೆಲಸ ಮಾಡುವುದು ಹೇಗೆ .?
  • 14. ಪಾ್ರಾ ೕಗಿಕ/ ಪಾ್ರಾ ಕ್ಟಿಕ ಲ್ಸ್ Unix / ಯುನಿ ಲ್ಸ್ Password Cracking
  • 15. Online / ಆನೆ್ಲೖನ್ Password Cracking Sl No. Cracked = Positive Not Cracked = Negative 1 Response Code = 302/301 Response Code = 200 2 Response Code = 200 Response Code = 302/301 3 Response length is Different Response length is Same 4 Response Code = 302/301 & Destination = Profile, Home Page Response Code = 302/301 & Destination = Same as login page
  • 16. ಪಾ್ರಾ ೕಗಿಕ/ ಪಾ್ರಾ ಕ್ಟಿಕ ಲ್ಸ್ Online / ಆನೆ್ಲೖನ್ Password Cracking