Professional Documents
Culture Documents
cccccccc ccc
cc
c
c
c c c c c c c c
cc
c c c c c c c c c c cccccc
c c c c c c c c c c cccccc
cc
c
c
Hacking is the said to be the real war field in this era. It is the war between the
ethical hackers and the non-ethical hackers.͟Hacker͟ is a word that has two
meanings .Traditionally a hacker is someone who likes to think with software or
electronic systems. Hackers enjoy exploring how computer systems operate. They
love discovering new ways to work electronically. Recently, hacking has taken on
a new meaning-someone who maliciously breaks into systems for personal gain.
Technically these criminals are called crackers(criminal hackers).Crackers break
into systems with malicious intent. They are out for personal gain, fame, profit
and even revenge. They modify, delete and steal critical information ,often
making other people miserable.
ccc
Y black hat hacker, also known as a cracker or a dark side hacker (this last
definition is a direct reference to the Star Wars movies and the dark side of the
force), is someone who uses his skills with a criminal intent. Some examples are:
cracking bank accounts in order to make transferences to their own accounts,
stealing information to be sold in the black market, or attacking the computer
network of an organization for money.
ccc
White hat hackers, also known as "ethical hackers," are computer security
experts, who specialize in penetration testing, and other testing methodologies,
to ensure that a company's information systems are secure. Such people are
employed by companies where these professionals are sometimes called
"sneakers.͞.Groups of these people are often called tiger teams or red teams.
These security experts may utilize a variety of methods to carry out their tests,
including social engineering tactics, use of hacking tools, and attempts to evade
security to gain entry into secured areas.
The National Security Ygency offers certifications such as the CNSS 4011. Such a
certification covers orderly, ethical hacking techniques and team management.
Yggressor teams are called "red" teams. Defender teams are called "blue" teams.
c
The difference between black hat and white hat hackers is that white hat hacker
uses their skills and knowledge as a way to defend someone from attackers. That
means that white hat hackers offer their services to corporations, public
organizations and educational institutions.
j
Y
!
Y
Y
It͛s a simple procedure, but if done in a master͛s way a lot of gain could be made
out of .It͛s the method by which directs the user who owns an account in the web
to the illegal path, by which a hacker can get the password of the victim and have
an access over his account.
Now this seminar deals with the simplest way how a black hat hacker uses to hack
an account.
cccccccccc '
c'(cc
c
`c "!#c !c !#)c*c*c !#c*c!c*+,-...c
`c !#**c"*/cc0+c
`c *c*c*"c *c!c*+,-....c
!1c c c+-,...c
c
c
c
It is the registry edit key tag given at the run command. by doing so a screen may
pop out like this giving instruction to move to the registry. The necessary changes
could be thus given at the regedit and more by adding a dword or any other. The
further changes in the system could be thus defined. The user can give the
additional changes so as hack a system or prevent anyone from hacking the
system.
c
c
Some of the blackhat SEO tactics include: keyword stuffing, hidden text and links,
doorway and cloaked pages, link farming and blog comment spam
c 34c
inurl:forum
inurl:desired thing
intext:desired thing
Now supose u want to search a PDF , DOC , PPT on the internet then write this in
google -:
filetype:pdf
c
c!#/c
*c!#5!"c*c
c!#6c
This part deals with how to hack a website or web server using the Dos attack
Hacking techniques.
c7& cc
Deals with the part how a virus attacks a system and also deals with how to get
rid of the harmful viruses by easy methods of hacking.
So that you can overcome the viruses without an antivirus in your system.
2'
c
Deals with the part of how to hack a mobile by the easy steps of hacking.
2 *c*c!!#c*c c
ccc
Password cracking doesn͛t always involve sophisticated tools.It can be as simple
as finding a sticky note with the password written on it stuck right to the monitor
or hidden under a keyboard. Ynother crude technique is known as ͞dumpster
diving͟, which basically involves an attacker going through your garbage to find
discarded documentation that may contain passwords.
Yttacks can involve far greater levels of sophistication. Here are some of the more
common techniques used in password cracking.
*!c!!#c
c!!#cc
Ynother well-known form of attack is the hybrid attack.Y hybrid attack will add
numbers of symbols to the filename to successfully crack a password. Many
people change their passwords by simply adding a number to the end of their
current password. The pattern usually takes this form:first month password is
͞cat͟:second month password is ͟cat1͟:third month password is ͞cat2͟:and so on.
c*c!!#c
Y brute force attack is the most comprehensive form of attack, though it may
often take a long time to work depending on the complexity of the password.
Some brute force attacks can take a week depending on the complexity of the
password. LOphtcrack can also be used in a brute force attack.
'2c'(cc''
c
c&
c'c c'cc
8
2c
One of the most popular tools is the LOphtcrack(now called LC4). LOphtCrack is a
tool that allows an attacker to take an encrypted Windows NT/2000 passwords
and convert them to plain text. Windows NT/2000 passwords are in
cryptographic hashes and cannot be read without a tool like Lophtcarck . It works
by attempting every alphanumeric combinations possible to try to crack the
passwords.
Password and user account exploitation is one of the largest isuues in the network
security. Yttacks on a company or organisation͛s computer systems take many
different forms, such as spoofing,smurfing,and other types of denial of
service(Dos) attacks.these attacks are designed to harmor interrupt the use of
your operational systems.Password cracking is a term used to describe the
penetration of network,system or resource with or without the use of tools to
unlock a resource that has been secured with a password.