SlideShare a Scribd company logo
1 of 25
A defined “methodology adopted
by ethical hackers to discover the
vulnerabilities existing in information
systems’ operating environments.”
   For using Virtual Operating System in your
    PC or Laptop use VM Ware Workstation
    Software.



        Key For VMWARE WorkStation-
       M35PM-RP24K-9103V-4QA66
Q. Where the Passwords such as Admin, Login
     Passwords of the System are Stored ?


Answer: In SAM (Security Account Manager) Files
  Passwords are stored in the form of Hashes.

   Path: C:WindowsSystem32Config
   By Displaying Command Prompt on the
    LOGIN Screen.
              By using utility of STICKY KEYS


   By Creating Backdoors.
 By using Change Access Control Lists (CACLS)
  Command.
    - Open CMD (in Windows 7 open CMD as an
      Administrator)
    - Use this Command :
 For Locking the Folder-
   CACLS <Folder Name> /E /P Everyone :N
 For Accessing the Folder
   CACLS <Folder Name> /E /P Everyone :F
• Open CMD as an Administrator.
• Type the following commands:

  •   C:UsersUser Account>DISKPART Press Enter
  •   DISKPART> Select List Volume      Press Enter
  •   DISKPART> Select Volume <Volume Number> Press Enter
  •   DISKPART> Remove letter <Drive letter>      Press Enter


               YOUR DISK HAS BEEN HIDDEN NOW
• REPEAT ALL STEPS AS MENTIONED IN PREVIOUS SLIDE.
• CHANGE THE FOURTH STEP AS:


  • DISKPART> Assign letter <Drive letter>   Press Enter



              YOUR DISK AS BEEN VISIBLE NOW
 Process of Hiding Text in A Image File.
 To hide Secret Text behind an Image follow these
  Steps:

   Open CMD.
   Type in CMD:
      COPY /b File1.JPG + Text1.TXT My.JPG   Press Enter

       YOUR TEXT IS COPIED TO THE IMAGE FILE
Phishing
Phishing
• Key Loggers are the Softwares that keep all the LOG files in
  its Record of every key pressed on the key board.
• Some of the Key Loggers are:
       ARDAMAX Key Logger
       Home Key Logger
       Family Key Logger
       Golden Key logger
       And Many More…………..
• Warning : Key Loggers can be Detected by the
              Antiviruses for that we have to put off our
              antivirus program
SQL Injection (Website Hacking)
 • Type any of following points in Google to get Admin
   Login pages:
            •   INURL:   admin.asp
            •   INURL:   adminlogin.asp
            •   INURL:   admin.aspx
            •   INURL:   adminlogin.aspx
            •   INURL:   admin.asp
            •   INURL:   admin.php
            •   INURL:   adminlogin.php

Try This In Place Of Username & Password :
                         login’telnet’=‘telnet’
Fake Emailing
 Some Websites for sending fake emails………


                  www.fakemailer.info
                  www.fakemailer.net
                  www.fakesend.com

 Some free fake mailing Sites…….
                 www.mailz.funfuz.co.uk
                    www.emkei.cz
Watch Live CCTV Cameras of
       Foreign Countries

O This Process is known as Google Digging.
O For viewing live CCTV footages just type this
  code in Google…..


Inurl:view /index.shtml
Hacking
Hacking

More Related Content

What's hot (6)

Windows 8.1 Deployment - Tools, Tools, Tools
Windows 8.1 Deployment - Tools, Tools, ToolsWindows 8.1 Deployment - Tools, Tools, Tools
Windows 8.1 Deployment - Tools, Tools, Tools
 
Readme
ReadmeReadme
Readme
 
Install window xp
Install window xpInstall window xp
Install window xp
 
alicia
aliciaalicia
alicia
 
Command prompt presentation
Command prompt presentationCommand prompt presentation
Command prompt presentation
 
How to access the BIOS ?
How to access the BIOS ?How to access the BIOS ?
How to access the BIOS ?
 

Viewers also liked

Presentatie vine:insta
Presentatie vine:instaPresentatie vine:insta
Presentatie vine:insta
Akashjay94
 
17 juli 1203 beleg van constantinopel
17 juli 1203 beleg van constantinopel17 juli 1203 beleg van constantinopel
17 juli 1203 beleg van constantinopel
r0372991
 
گزارش بازدید از نمایشگاه تلکام
گزارش بازدید از نمایشگاه تلکامگزارش بازدید از نمایشگاه تلکام
گزارش بازدید از نمایشگاه تلکام
kimiyaabedini
 
Facing the one-game studio challenge by Olivier issaly, Managing Director at ...
Facing the one-game studio challenge by Olivier issaly, Managing Director at ...Facing the one-game studio challenge by Olivier issaly, Managing Director at ...
Facing the one-game studio challenge by Olivier issaly, Managing Director at ...
Sylvain Gauthier
 

Viewers also liked (20)

Presentatie vine:insta
Presentatie vine:instaPresentatie vine:insta
Presentatie vine:insta
 
17 juli 1203 beleg van constantinopel
17 juli 1203 beleg van constantinopel17 juli 1203 beleg van constantinopel
17 juli 1203 beleg van constantinopel
 
RF/IF Amplifier Product Overview
RF/IF Amplifier Product OverviewRF/IF Amplifier Product Overview
RF/IF Amplifier Product Overview
 
2
22
2
 
گزارش بازدید از نمایشگاه تلکام
گزارش بازدید از نمایشگاه تلکامگزارش بازدید از نمایشگاه تلکام
گزارش بازدید از نمایشگاه تلکام
 
MPC854XE: PowerQUICC III Processors
MPC854XE: PowerQUICC III ProcessorsMPC854XE: PowerQUICC III Processors
MPC854XE: PowerQUICC III Processors
 
1º ano (p) - Atomística (aula 02)
1º ano (p) - Atomística (aula 02) 1º ano (p) - Atomística (aula 02)
1º ano (p) - Atomística (aula 02)
 
Juanito
JuanitoJuanito
Juanito
 
Educación ambiental
Educación ambientalEducación ambiental
Educación ambiental
 
1000W Medical AC-DC Power Supply
1000W Medical AC-DC Power Supply1000W Medical AC-DC Power Supply
1000W Medical AC-DC Power Supply
 
Educacion ambiental
Educacion ambiental Educacion ambiental
Educacion ambiental
 
Juanito daniela
Juanito danielaJuanito daniela
Juanito daniela
 
Study On MCP23S09 I/O Expander with SPI Interface
Study On MCP23S09 I/O Expander with SPI InterfaceStudy On MCP23S09 I/O Expander with SPI Interface
Study On MCP23S09 I/O Expander with SPI Interface
 
Enzymes
EnzymesEnzymes
Enzymes
 
Solubilidade e soluções químicas
Solubilidade e soluções químicasSolubilidade e soluções químicas
Solubilidade e soluções químicas
 
ISL6257: Highly Integrated Battery Charger Controller for Li-Ion/Li-Ion Polym...
ISL6257: Highly Integrated Battery Charger Controller for Li-Ion/Li-Ion Polym...ISL6257: Highly Integrated Battery Charger Controller for Li-Ion/Li-Ion Polym...
ISL6257: Highly Integrated Battery Charger Controller for Li-Ion/Li-Ion Polym...
 
Senior design final presentation master
Senior design final presentation masterSenior design final presentation master
Senior design final presentation master
 
El caso juanito
El caso juanitoEl caso juanito
El caso juanito
 
Facing the one-game studio challenge by Olivier issaly, Managing Director at ...
Facing the one-game studio challenge by Olivier issaly, Managing Director at ...Facing the one-game studio challenge by Olivier issaly, Managing Director at ...
Facing the one-game studio challenge by Olivier issaly, Managing Director at ...
 
1º ano (P) - substância
1º ano (P) - substância1º ano (P) - substância
1º ano (P) - substância
 

Similar to Hacking

AWS Summit Nordics - Getting Started With AWS
AWS Summit Nordics - Getting Started With AWSAWS Summit Nordics - Getting Started With AWS
AWS Summit Nordics - Getting Started With AWS
Amazon Web Services
 
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
CODE BLUE
 
AWS Summit Benelux 2013 - Getting Started with AWS
AWS Summit Benelux 2013 - Getting Started with AWSAWS Summit Benelux 2013 - Getting Started with AWS
AWS Summit Benelux 2013 - Getting Started with AWS
Amazon Web Services
 

Similar to Hacking (20)

Windows logging workshop - BSides Austin 2014
Windows logging workshop - BSides Austin 2014Windows logging workshop - BSides Austin 2014
Windows logging workshop - BSides Austin 2014
 
Windows Offender_ Reverse Engineering Windows Defender's Antivirus Emulator
Windows Offender_ Reverse Engineering Windows Defender's Antivirus EmulatorWindows Offender_ Reverse Engineering Windows Defender's Antivirus Emulator
Windows Offender_ Reverse Engineering Windows Defender's Antivirus Emulator
 
AWS Summit Nordics - Getting Started With AWS
AWS Summit Nordics - Getting Started With AWSAWS Summit Nordics - Getting Started With AWS
AWS Summit Nordics - Getting Started With AWS
 
MS Just Gave the Blue Team Tactical Nukes (And How Red Teams Need To Adapt) -...
MS Just Gave the Blue Team Tactical Nukes (And How Red Teams Need To Adapt) -...MS Just Gave the Blue Team Tactical Nukes (And How Red Teams Need To Adapt) -...
MS Just Gave the Blue Team Tactical Nukes (And How Red Teams Need To Adapt) -...
 
Owning computers without shell access 2
Owning computers without shell access 2Owning computers without shell access 2
Owning computers without shell access 2
 
Cyber security and ethical hacking 9
Cyber security and ethical hacking 9Cyber security and ethical hacking 9
Cyber security and ethical hacking 9
 
Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)
 
Captain Hook: Pirating AVs to Bypass Exploit Mitigations
Captain Hook: Pirating AVs to Bypass Exploit MitigationsCaptain Hook: Pirating AVs to Bypass Exploit Mitigations
Captain Hook: Pirating AVs to Bypass Exploit Mitigations
 
Piratng Avs to bypass exploit mitigation
Piratng Avs to bypass exploit mitigationPiratng Avs to bypass exploit mitigation
Piratng Avs to bypass exploit mitigation
 
Duck Hunter - The return of autorun
Duck Hunter - The return of autorunDuck Hunter - The return of autorun
Duck Hunter - The return of autorun
 
Nimrod duck hunter copy
Nimrod duck hunter   copyNimrod duck hunter   copy
Nimrod duck hunter copy
 
hacking and crecjing
hacking and crecjinghacking and crecjing
hacking and crecjing
 
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
[CB20] Operation I am Tom: How APT actors move laterally in corporate network...
 
HKG15-407: EME implementation in Chromium: Linaro Clear Key
HKG15-407: EME implementation in Chromium: Linaro Clear Key HKG15-407: EME implementation in Chromium: Linaro Clear Key
HKG15-407: EME implementation in Chromium: Linaro Clear Key
 
ETHICAL HACKING
ETHICAL HACKINGETHICAL HACKING
ETHICAL HACKING
 
Practical solutions for connections administrators lite
Practical solutions for connections administrators litePractical solutions for connections administrators lite
Practical solutions for connections administrators lite
 
So you want to be a security expert
So you want to be a security expertSo you want to be a security expert
So you want to be a security expert
 
AWS Summit Benelux 2013 - Getting Started with AWS
AWS Summit Benelux 2013 - Getting Started with AWSAWS Summit Benelux 2013 - Getting Started with AWS
AWS Summit Benelux 2013 - Getting Started with AWS
 
Fun with exploits old and new
Fun with exploits old and newFun with exploits old and new
Fun with exploits old and new
 
Owning computers without shell access dark
Owning computers without shell access darkOwning computers without shell access dark
Owning computers without shell access dark
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Hacking

  • 1.
  • 2.
  • 3.
  • 4. A defined “methodology adopted by ethical hackers to discover the vulnerabilities existing in information systems’ operating environments.”
  • 5. For using Virtual Operating System in your PC or Laptop use VM Ware Workstation Software. Key For VMWARE WorkStation- M35PM-RP24K-9103V-4QA66
  • 6. Q. Where the Passwords such as Admin, Login Passwords of the System are Stored ? Answer: In SAM (Security Account Manager) Files Passwords are stored in the form of Hashes. Path: C:WindowsSystem32Config
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. By Displaying Command Prompt on the LOGIN Screen. By using utility of STICKY KEYS  By Creating Backdoors.
  • 13.  By using Change Access Control Lists (CACLS) Command. - Open CMD (in Windows 7 open CMD as an Administrator) - Use this Command :  For Locking the Folder- CACLS <Folder Name> /E /P Everyone :N  For Accessing the Folder CACLS <Folder Name> /E /P Everyone :F
  • 14. • Open CMD as an Administrator. • Type the following commands: • C:UsersUser Account>DISKPART Press Enter • DISKPART> Select List Volume Press Enter • DISKPART> Select Volume <Volume Number> Press Enter • DISKPART> Remove letter <Drive letter> Press Enter YOUR DISK HAS BEEN HIDDEN NOW
  • 15. • REPEAT ALL STEPS AS MENTIONED IN PREVIOUS SLIDE. • CHANGE THE FOURTH STEP AS: • DISKPART> Assign letter <Drive letter> Press Enter YOUR DISK AS BEEN VISIBLE NOW
  • 16.  Process of Hiding Text in A Image File.  To hide Secret Text behind an Image follow these Steps:  Open CMD.  Type in CMD: COPY /b File1.JPG + Text1.TXT My.JPG Press Enter YOUR TEXT IS COPIED TO THE IMAGE FILE
  • 17.
  • 20. • Key Loggers are the Softwares that keep all the LOG files in its Record of every key pressed on the key board. • Some of the Key Loggers are: ARDAMAX Key Logger Home Key Logger Family Key Logger Golden Key logger And Many More………….. • Warning : Key Loggers can be Detected by the Antiviruses for that we have to put off our antivirus program
  • 21. SQL Injection (Website Hacking) • Type any of following points in Google to get Admin Login pages: • INURL: admin.asp • INURL: adminlogin.asp • INURL: admin.aspx • INURL: adminlogin.aspx • INURL: admin.asp • INURL: admin.php • INURL: adminlogin.php Try This In Place Of Username & Password : login’telnet’=‘telnet’
  • 22. Fake Emailing  Some Websites for sending fake emails……… www.fakemailer.info www.fakemailer.net www.fakesend.com  Some free fake mailing Sites……. www.mailz.funfuz.co.uk www.emkei.cz
  • 23. Watch Live CCTV Cameras of Foreign Countries O This Process is known as Google Digging. O For viewing live CCTV footages just type this code in Google….. Inurl:view /index.shtml