SlideShare ist ein Scribd-Unternehmen logo
1 von 25
A defined “methodology adopted
by ethical hackers to discover the
vulnerabilities existing in information
systems’ operating environments.”
 For using Virtual Operating System in your
PC or Laptop use VM Ware Workstation
Software.
Key For VMWARE WorkStation-
M35PM-RP24K-9103V-4QA66
Q. Where the Passwords such as Admin, Login
Passwords of the System are Stored ?
Answer: In SAM (Security Account Manager) Files
Passwords are stored in the form of Hashes.
Path: C:WindowsSystem32Config
 By DisplayingCommand Prompt on the
LOGIN Screen.
By using utility of STICKY KEYS
 By Creating Backdoors.
 By using Change Access Control Lists (CACLS)
Command.
- Open CMD (in Windows 7 open CMD as an
Administrator)
- Use this Command :
 For Locking the Folder-
CACLS <Folder Name> /E /P Everyone :N
 For Accessing the Folder
CACLS <Folder Name> /E /P Everyone :F
• Open CMD as an Administrator.
• Type the following commands:
• C:UsersUser Account>DISKPART Press Enter
• DISKPART> Select List Volume Press Enter
• DISKPART> Select Volume <Volume Number> Press Enter
• DISKPART> Remove letter <Drive letter> Press Enter
YOUR DISK HAS BEEN HIDDEN NOW
• REPEAT ALL STEPS AS MENTIONED IN PREVIOUS SLIDE.
• CHANGE THE FOURTH STEPAS:
• DISKPART> Assign letter <Drive letter> Press Enter
YOUR DISK AS BEEN VISIBLE NOW
Process of Hiding Text in A Image File.
To hide Secret Text behind an Image follow these
Steps:
 Open CMD.
 Type in CMD:
COPY /b File1.JPG + Text1.TXT My.JPG Press Enter
YOUR TEXT IS COPIED TO THE IMAGE FILE
Phishing
Phishing
• Key Loggers are the Softwares that keep all the LOG files in
its Record of every key pressed on the key board.
• Some of the Key Loggers are:
ARDAMAX Key Logger
Home Key Logger
Family Key Logger
Golden Key logger
And Many More…………..
• Warning : Key Loggers can be Detected by the
Antiviruses for that we have to put off our
antivirus program
SQL Injection (Website Hacking)
• Type any of following points in Google to get Admin
Login pages:
• INURL: admin.asp
• INURL: adminlogin.asp
• INURL: admin.aspx
• INURL: adminlogin.aspx
• INURL: admin.asp
• INURL: admin.php
• INURL: adminlogin.php
Try This In Place Of Username & Password :
login’telnet’=‘telnet’
Fake Emailing
 Some Websites for sending fake emails………
www.fakemailer.info
www.fakemailer.net
www.fakesend.com
 Some free fake mailing Sites…….
www.mailz.funfuz.co.uk
www.emkei.cz
Watch Live CCTV Cameras of
Foreign Countries
O This Process is known as Google Digging.
O For viewing live CCTV footages just type this
code in Google…..
Inurl:view /index.shtml
Hacking_PPT
Hacking_PPT

Weitere ähnliche Inhalte

Was ist angesagt?

Fix runtime error 217
Fix runtime error 217Fix runtime error 217
Fix runtime error 217SarahLamusu
 
Windows 8.1 Deployment - Tools, Tools, Tools
Windows 8.1 Deployment - Tools, Tools, ToolsWindows 8.1 Deployment - Tools, Tools, Tools
Windows 8.1 Deployment - Tools, Tools, ToolsRoel van Bueren
 
Explanation of Operating System ! Designed By: A jay Kumar
Explanation of Operating System ! Designed By: A jay KumarExplanation of Operating System ! Designed By: A jay Kumar
Explanation of Operating System ! Designed By: A jay Kumarajayskumars
 
Post exploitation using powershell
Post exploitation using powershellPost exploitation using powershell
Post exploitation using powershellMihir Shah
 

Was ist angesagt? (8)

How to download
How to downloadHow to download
How to download
 
Fix runtime error 217
Fix runtime error 217Fix runtime error 217
Fix runtime error 217
 
Windows 8.1 Deployment - Tools, Tools, Tools
Windows 8.1 Deployment - Tools, Tools, ToolsWindows 8.1 Deployment - Tools, Tools, Tools
Windows 8.1 Deployment - Tools, Tools, Tools
 
Explanation of Operating System ! Designed By: A jay Kumar
Explanation of Operating System ! Designed By: A jay KumarExplanation of Operating System ! Designed By: A jay Kumar
Explanation of Operating System ! Designed By: A jay Kumar
 
Installation guide_Rajeev
Installation guide_RajeevInstallation guide_Rajeev
Installation guide_Rajeev
 
How To Prevent Virus Part1
How To Prevent Virus Part1How To Prevent Virus Part1
How To Prevent Virus Part1
 
How to install windows 7 operating system
How to install  windows 7 operating system How to install  windows 7 operating system
How to install windows 7 operating system
 
Post exploitation using powershell
Post exploitation using powershellPost exploitation using powershell
Post exploitation using powershell
 

Andere mochten auch

Andere mochten auch (20)

Crisis or Opportunity
Crisis or OpportunityCrisis or Opportunity
Crisis or Opportunity
 
R57shell
R57shellR57shell
R57shell
 
por TELE-satellite-1107
por TELE-satellite-1107por TELE-satellite-1107
por TELE-satellite-1107
 
Load
LoadLoad
Load
 
fra TELE-satellite-1107
fra TELE-satellite-1107fra TELE-satellite-1107
fra TELE-satellite-1107
 
Tell-n-sell April 30 to May 06
Tell-n-sell April 30 to May 06Tell-n-sell April 30 to May 06
Tell-n-sell April 30 to May 06
 
TSS intro slides general
TSS intro slides generalTSS intro slides general
TSS intro slides general
 
The Seer - By Orson Pratt
The Seer - By Orson PrattThe Seer - By Orson Pratt
The Seer - By Orson Pratt
 
Appcelerator Alloy MVC
Appcelerator Alloy MVCAppcelerator Alloy MVC
Appcelerator Alloy MVC
 
X path
X pathX path
X path
 
Dr.eduardo apresentaçao
Dr.eduardo apresentaçaoDr.eduardo apresentaçao
Dr.eduardo apresentaçao
 
What`s New in Java 8
What`s New in Java 8What`s New in Java 8
What`s New in Java 8
 
Port Android To Windows App
Port Android To Windows AppPort Android To Windows App
Port Android To Windows App
 
Skyworth
SkyworthSkyworth
Skyworth
 
MIT Article October 2006
MIT Article October 2006MIT Article October 2006
MIT Article October 2006
 
The Theme Of Scat
The Theme Of ScatThe Theme Of Scat
The Theme Of Scat
 
Wordpress 3.5 -install-appserv
Wordpress 3.5 -install-appservWordpress 3.5 -install-appserv
Wordpress 3.5 -install-appserv
 
가상화와 보안 발표자료
가상화와 보안 발표자료가상화와 보안 발표자료
가상화와 보안 발표자료
 
Programming Without Coding Technology (PWCT) Features - Framework & Extension
Programming Without Coding Technology (PWCT) Features - Framework & ExtensionProgramming Without Coding Technology (PWCT) Features - Framework & Extension
Programming Without Coding Technology (PWCT) Features - Framework & Extension
 
Teste
TesteTeste
Teste
 

Ähnlich wie Hacking_PPT

Cyber security and ethical hacking 9
Cyber security and ethical hacking 9Cyber security and ethical hacking 9
Cyber security and ethical hacking 9Mehedi Hasan
 
Primer on password security
Primer on password securityPrimer on password security
Primer on password securitysecurityxploded
 
ethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptricagip499
 
Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Paula Januszkiewicz
 
Desktop and server securityse
Desktop and server securityseDesktop and server securityse
Desktop and server securityseAppin Ara
 
So you want to be a security expert
So you want to be a security expertSo you want to be a security expert
So you want to be a security expertRoyce Davis
 
Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)abend_cve_9999_0001
 
PowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue KidPowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue KidMatthew Johnson
 
AWS Summit Nordics - Getting Started With AWS
AWS Summit Nordics - Getting Started With AWSAWS Summit Nordics - Getting Started With AWS
AWS Summit Nordics - Getting Started With AWSAmazon Web Services
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramBeyondTrust
 
An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...
An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...
An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...Soya Aoyama
 
Duck Hunter - The return of autorun
Duck Hunter - The return of autorunDuck Hunter - The return of autorun
Duck Hunter - The return of autorunNimrod Levy
 
Nimrod duck hunter copy
Nimrod duck hunter   copyNimrod duck hunter   copy
Nimrod duck hunter copyNimrod Levy
 
XP Days 2019: First secret delivery for modern cloud-native applications
XP Days 2019: First secret delivery for modern cloud-native applicationsXP Days 2019: First secret delivery for modern cloud-native applications
XP Days 2019: First secret delivery for modern cloud-native applicationsVlad Fedosov
 
Owning computers without shell access 2
Owning computers without shell access 2Owning computers without shell access 2
Owning computers without shell access 2Royce Davis
 
Reset Forgotten Admin Password on Windows Server 2008
Reset Forgotten Admin Password on Windows Server 2008Reset Forgotten Admin Password on Windows Server 2008
Reset Forgotten Admin Password on Windows Server 2008windowspassword
 
Owning computers without shell access dark
Owning computers without shell access darkOwning computers without shell access dark
Owning computers without shell access darkRoyce Davis
 

Ähnlich wie Hacking_PPT (20)

Cyber security and ethical hacking 9
Cyber security and ethical hacking 9Cyber security and ethical hacking 9
Cyber security and ethical hacking 9
 
Primer on password security
Primer on password securityPrimer on password security
Primer on password security
 
ethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.ppt
 
Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018Gartner Security & Risk Management Summit 2018
Gartner Security & Risk Management Summit 2018
 
Desktop and server securityse
Desktop and server securityseDesktop and server securityse
Desktop and server securityse
 
Desktop and Server Security
Desktop and Server SecurityDesktop and Server Security
Desktop and Server Security
 
So you want to be a security expert
So you want to be a security expertSo you want to be a security expert
So you want to be a security expert
 
Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)
 
PowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue KidPowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue Kid
 
AWS Summit Nordics - Getting Started With AWS
AWS Summit Nordics - Getting Started With AWSAWS Summit Nordics - Getting Started With AWS
AWS Summit Nordics - Getting Started With AWS
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
 
An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...
An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...
An inconvenient truth: Evading the Ransomware Protection in windows 10 @ Hack...
 
Duck Hunter - The return of autorun
Duck Hunter - The return of autorunDuck Hunter - The return of autorun
Duck Hunter - The return of autorun
 
Nimrod duck hunter copy
Nimrod duck hunter   copyNimrod duck hunter   copy
Nimrod duck hunter copy
 
hiren boot CD
hiren boot CDhiren boot CD
hiren boot CD
 
Mimikatz
MimikatzMimikatz
Mimikatz
 
XP Days 2019: First secret delivery for modern cloud-native applications
XP Days 2019: First secret delivery for modern cloud-native applicationsXP Days 2019: First secret delivery for modern cloud-native applications
XP Days 2019: First secret delivery for modern cloud-native applications
 
Owning computers without shell access 2
Owning computers without shell access 2Owning computers without shell access 2
Owning computers without shell access 2
 
Reset Forgotten Admin Password on Windows Server 2008
Reset Forgotten Admin Password on Windows Server 2008Reset Forgotten Admin Password on Windows Server 2008
Reset Forgotten Admin Password on Windows Server 2008
 
Owning computers without shell access dark
Owning computers without shell access darkOwning computers without shell access dark
Owning computers without shell access dark
 

Kürzlich hochgeladen

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Kürzlich hochgeladen (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

Hacking_PPT

  • 1.
  • 2.
  • 3.
  • 4. A defined “methodology adopted by ethical hackers to discover the vulnerabilities existing in information systems’ operating environments.”
  • 5.  For using Virtual Operating System in your PC or Laptop use VM Ware Workstation Software. Key For VMWARE WorkStation- M35PM-RP24K-9103V-4QA66
  • 6. Q. Where the Passwords such as Admin, Login Passwords of the System are Stored ? Answer: In SAM (Security Account Manager) Files Passwords are stored in the form of Hashes. Path: C:WindowsSystem32Config
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.  By DisplayingCommand Prompt on the LOGIN Screen. By using utility of STICKY KEYS  By Creating Backdoors.
  • 13.  By using Change Access Control Lists (CACLS) Command. - Open CMD (in Windows 7 open CMD as an Administrator) - Use this Command :  For Locking the Folder- CACLS <Folder Name> /E /P Everyone :N  For Accessing the Folder CACLS <Folder Name> /E /P Everyone :F
  • 14. • Open CMD as an Administrator. • Type the following commands: • C:UsersUser Account>DISKPART Press Enter • DISKPART> Select List Volume Press Enter • DISKPART> Select Volume <Volume Number> Press Enter • DISKPART> Remove letter <Drive letter> Press Enter YOUR DISK HAS BEEN HIDDEN NOW
  • 15. • REPEAT ALL STEPS AS MENTIONED IN PREVIOUS SLIDE. • CHANGE THE FOURTH STEPAS: • DISKPART> Assign letter <Drive letter> Press Enter YOUR DISK AS BEEN VISIBLE NOW
  • 16. Process of Hiding Text in A Image File. To hide Secret Text behind an Image follow these Steps:  Open CMD.  Type in CMD: COPY /b File1.JPG + Text1.TXT My.JPG Press Enter YOUR TEXT IS COPIED TO THE IMAGE FILE
  • 17.
  • 20. • Key Loggers are the Softwares that keep all the LOG files in its Record of every key pressed on the key board. • Some of the Key Loggers are: ARDAMAX Key Logger Home Key Logger Family Key Logger Golden Key logger And Many More………….. • Warning : Key Loggers can be Detected by the Antiviruses for that we have to put off our antivirus program
  • 21. SQL Injection (Website Hacking) • Type any of following points in Google to get Admin Login pages: • INURL: admin.asp • INURL: adminlogin.asp • INURL: admin.aspx • INURL: adminlogin.aspx • INURL: admin.asp • INURL: admin.php • INURL: adminlogin.php Try This In Place Of Username & Password : login’telnet’=‘telnet’
  • 22. Fake Emailing  Some Websites for sending fake emails……… www.fakemailer.info www.fakemailer.net www.fakesend.com  Some free fake mailing Sites……. www.mailz.funfuz.co.uk www.emkei.cz
  • 23. Watch Live CCTV Cameras of Foreign Countries O This Process is known as Google Digging. O For viewing live CCTV footages just type this code in Google….. Inurl:view /index.shtml