SlideShare a Scribd company logo
1 of 36
-: Password Hacking :-


Password cracking is the process of recovering secret passwords from data that has been stored
in or transmitted by a computer system. A common approach is to repeatedly try guesses for the
password.
Most passwords can be cracked by using following techniques :

1) Hashing :- Here we will refer to the one way function (which may be either an encryption
function or cryptographic hash) employed as a hash and its output as a hashed password.
If a system uses a reversible function to obscure stored passwords, exploiting that weakness can
recover even 'well-chosen' passwords.
One example is the LM hash that Microsoft Windows uses by default to store user passwords
that are less than 15 characters in length.
LM hash breaks the password into two 7-character fields which are then hashed separately,
allowing each half to be attacked separately.

          Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert
          when used correctly.


2) Guessing :- Many passwords can be guessed either by humans or by sophisticated cracking
programs armed with dictionaries (dictionary based) and the user's personal information.

Not surprisingly, many users choose weak passwords, usually one related to themselves in some
way. Repeated research over some 40 years has demonstrated that around 40% of user-chosen
passwords are readily guessable by programs. Examples of insecure choices include:

* blank (none)
* the word "password", "passcode", "admin" and their derivatives
* the user's name or login name
* the name of their significant other or another person (loved one)
* their birthplace or date of birth
* a pet's name
* a dictionary word in any language
* automobile licence plate number
* a row of letters from a standard keyboard layout (eg, the qwerty keyboard -- qwerty itself, asdf,
or qwertyuiop)
* a simple modification of one of the preceding, such as suffixing a digit or reversing the order
of the letters.
and so on....

In one survery of MySpace passwords which had been phished, 3.8 percent of passwords were a
single word found in a dictionary, and another 12 percent were a word plus a final digit; two-
thirds of the time that digit was.
A password containing both uppercase & lowercase characters, numbers and special
          characters too; is a strong password and can never be guessed.


                                    Check Your Password Strength




3) Default Passwords :- A moderately high number of local and online applications have inbuilt
default passwords that have been configured by programmers during development stages of
software. There are lots of applications running on the internet on which default passwords are
enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive
information. A list containing default passwords of some of the most popular applications is
available on the internet.

          Always disable or change the applications' (both online and offline) default username-
          password pairs.


4) Brute Force :- If all other techniques failed, then attackers uses brute force password cracking
technique. Here an automatic tool is used which tries all possible combinations of available keys
on the keyboard. As soon as correct password is reached it displays on the screen.This
techniques takes extremely long time to complete, but password will surely cracked.


          Long is the password, large is the time taken to brute force it.



5) Phishing :- This is the most effective and easily executable password cracking technique
which is generally used to crack the passwords of e-mail accounts, and all those accounts where
secret information or sensitive personal information is stored by user such as social networking
websites, matrimonial websites, etc.
Phishing is a technique in which the attacker creates the fake login screen and send it to the
victim, hoping that the victim gets fooled into entering the account username and password. As
soon as victim click on "enter" or "login" login button this information reaches to the attacker
using scripts or online form processors while the user(victim) is redirected to home page of e-
mail service provider.

          Never give reply to the messages which are demanding for your username-password,
          urging to be e-mail service provider.

It is possible to try to obtain the passwords through other different methods, such as social
engineering, wiretapping, keystroke logging, login spoofing, dumpster diving, phishing, shoulder
surfing, timing attack, acoustic cryptanalysis, using a Trojan Horse or virus, identity
management system attacks (such as abuse of Self-service password reset) and compromising
host security.
However, cracking usually designates a guessing attack.

                         -: Windows-XP Password Cracking :-


Here we use the tool "Cain and Abel" for cracking passwords of any local user/administrator.
First download cain and abel from "http://www.oxid.it/cain.html" and install it on your system.

Make sure that you have disabled the antivirus/firewall running on your system before installing
and throughout this process.

Two most effective techniques used here are "Brute-Force" and "Cryptanalysis".

Brute-Force:- As this techniques takes more time to complete, the attacker prefer this
technique only when there is a hope that the password contain same type of characters or may be
two. i.e only loweralpha, only alpha, only numeric or may be loweralpha-numeric, also it should
contain less than 7 characters. Otherwise it takes more time to crack password, which may be the
mixture of all types of characters along with special symbols.
The step-by-step explaination for this technique is given below-


1) Open the tool "Cain and Abel"
2) Go into the category "Cracker"   it displays all sub-categories under "Cracker"
in left panel.
3) Select "LM & NTLM Hashes" from left panel and then click on   symbol, you will be
greeted by a window as shown.
4) Check "import hashes from local system" and then click "Next". This shows all the active
accounts on local system like administrator, guest, etc. along with LM and NT hashed values of
their respective passwords, as shown below.
5) Right clicking on any username shows all available options using which we can crack it's
password.
6) Here we select "Brute-Force Attack" and then "NTLM Hashes", since windows uses NTLM
hashes to store local users' passwords.

7) You will be greeted by a window where you can modify properties for brute-force attack such
as password length, character set, etc.
8) Click on "Start" button.

9) On completion it will reveal the exact password.
ShareThis



                                            NEXT



                          -: Windows-XP Password Cracking :-


Cryptanalisys :- Basically, Cryptanalisys means Operations performed in converting
encrypted messages to plain text without initial knowledge of the crypto-algorithm and/or key
employed in the encryption.
This is the fastest technique of password cracking possible due to "Rainbow Tables".
A rainbow table is a file that is used to lookup an unknown plaintext from a known hash for an
algorithm that does not usually permit this operation.
Steps 1 to 4 i.e upto importing hashes from local system, are similar to previous technique (i.e
brute-force). The steps coming after that are as follows-

5) Here, select "cryptanalisys attack" then "NTLM hashes" and then select "via rainbow tables".
Here we can choose either OphCrack or RainbowCrack formats of tables. The rainbow tables are
available free to download on internet.
Due to large file size of rainbow tables (350MB - 3GB); instead of downloading we can also
create at own just by downloading rainbow table generator (winrtgen.zip of 181KB) free
download at "http://www.oxid.it/downloads/winrtgen.zip"




6) Click on "Add Table"
7) Browse for the location of rainbow table on your system, select proper table and click "open".
8) Select the loaded table and then click on "Start" button.




9) On completetion it will show the exact password.
To learn windows password cracking techniques properly, one must understand "LM"
          & "NTLM" algorithms, SAM File, Dumping NTLM hashes from local SAM, Rainbow
          Tables, etc.......!


ShareThis

                                       -: IP Spoofing :-


The term IP (Internet Protocol) address spoofing refers to the creation of IP packets with a forged
(spoofed) source IP address with the purpose of concealing the identity of the sender or
impersonating another computing system.

Why it works ?
IP-Spoofing works because trusted services only rely on network address based authentication.
Since IP is easily duped, address forgery is not difficult.
The main reason is security weakness in the TCP protocol known as sequence number
prediction.

How it works ?
To completely understand how ip spoofing can take place, one must examine the structure of the
TCP/IP protocol suite. A basic understanding of these headers and network exchanges is crucial
to the process.

Internet Protocol (IP) :
It is a network protocol operating at layer 3 (network) of the OSI model. It is a connectionless
model, meaning there is no information regarding transaction state, which is used to route
packets on a network. Additionally, there is no method in place to ensure that a packet is
properly delivered to the destination.




Examining the IP header, we can see that the first 12 bytes (or the top 3 rows of the header)
contain various information about the packet. The next 8 bytes (the next 2 rows), however,
contains the source and destination IP addresses. Using one of several tools, an attacker can
easily modify these addresses – specifically the “source address” field.

Transmission Control Protocol (TCP) :
It is the connection-oriented, reliable transport protocol in the TCP/IP suite. Connection-oriented
simply means that the two hosts participating in a discussion must first establish a connection via
the 3-way handshake (SYN-SYN/ACK-ACK). Reliability is provided by data sequencing and
acknowledgement. TCP assigns sequence numbers to every segment and acknowledges any and
all data segments recieved from the other end.
As you can see above, the first 12 bytes of the TCP packet, which contain port and sequencing
information.

TCP sequence numbers can simply be thought of as 32-bit counters. They range from 0 to
4,294,967,295. Every byte of data exchanged across a TCP connection (along with certain flags)
is sequenced. The sequence number field in the TCP header will contain the sequence number of
the *first* byte of data in the TCP segment. The acknowledgement number field in the TCP
header holds the value of next *expected* sequence number, and also acknowledges *all* data
up through this ACK number minus one.

TCP packets can be manipulated using several packet crafting softwares available on the
internet.

The Attack
IP-spoofing consists of several steps. First, the target host is choosen. Next, a pattern of trust is
discovered, along with a trusted host. The trusted host is then disabled, and the target's TCP
sequence numbers are sampled. The trusted host is impersonated, the sequence numbers guessed,
and a connection attempt is made to a service that only requires address-based authentication. If
successful, the attacker executes a simple command to leave a backdoor.

Spoofing can be implemented by different ways as given below -

Non-Blind Spoofing :- This type of attack takes place when the attacker is on the same subnet as
the victim. The sequence and acknowledgement numbers can be sniffed, eliminating the
potential difficulty of calculating them accurately.

Blind Spoofing :- Here the sequence and acknowledgement numbers are unreachable. In order
to circumvent this, several packets are sent to the target machine in order to sample sequence
numbers.
Both types of spoofing are forms of a common security violation known as a Man In The Middle
Attack. In these attacks, a malicious party intercepts a legitimate communication between two
friendly parties. The malicious host then controls the flow of communication and can eliminate
or alter the information sent by one of the original participants without the knowledge of either
the original sender or the recipient. In this way, an attacker can fool a victim into disclosing
confidential information by “spoofing” the identity of the original sender, who is presumably
trusted by the recipient.

IP spoofing is almost always used in what is currently one of the most difficult attacks to defend
against – Denial of Service attacks, or DoS.

                                           CounterMeasures
   1) Filtering at the Router :- Implementing ingress and egress filtering on your border
      routers is a great place to start your spoofing defense. You will need to implement an
      ACL (access control list)

        2) Encryption and Authentication :- Implementing encryption and authentication will
        also reduce spoofing threats. Both of these features are included in Ipv6, which will
        eliminate current spoofing threats.

        3) Initial Sequence Number Randomizing.


        ShareThis

                                       -: The ZIP of Death :-

   1)
        This is a exploit of the compression algorithms to make a small zip that will extract into extream
        amounts their are more ways and better ones than this one but i will only show how to make a
        simple 1k = 1m ratio.

        1) Make a.txt file

        2) Open and type the null character (alt + 255)

        3) Press ctrl + a then ctrl + v a couple times to make some null bytes

        4) If u have a hexeditor make the hex 00 for about 50 kilobytes.

        5) Now make several copies of a.txt and name accordinly
6) Open cmd.exe

       7) Type copy /b *.txt b.txt

       8) Now every copy is made into a super copy and repeat

       9) Once you have a nice empty big text file like 1gb. Put it in a zip archive.
       Because of the simple construction of the file, 1gb of null bytes.....!

       The zip is only 1 mb in size and can really annoy freinds.
       For added fun hex edit the zip and you will see a bunch of hex 5555

       Just add some more and the file will expand amazingly

       Make sure to not open this after

       You can always create your zip of death from the command line in linux
       dd if=/dev/zero bs=1000 count=1000000 | gzip > test.gz




       ShareThis

                           -: Create An Ftp Server On Your PC :-


Process-1:
First of all u have to get an static IP-Address.
Need a a static ip-address for ur FTP Server.Necessity for getting this static ip-address is ur not
suppose to use ur own IP-Address.The main reason is u dont want to show ur IP-Address to
everyone , there are many other reasons too but leave them aside..

1) Goto no-ip & create urself a free account.

2) Now ur account been created & ll receive ur account password via mail to ur email address.

3) After getting ur password login to ur account of no-ip.com
4.After getting logged in, click upon add a HOST its on the left menu.

5) Type any hostname u want (eg:-abc) & select any domain from da given list (eg:-
ftpserve.com) Click on Submit.

6) Now u have owned ur own static address (example: abc.serveftp.com)
7) Now click downloads button which is present above on the page & click on which operating
system ur using & den download DNS update client or u can download it from here directly, this
is for microsoft window users..

8) After getting downloaded, u have to install this software & login here with ur email addresss
& p/w wen asked for it.

9) At last tick on da check box present at the static address.

10) U have ur own static web address.


Process-2:
Installation & setting of the FTP-Server

1) You have to install Serv-U 4.1.03 , download this software from here

2) Run Serv-U & use da wizard to setup ur FTP.

3) Click on next until u have been asked for IP-Address, leave it as it is & click upon next.

4) Enter ur domain name u have registered (example: abc.serveftp.com) it above in da domain
field & click upon next.

5) U ll be asked for anonymous access, select No & click upon next.

6) Next u ll be asked for creating a named account, select yes & click upon next.

7) Choose any user name u wish (eg:-xyz) & clcik upon next.

8) Enter password for dis account (eg:-adc341) for security purpose choose difficult password.

9) U ll be asked for da home directory for the account which u have created above.Select
directory & click upon next.

10) Click on yes for locking dis account to da home directory, doing dis da user cannot further
move up into home directory, click upon next.

11) At last ur account has been created click finish.


Process-3:
Configuring the user accounts which u have been created.

1) On the left tree-menu, select da account which u have been created above & den click upon
General Tab.
2) Goto Hide 'Hidden' Files.

3) Check Allow only and enter the number one in the box.

4) Set da maximum downloading speed upto wat extent u want.As this is an account so many ll
be using so set it low(eg:-10-20) to save ur bandwidth.Don't leave it blank as uers can download
with full bandwidth.

5) choose how many users u want to login at on time.It depends on ur connection speed try these
(56 - 1, ISDN - 3, ADSL or cable - 5-6 users.)

6) Click upon Dir Access Tab.

7) Now u can c home folder here.Highlight it & make ur permission.

8) If u want only users to download check only these Read,List & Inherit.

9) If u want ur users to upload into ur server & bu tto only 1 particular folder but not to
downlaod, click upon dat add button & then select dat folder, Now u have to highlight dat folder
& set these permissions on dat folder.Check,Write,Appened,List,Create & Inherit after setting
these permissions click on the arrow which is present at the bottom right-hand corner.U want dis
upload folder 2 be list first, before da home folder.

10) If der is any folder which u dont want anyone to access it, & it is present in the home folder,
den click da add button & den select da folder.Now u have to highlight dat folder & see dat no
all da checkboxes are left.After doing this click upon upper arrow which is present at bottom
right hand corner.

11) There are many things u can do, These are only the basics....

12) Your server is now ready to be connected..

13) Login with your username & password...

   1)

        ShareThis
               2) -: Reveal *****(Asterisk) Passwords Using Javascript :-
   3)
        Want to Reveal the Passwords Hidden Behind Asterisk (****) ?

        Follow the steps given below-

        1) Open the Login Page of any website. (eg. http://mail.yahoo.com)

        2) Type your 'Username' and 'Password'.
3) Copy and paste the JavaScript code given below into your browser's address bar and
      press 'Enter'.
               4) javascript: alert(document.getElementById('Passwd').value);
 5)

      4) As soon as you press 'Enter', A window pops up showing Password typed by you..!


      Note :- This trick may not be working with firefox.

               -: Increase Broadband Speed Using Simple Tweak :-


 A Simple Tweak (XP Pro only) which will increase your Broadband Speed.

 Make sure you Log on as Administrator, not as a user with Administrator
                             privileges.

                           Follow the steps as given below-

                                1) Click on Start Button.

                           2) Select Run From Start Menu.

                                   3) Type gpedit.msc

                4) Expand the [Administrative Templates] branch.

                       5) Then Expand the [Network] branch.

           6) Highlight(Select by Single Click) [QoS Packet Scheduler]

7) Double-click [Limit Reservable Bandwidth] (Available in Right Side Panel)

                  8) Check(Select By Single Click on it) [Enabled]

                       9) Change [Bandwidth limit %] to 0 %

                                 10) Click [OK] Button.

                                  11) Restart Your PC.
12) Now Check Your Broadband Speed.
                                 -: Wireless Hacking :-


Wireless networks broadcast their packets using radio frequency or optical wavelengths. A
modern laptop computer can listen in. Worse, an attacker can manufacture new packets on the
fly and persuade wireless stations to accept his packets as legitimate.
The step by step procerdure in wireless hacking can be explained with help of different topics as
follows:-

1) Stations and Access Points :- A wireless network interface card (adapter) is a device, called a
station, providing the network physical layer over a radio link to another station.
An access point (AP) is a station that provides frame distribution service to stations associated
with it.
The AP itself is typically connected by wire to a LAN. Each AP has a 0 to 32 byte long Service
Set Identifier (SSID) that is also commonly called a network name. The SSID is used to segment
the airwaves for usage.

2) Channels :- The stations communicate with each other using radio frequencies between 2.4
GHz and 2.5 GHz. Neighboring channels are only 5 MHz apart. Two wireless networks using
neighboring channels may interfere with each other.

3) Wired Equivalent Privacy (WEP) :- It is a shared-secret key encryption system used to
encrypt packets transmitted between a station and an AP. The WEP algorithm is intended to
protect wireless communication from eavesdropping. A secondary function of WEP is to prevent
unauthorized access to a wireless network. WEP encrypts the payload of data packets.
Management and control frames are always transmitted in the clear. WEP uses the RC4
encryption algorithm.

4) Wireless Network Sniffing :- Sniffing is eavesdropping on the network. A (packet) sniffer is
a program that intercepts and decodes network traffic broadcast through a medium. It is easier to
sniff wireless networks than wired ones. Sniffing can also help find the easy kill as in scanning
for open access points that allow anyone to connect, or capturing the passwords used in a
connection session that does not even use WEP, or in telnet, rlogin and ftp connections.

5 ) Passive Scanning :- Scanning is the act of sniffing by tuning to various radio channels of the
devices. A passive network scanner instructs the wireless card to listen to each channel for a few
messages. This does not reveal the presence of the scanner. An attacker can passively scan
without transmitting at all.

6) Detection of SSID :- The attacker can discover the SSID of a network usually by passive
scanning because the SSID occurs in the following frame types: Beacon, Probe Requests, Probe
Responses, Association Requests, and Reassociation Requests. Recall that management frames
are always in the clear, even when WEP is enabled.
When the above methods fail, SSID discovery is done by active scanning
7) Collecting the MAC Addresses :- The attacker gathers legitimate MAC addresses for use
later in constructing spoofed frames. The source and destination MAC addresses are always in
the clear in all the frames.

8) Collecting the Frames for Cracking WEP :- The goal of an attacker is to discover the WEP
shared-secret key. The attacker sniffs a large number of frames An example of a WEP cracking
tool is AirSnort ( http://airsnort.shmoo.com ).

9) Detection of the Sniffers :- Detecting the presence of a wireless sniffer, who remains radio-
silent, through network security measures is virtually impossible. Once the attacker begins
probing (i.e., by injecting packets), the presence and the coordinates of the wireless device can
be detected.

10) Wireless Spoofing :- There are well-known attack techniques known as spoofing in both
wired and wireless networks. The attacker constructs frames by filling selected fields that contain
addresses or identifiers with legitimate looking but non-existent values, or with values that
belong to others. The attacker would have collected these legitimate values through sniffing.

11) MAC Address Spoofing :- The attacker generally desires to be hidden. But the probing
activity injects frames that are observable by system administrators. The attacker fills the Sender
MAC Address field of the injected frames with a spoofed value so that his equipment is not
identified.

12) IP spoofing :- Replacing the true IP address of the sender (or, in rare cases, the destination)
with a different address is known as IP spoofing. This is a necessary operation in many attacks.

13) Frame Spoofing :- The attacker will inject frames that are valid but whose content is
carefully spoofed.

14) Wireless Network Probing :- The attacker then sends artificially constructed packets to a
target that trigger useful responses. This activity is known as probing or active scanning.

15) AP Weaknesses :- APs have weaknesses that are both due to design mistakes and user
interfaces

16) Trojan AP :- An attacker sets up an AP so that the targeted station receives a stronger signal
from it than what it receives from a legitimate AP.

17) Denial of Service :- A denial of service (DoS) occurs when a system is not providing
services to authorized clients because of resource exhaustion by unauthorized clients. In wireless
networks, DoS attacks are difficult to prevent, difficult to stop. An on-going attack and the
victim and its clients may not even detect the attacks. The duration of such DoS may range from
milliseconds to hours. A DoS attack against an individual station enables session hijacking.

18) Jamming the Air Waves :- A number of consumer appliances such as microwave ovens,
baby monitors, and cordless phones operate on the unregulated 2.4GHz radio frequency. An
attacker can unleash large amounts of noise using these devices and jam the airwaves so that the
signal to noise drops so low, that the wireless LAN ceases to function.

19) War Driving :- Equipped with wireless devices and related tools, and driving around in a
vehicle or parking at interesting places with a goal of discovering easy-to-get-into wireless
networks is known as war driving. War-drivers (http://www.wardrive.net) define war driving as
“The benign act of locating and logging wireless access points while in motion.” This benign act
is of course useful to the attackers.
Regardless of the protocols, wireless networks will remain potentially insecure because an
attacker can listen in without gaining physical access.

                           Tips for Wireless Home Network Security
   1)
        1) Change Default Administrator Passwords (and Usernames)
        2) Turn on (Compatible) WPA / WEP Encryption
        3) Change the Default SSID
        4) Disable SSID Broadcast
        5) Assign Static IP Addresses to Devices
        6) Enable MAC Address Filtering
        7) Turn Off the Network During Extended Periods of Non-Use
        8) Position the Router or Access Point Safely
                                     2) -: BlueTooth Hacking :-
   3)
        Discovering Bluetooth Devices :-
        Before any two bluetooth enabled devices can start communicating with one another,
        they must carry out a procedure known as discovery. It can be carried out by scanning for
        other active devices within the range.

                                        Recommended Tools
                             It will try to extract as much information as possible for each
        BlueScanner                               newly discovered device
                                                                                               Download
                             It is a GUI-based utility for finding discoverable and hidden
         BlueSniff                            Bluetooth-enabled devices                        Download
                                It is a J2ME application that can browse and explore the
                           technical specification of surrounding Bluetooth enabled devices.
        BTBrowser            It works on phones that supports JSR-82 - the Java Bluetooth
                                                                                               Download
                                                       specification
                               It is a scanner for Windows Mobile based devices. It also
        BTCrawler                implements the BlueJacking and BlueSnarfing attacks
                                                                                                -----

   4)
        Hacking Bluetooth Devices :-
        There are a variety of different types of bluetooth related threats and attacks that can be
executed against unsuspecting mobile phone users. Following are some of the most
        common types of threats :-

        1) BluePrinting Attack :- Information gathering is the first step in the quest to break into
        target system. Even BlueTooth devices can be fingerprinted or probed for information
        gathering using the technique known as BluePrinting. Using this one can determine
        manufacturer, model, version, etc. for target bluetooth enabled device.

                                        Recommended Tools
         BluePrint                               As the name suggests                           Download
                            It is an information gathering tool that allows attacker to query
        BTScanner                      devices without the need to carry out pairing            Download
   5)
        2) BlueJack Attack :- Bluejacking is the process of sending an anonymous message
        from a bluetooth enabled phone to another, within a particular range without knowing the
        exact source of the recieved message to the recepient.

                                        Recommended Tools
         FreeJack                         Bluejacking tool written in JAVA                       -----
                             Can I Hack With Bluetooth (CIHWB) is a Bluetooth security
                              auditing framework for Windows Mobile 2005. Supports
         CIHWB             BlueSnarf, BlueJack, and some DoS attacks. Should work on any
                                                                                                Download
                                    PocketPC with the Microsoft Bluetooth stack
   6)
        3) BlueSnarf Attack :- Bluesnarfing is the process of connecting vulnerable mobile
        phones through bluetooth, without knowing the victim. It involves OBEX protocol by
        which an attacker can forcibly push/pull sensitive data in/out of the victim's mobile
        phone, hence also known as OBEX pull attack.
        This attack requires J2ME enabled mobile phones as the attacker tool. With J2ME
        enabled phone, just by using bluesnarfing tools like Blooover, Redsnarf, Bluesnarf, etc.
        an attacker can break into target mobile phone for stealing sensitive data such as address
        book, photos, mp3, videos, SMS, ......!

                                        Recommended Tools
                            It is a J2ME-based auditing tool. It is intended to serve as an
         Blooover          auditing tool to check whether a mobile phone is vulnerable. It      Download
                                      can also be used to carry out BlueBug attack
         RedSnarf                         One of the best bluesnarfing tool                      -----
                          It downloads the phone-book of any mobile device vulnerable to
        BlueSnarfer                               Bluesnarfing
                                                                                                Download


                                     -: BlueTooth Hacking :-


4) Blue Backdoor Attack :- Here, the bluetooth related vulnerability exploits the pairing
mechanism that is used to establish a connection between two bluetooth enabled devices.Not
only does it gives the attacker complete access and control over the target but also allows the
attacker to place strategic backdoors for continued access and entry.

5) BlueBug Attack :- It was first discovered by Martin Herfurt and allows attackers to gain
complete control over the data, voice and messaging channels of vulnerable target mobile
phones.

                                        Recommended Tools
       BlueBugger                        Exploits the BlueBug vulnerability                     Download
                           It is a Bluetooth penetration testing suite. It implements attacks
        Bluediving              like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack, etc.           Download



6) The bluetooth protocol allows devices to use 16 digit long pairing codes.
Unfortunately many applications continue to use only 4 digit pairing codes which can be
easily brute-forced. This is known as short pairing codes.
Most slave bluetooth devices continue to use default pairing codes such as 0000, 1111,
1234, etc. So, easy to crack and gain access...!

                                        Recommended Tools
                             BTCrack is a Bluetooth Pass phrase (PIN) cracking tool.
        BTCrack            BTCrack aims to reconstruct the Passkey and the Link key from        Download
                                            captured Pairing exchanges




                     -: Other Powerful BlueTooth Hacking Tools :-


Transient Bluetooth Environment Auditor :- T-BEAR is a security-auditing platform for
Bluetooth-enabled devices. The platform consists of Bluetooth discovery tools, sniffing
tools and various cracking tools.   Download

BlueTest :- BlueTest is a Perl script designed to do data extraction from vulnerable
Bluetooth-enabled devices.       Download

BTAudit :- BTAudit is a set of programs and scripts for auditing Bluetooth-enabled
devices.    Download

RedFang :- It is a brute force tool that finds even non-discoverable device.
  Download

BlueAlert :- A windows based tool that runs on bluetooth enabled computer and alerts
the user each time a blurtooth device leaves or enters into its range.
BlueFang :- Similar to BlueAlert.

Bluestumbler :- One of the best BluePrinting tool.


Super Bluetooth Hack :- With this java software you can connect to another mobile
and ….

Once connected to a another phone via bluetooth you can-

      Read his/her messages
      Read his/her contacts
      Change profile
      Play ringtone even if phone is on silent
      Play songs
      Restart the phone
      Switch off the phone
      Restore factory settings
      Change ringing volume
      Call from his phone it includes all call functions like hold, etc.

Notes:-
1) When connecting devices use a code 0000
2) At start of program on smartphones do not forget to turn on bluetooth before start of
the mobile .

    Download- Super_Bluetooth_Hack_v1.07.zip (99 KB)

What is 94FBR ??

goto google type like this–>

94fbr kaspersky
94fbr nero
94fbr winrar
94fbr avast
94fbr adobe photoshop
etc

94fbr followed by software name or software name followed by 94fbr,then click search you will
get the serial and cracks.

94FBR was part of a Microsoft Office 2000 product key that was released on the internet that
bypassed Microsofts activation system.Because it is a relatively uncommon term, when you add
it to your search queries, it will generally return results of pages listing illegal serial numbers.
enjoy it….

Get free domain names
There are many website which offer free domain names for some time.You can register and try
them

www.co.cc
you can register 3 domains as a free member and 100 domains if you pay them a fee of about $10

www.eu.tv
This is a new domain and you can register 3 domains for free and then you must pay.

www.co.tv
you can register 3 domains for free and pay from your 4th domain

There are many others

Display Message at Windows Startup

This is a simple registry trick by which you can display your message at windows startup.You
have to edit your registry.It will pop message just before a user is going to log on.Check the
following steps

1.Go to your registry

2. Navigate to
HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionWinLogon

Now create a new string Value in the right pane named LegalNoticeCaption and enter the value
that you want to see in the Menu Bar. Now create another new string value and name it:
LegalNoticeText

 Now insert the message you want to display each time Windows startup

Change My documents location in xp

I think many of you don‟t know about this fact that the storage location of “My Documents” can
be changed. Its is safe , when crash or need to be formatted
Normally windows save the “My Documents” folder on your C-drive. But when you right-click
on it and go to properties, you can change the location where you want windows to save your
Documents folder.

Steps
1.Right-click on My documents

2.Go to properties

3.Change your location

This can be very useful when If windows hangs or become crupt and you have to format your C-
drive again,Then you documents will not be lost due to formating.

Hack Windows XP Administrator Password
This is one of the best method to Hack Windows XP Administrator Password.For hacking
admin you must have log in as guest or limited account.This methodod hacking sdmin is very
easy.You don‟t need any software or live cd.All hacking is done manual.To hack XP admin
password follow these steps.Please backup your files which we are going to use here.

Method

1.Go to C:/windows/system32

2.Copy cmd.exe and paste it on desktop

3.Rename cmd.exe to sethc.exe

4.Copy the new sethc.exe to system 32,when windows asks for overwriting the file,then click
yes

5.Now press shift key 5 times you will get cmd prompt close that

6.Now Log out from your guest account and at the login screen,press shift key 5 times.

7.You will get commmand prompt there
Now type “ NET USER ADMINISTRATOR mypassword” where “mypassword” can be any
password and Administrator is name of admin account ,then press enter.

8.You will see “ The Command completed successfully” and then exit the command prompt.

Thats done…You have hacked administrator password

If you have any problem comment here.Please backup your cmd.exe and sethc.exe if you are
trying this on your own computer.This works because of sethc.exe process Vulnerability in
Windows XP.You can search google for more information about it.
This method of hacking XP admin password can be used in your college lab where you have
limited or guest access to computers.
How to Send Fake & Anonymous email To Friend
There are many website which allows you to send fake and anonymous email.You can put your
own From address, To address, Subject and message and can play a prank with your friend or
whoever you want.Here is a list of some websites which you can use.You can play prank and fun
with your friend by sending fake email with his girlfriend email address.
Check it out

1.http://deadfake.com/

Deadfake – a site that lets you send free fake emails to anyone you like. Not only is it
anonymous, you can make it appear to come from anyone you choose.This is a good site to send
fake emails.This is best site to send fake emails.

2.http://funworld-free-mail.emailsender.mobi/

This a another site to send fake emails

http://www.anonymailer.net/

Anonymous email, often referred to as prank email, allows the user to send an email without
disclosing their identity. This site is not fully free you have to paid.You can check this by
sending fake emails to yourself.

If you have more sited to send fake Email To your Friend share it here.
Enjoy fake email prank

Don’t send any spam or other illegal things . Email is never really fully anonymous

Incoming search terms:

How to change START Text in XP


Its a very powerful tool & you can do almost anything wid this tool. Now since you just wanna
know how to change the “start” button…follow the steps:

1) After downloading the file….open ResHacker.exe

2) B4 dat go 2 C:WINDOWS n take d backup of explorer.exe & copy it to a different location.
Just 4 safety…there‟s no danger in the method

3) Now as you‟ve opened ResHacker.exe…goto File –> Open
Now look for explorer.exe in the path C:WINDOWS… click on it & open it

4) Once u open it u‟ll see a list of items on d left side starting form Bitmap to 240
5) Now double click on “String Table”

6) Now if you have a “Classic look/style” for windows….double click on 38 else if you are
having a “Windows XP style” click on 37

7) When you double-click on either of these. you will see a no. 1033…click on it

  Now if you are following a Windows XP style then on d text area u will see “start” written in
d manner i‟ve written on line no. 578. Give d name u wnt but within d quotes. And 4 Windows
Classic Style…its written on line no. 595

9) After you write the name you want….click on compile script, a tabular button on top of text
area


10) Now most important…go 2 File & click on SAVE AS button & not save

11) Save it with any name u want…in C:WINDOWS folder. For e.g. explorerrahul.exe.
Don‟t 4get 2 end the name u‟ve given with d extention .exe & write the word “explorer” in front
of name u‟ve given. It may work if u don‟t write explorer too. But i haven‟t tried it

12) Now exit ResHacker.exe & goto Start –> Run….type regedit & hit enter

13) Now goto HKEY_LOCAL_MACHINE –> SOFTWARE –> MICROSOFT –> WINDOWS
NT –> Winlogon & single click on it. On d right side look 4 “Shell REG_SZ Explorer.exe”.
Double click on Shell & write thename u‟d given along with the extention .exe and remember,
the name that u had given for the “start”button and the name with which you saved it need not be
the same.

Click on Ok & exit. Log off & Log on, That DONE. Guyz it SAFE, plz don‟t worry. Just do
exactly as i‟ve said…and everything will run accordingly. You can try different things too…if
You dare. I‟ve done it !!! ResHacker is power tool. Play around with it. And u‟ll get to know
more.

Add Photos in My Computer Properties..


Add your Photos in My Computer Properties
Todo this:
1. Open Notepad.
2. Type the following:
[General]
Manufacturer=”Your company name”
Model=Intel® Core™2 Duo
[Support Information]
Line1= Your phone number
Line2= address
Line3= Your email or website
3. Save as “oeminfo.ini” in the System32 folder.(Without Quote)
4. Create a bmp file(Your Photo) and save it the System32 folder as “oemlogo.bmp”(Without Quote).
5. Now Check your My Computer Properties.
And I just have done it………..!


XP game cheats:

Freecell


Secret – Instant Win
Instructions – Hold down Ctrl + Shift + F10 during game play. Then you will be asked if you
want to Abort, Retry or Ignore. Choose Abort, then move any card to instantly win.

Secret – Hidden Game Modes
Instructions – In the “Game” menu choose “Select Game”. Enter -1 or -2 to activate the hidden
game modes.

Hearts


Secret – Show All Cards
Instructions – Go to Start, Run, Type: „Regedit‟, OK. Edit this registry key:
HKEY_CURRENT_USERSoftwareMicrosoft
WindowsCurrentVersionAppletsHearts
Right click on the Hearts folder, select New, String Value and name it ZB. Right-click on ZB,
select Modify and enter a Value Data of 42, OK and close Regedit. Start Hearts (not Internet
Hearts). Once in a game Press Ctrl + Alt + Shift + F12 to show all the cards.

How to make file undetectable
Use binding ,this is simple binding.In this tutorial you will see how to bind two files together
using WinRAR.This is useful if you are sending a file and you want it to extract and run straight
away.For this tutorial I will be using a simple .exe file (command[1].exe) and game.exe file

Step 1:Get the files you want to bind.

Step 2:Highlight them both and add to archive.

Step 3:Change the name and select “Create SFX archive”

Step 4:Go to the “Advanced” tab at the top and click on “SFX options”
Step 5:In the “General” tab type in the name of the file you want to run after the extraction.

Step 6:Go to the “Modes” tab and select “Hide all”

Step 7:Go to the “Text and icon” tab and change the icon to something other than the WinRAR
icon

Step 8:Click “OK” on the advanced window and “OK” in the main window and it will create the
file.

Now when the user clicks on it extracts and automatically runs command[1].exe
This can be used in a variety of ways, you can experiment with the options to get different
results.

Incoming search term

How to Protect Your Web Server From Hackers ?


Creating your own website is not simply about putting some pages and information online.
Ensuring the security of your website is a bigger and highly crucial task. Most websites these
days have a dedicated web server that gives them the leverage to grow and develop further.
Basically the websites with a high volume of web traffic, a heavy database and complex
application specifications require an exclusive web server. It is extremely important to hack
proof your web server in order to protect your website and business.

There are a great number of hackers out there in the web world who are looking for opportunities
to exploit your web server and cause serious damage. These hackers look to deface the websites
with malicious content, use the scripts on the server to send out spam or phish out the personal
sensitive information of the website users. Such attacks also attempt to tamper with parameters
and gain access to confidential files or cross-site scripting or cookie poisoning to alter the
customer data. These kinds of invasions can prove to be fatal for e-commerce and finance based
websites. To prevent your web server from falling prey to such web attacks, here are some
important recommendations and anti hacking tips.You need to follow a two-pronged approach
to safeguard your web server from any hackers.

The first layer is a firewall that exists to block any unwarranted unused Internet ports. A good
firewall will use a rule based access system to allow only the legitimate users to enter and filter
out as well as obstruct any malicious traffic from accessing the server. Also create strong
passwords that use a combination of characters, numbers and special characters in order to keep
the password hackers at bay.

The second element is to put in place an intrusion protection service. This is a more sophisticated
approach to deal with hackers wherein you stop the illegitimate entry of users at the source itself.
If a firewall works on the front line, an intrusion protection system works on the back end to deal
with the enemies. This involves putting all the compromised hosts in the quarantine section and
letting the genuine users move through efficiently. But setting up such an anti-hacking
arrangement is only the first step. The hackers are moving fast and ahead with newer techniques
to break into and sabotage the web servers. So, you need to continually update and monitor the
filters, blacklists and all other aspects.

Incoming search terms:


Command Prompt Tricks Tips & Hacks
There are lot of command prompt tricks and tips which many of us don‟t know about.Command
prompt can be very useful if you know how to use.Just go to cmd and check the following cool
commands

1. systeminfo

With this command, you can retrieve the following information:

Host Name
OS Name
OS Version
OS Manufacturer
OS Configuration
OS Build Type
Registered Owner etc

2. driverquery

Get Installed Driver Information

3. ipconfig /all

information about your network connection and IP address


4.   subst W: C:windows

Map A Drive Letter to a Folder

5. tasklist

List All Tasks Running On The Computer

6.taskkill /im programnames.exe /f

to Kill A Program
There are many other also will update soon


Blocking unblocking websites manually

Do The Following :

For eg you want to block www.xyz.com !

1. Open the folder C:WINDOWSsystem32driversetc

2. There you will find a file named HOSTS

3. Click on the file and press SHIFT and now right click on it .

4. From the right click menu select Open with .

5. Now, select Notepad to open the file from the list !

6. Now, in the file under the line 127.0.0.1 localhost add another line as 127.0.0.2 www.xyz.com.

7. Now, File>>Save !

For unblocking just follow the same procedure vice versa.

Ntoskrnl.exe Missing or Corrupt XP
Try the following method to fix this ntoskrnl.exe problem.Hope this will fix your problem

1.Start the computer by using your Windows XP CD-ROM. Press any key to boot from the CD.

2.After the setup files are finished loading press R to repair using Recovery Console.

3.When you are in the recovery console, select the installation to log on to (usually number 1),
and then press ENTER.

4.Login to the Administrator account by typing the password for this account, and then press
ENTER.

5.At the recovery console command prompt, type the following command, and then press
ENTER:

For Uni-Processor systems:
expand :i386ntoskrnl.ex_ :Windowssystem32ntoskrnl.exe For Multi-Processor systems:
expand :i386ntkrnlmp.ex_ :Windowssystem32ntoskrnl.exe Note In these two commands, the
placeholder represents the drive letter of your CD drive, and the placeholder represents the drive
letter of the hard disk on which windows is installed.

6.If you receive a prompt to overwrite the file, press Y.

7.Type exit, and press ENTER at the command prompt.

This method from microsoft support .If this does not work check the following help link

http://support.microsoft.com/kb/314477

Mozialla FireFox tricks

copy the line written in bold in address bar and hit enter..

chrome://browser/content/browser.xul
Opens another Firefox inside a tab in the the existing Firefox window.

chrome://browser/content/preferences/preferences.xul

:: Opens the Options dialog box inside the Firefox tab.

chrome://browser/content/bookmarks/bookmarksPanel.xul
:: Opens the “Book Marks Manager” inside a tab in the Firefox window.

chrome://browser/content/history/history-panel.xul
:: Opens the History Panel in the Firefox tab.

chrome://mozapps/content/extensions/extensions.xul?type=extensions
:: Opens the Extensions window in the current tab.

chrome://browser/content/preferences/cookies.xul
:: Opens the “cookies window” inside a tab in the Firefox window.

chrome://browser/content/preferences/sanitize.xul
:: Opens the “Clear Private Data” window inside the current tab.

chrome://browser/content/aboutDialog.xul
:: Opens the “About Firefox” Dialog box inside the tab.

chrome://browser/content/credits.xhtml
:: A scrolling list of name.

More Related Content

What's hot

HOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGES
HOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGESHOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGES
HOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGESBrown_Laura
 
MEI Unlock - Use Any Network on your Smartphone without Restriction
MEI Unlock - Use Any Network on your Smartphone without RestrictionMEI Unlock - Use Any Network on your Smartphone without Restriction
MEI Unlock - Use Any Network on your Smartphone without RestrictionAlexia Ruby
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Best Practices for Password Creation
Best Practices for Password CreationBest Practices for Password Creation
Best Practices for Password CreationnFront Security
 
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDETWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDECTM360
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
Password Attack
Password Attack Password Attack
Password Attack Sina Manavi
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProRonald Soh
 
SSL Communication and Mutual Authentication
SSL Communication and Mutual AuthenticationSSL Communication and Mutual Authentication
SSL Communication and Mutual AuthenticationCleo
 
OWASP Secure Coding
OWASP Secure CodingOWASP Secure Coding
OWASP Secure Codingbilcorry
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 

What's hot (20)

HOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGES
HOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGESHOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGES
HOW TO CHECK YOUR GIRLFRIENDS FACEBOOK MESSAGES
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Nokia secret codes.
Nokia secret codes.Nokia secret codes.
Nokia secret codes.
 
Security tools
Security toolsSecurity tools
Security tools
 
MEI Unlock - Use Any Network on your Smartphone without Restriction
MEI Unlock - Use Any Network on your Smartphone without RestrictionMEI Unlock - Use Any Network on your Smartphone without Restriction
MEI Unlock - Use Any Network on your Smartphone without Restriction
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 
Best Practices for Password Creation
Best Practices for Password CreationBest Practices for Password Creation
Best Practices for Password Creation
 
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDETWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
WhatsApp security
WhatsApp securityWhatsApp security
WhatsApp security
 
Password Attack
Password Attack Password Attack
Password Attack
 
Cyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-ProCyber Security Awareness Training by Win-Pro
Cyber Security Awareness Training by Win-Pro
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
SSL Communication and Mutual Authentication
SSL Communication and Mutual AuthenticationSSL Communication and Mutual Authentication
SSL Communication and Mutual Authentication
 
OWASP Secure Coding
OWASP Secure CodingOWASP Secure Coding
OWASP Secure Coding
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 

Viewers also liked

How I Hack, Hacker Facebook Account
How I Hack, Hacker Facebook AccountHow I Hack, Hacker Facebook Account
How I Hack, Hacker Facebook AccountBudi Khoirudin
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hackingTjylen Veselyj
 
Instagram Hacker 2014 v3.7.2 - easy way to hack Instagram account !
Instagram Hacker 2014 v3.7.2 - easy way to hack Instagram account !Instagram Hacker 2014 v3.7.2 - easy way to hack Instagram account !
Instagram Hacker 2014 v3.7.2 - easy way to hack Instagram account !Home
 
Password Recovery Tools
Password Recovery ToolsPassword Recovery Tools
Password Recovery ToolsAndrey Belenko
 
Mobile Phone Memory Card Recovery
Mobile Phone Memory Card RecoveryMobile Phone Memory Card Recovery
Mobile Phone Memory Card Recoverymobilecardrecovery
 
How to know original phone and fake phone
How to know original phone and fake phoneHow to know original phone and fake phone
How to know original phone and fake phoneExpress News
 
[Computer] hacking for dummies how to learn to hack in easy steps
[Computer] hacking for dummies   how to learn to hack in easy steps[Computer] hacking for dummies   how to learn to hack in easy steps
[Computer] hacking for dummies how to learn to hack in easy stepsLee Toulouse
 
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Esteban Bedoya
 

Viewers also liked (9)

How I Hack, Hacker Facebook Account
How I Hack, Hacker Facebook AccountHow I Hack, Hacker Facebook Account
How I Hack, Hacker Facebook Account
 
Welcome to the world of hacking
Welcome to the world of hackingWelcome to the world of hacking
Welcome to the world of hacking
 
Instagram Hacker 2014 v3.7.2 - easy way to hack Instagram account !
Instagram Hacker 2014 v3.7.2 - easy way to hack Instagram account !Instagram Hacker 2014 v3.7.2 - easy way to hack Instagram account !
Instagram Hacker 2014 v3.7.2 - easy way to hack Instagram account !
 
Password Recovery Tools
Password Recovery ToolsPassword Recovery Tools
Password Recovery Tools
 
Memory card recovery software
Memory card recovery softwareMemory card recovery software
Memory card recovery software
 
Mobile Phone Memory Card Recovery
Mobile Phone Memory Card RecoveryMobile Phone Memory Card Recovery
Mobile Phone Memory Card Recovery
 
How to know original phone and fake phone
How to know original phone and fake phoneHow to know original phone and fake phone
How to know original phone and fake phone
 
[Computer] hacking for dummies how to learn to hack in easy steps
[Computer] hacking for dummies   how to learn to hack in easy steps[Computer] hacking for dummies   how to learn to hack in easy steps
[Computer] hacking for dummies how to learn to hack in easy steps
 
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.Hacking with experts 3 (facebook hacking) by anurag dwivedi.
Hacking with experts 3 (facebook hacking) by anurag dwivedi.
 

Similar to Password hacking

Password hacking
Password hackingPassword hacking
Password hackingMr. FM
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force toolszeus7856
 
Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxFarhanaMariyam1
 
Module 5 (system hacking)
Module 5 (system hacking)Module 5 (system hacking)
Module 5 (system hacking)Wail Hassan
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hackingparag101
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Sumit Satam
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9Geoff Pesimo
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key loggerPatel Mit
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical HackingRaghav Bisht
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPrasad Pawar
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_pptNarayanan
 
ethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptricagip499
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
Cybersecurity cyberlab1
Cybersecurity cyberlab1Cybersecurity cyberlab1
Cybersecurity cyberlab1rayborg
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hackingleminhvuong
 

Similar to Password hacking (20)

Password hacking
Password hackingPassword hacking
Password hacking
 
Password cracking and brute force tools
Password cracking and brute force toolsPassword cracking and brute force tools
Password cracking and brute force tools
 
Ethical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptxEthical hacking for Business or Management.pptx
Ethical hacking for Business or Management.pptx
 
Module 5 (system hacking)
Module 5 (system hacking)Module 5 (system hacking)
Module 5 (system hacking)
 
Parag presentation on ethical hacking
Parag presentation on ethical hackingParag presentation on ethical hacking
Parag presentation on ethical hacking
 
Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)Introduction to Ethical Hacking (Basics)
Introduction to Ethical Hacking (Basics)
 
Hacking 1224807880385377-9
Hacking 1224807880385377-9Hacking 1224807880385377-9
Hacking 1224807880385377-9
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key logger
 
Hacking
HackingHacking
Hacking
 
Hacking
HackingHacking
Hacking
 
Hacking Presentation
Hacking PresentationHacking Presentation
Hacking Presentation
 
Introduction To Ethical Hacking
Introduction To Ethical HackingIntroduction To Ethical Hacking
Introduction To Ethical Hacking
 
How to hack or what is ethical hacking
How to hack or what is ethical hackingHow to hack or what is ethical hacking
How to hack or what is ethical hacking
 
Hacking tutorial
Hacking tutorialHacking tutorial
Hacking tutorial
 
Password Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass ProtocolPassword Stealing & Enhancing User Authentication Using Opass Protocol
Password Stealing & Enhancing User Authentication Using Opass Protocol
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_ppt
 
ethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.pptethical-hacking-18092013112412-ethical-hacking.ppt
ethical-hacking-18092013112412-ethical-hacking.ppt
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Cybersecurity cyberlab1
Cybersecurity cyberlab1Cybersecurity cyberlab1
Cybersecurity cyberlab1
 
Module 8 System Hacking
Module 8   System HackingModule 8   System Hacking
Module 8 System Hacking
 

Recently uploaded

Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfChristalin Nelson
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
CHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxCHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxAneriPatwari
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseCeline George
 

Recently uploaded (20)

Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdf
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
CHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptxCHEST Proprioceptive neuromuscular facilitation.pptx
CHEST Proprioceptive neuromuscular facilitation.pptx
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
How to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 DatabaseHow to Make a Duplicate of Your Odoo 17 Database
How to Make a Duplicate of Your Odoo 17 Database
 

Password hacking

  • 1. -: Password Hacking :- Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. Most passwords can be cracked by using following techniques : 1) Hashing :- Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password. If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords. One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length. LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately. Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly. 2) Guessing :- Many passwords can be guessed either by humans or by sophisticated cracking programs armed with dictionaries (dictionary based) and the user's personal information. Not surprisingly, many users choose weak passwords, usually one related to themselves in some way. Repeated research over some 40 years has demonstrated that around 40% of user-chosen passwords are readily guessable by programs. Examples of insecure choices include: * blank (none) * the word "password", "passcode", "admin" and their derivatives * the user's name or login name * the name of their significant other or another person (loved one) * their birthplace or date of birth * a pet's name * a dictionary word in any language * automobile licence plate number * a row of letters from a standard keyboard layout (eg, the qwerty keyboard -- qwerty itself, asdf, or qwertyuiop) * a simple modification of one of the preceding, such as suffixing a digit or reversing the order of the letters. and so on.... In one survery of MySpace passwords which had been phished, 3.8 percent of passwords were a single word found in a dictionary, and another 12 percent were a word plus a final digit; two- thirds of the time that digit was.
  • 2. A password containing both uppercase & lowercase characters, numbers and special characters too; is a strong password and can never be guessed. Check Your Password Strength 3) Default Passwords :- A moderately high number of local and online applications have inbuilt default passwords that have been configured by programmers during development stages of software. There are lots of applications running on the internet on which default passwords are enabled. So, it is quite easy for an attacker to enter default password and gain access to sensitive information. A list containing default passwords of some of the most popular applications is available on the internet. Always disable or change the applications' (both online and offline) default username- password pairs. 4) Brute Force :- If all other techniques failed, then attackers uses brute force password cracking technique. Here an automatic tool is used which tries all possible combinations of available keys on the keyboard. As soon as correct password is reached it displays on the screen.This techniques takes extremely long time to complete, but password will surely cracked. Long is the password, large is the time taken to brute force it. 5) Phishing :- This is the most effective and easily executable password cracking technique which is generally used to crack the passwords of e-mail accounts, and all those accounts where secret information or sensitive personal information is stored by user such as social networking websites, matrimonial websites, etc. Phishing is a technique in which the attacker creates the fake login screen and send it to the victim, hoping that the victim gets fooled into entering the account username and password. As soon as victim click on "enter" or "login" login button this information reaches to the attacker using scripts or online form processors while the user(victim) is redirected to home page of e- mail service provider. Never give reply to the messages which are demanding for your username-password, urging to be e-mail service provider. It is possible to try to obtain the passwords through other different methods, such as social engineering, wiretapping, keystroke logging, login spoofing, dumpster diving, phishing, shoulder surfing, timing attack, acoustic cryptanalysis, using a Trojan Horse or virus, identity
  • 3. management system attacks (such as abuse of Self-service password reset) and compromising host security. However, cracking usually designates a guessing attack. -: Windows-XP Password Cracking :- Here we use the tool "Cain and Abel" for cracking passwords of any local user/administrator. First download cain and abel from "http://www.oxid.it/cain.html" and install it on your system. Make sure that you have disabled the antivirus/firewall running on your system before installing and throughout this process. Two most effective techniques used here are "Brute-Force" and "Cryptanalysis". Brute-Force:- As this techniques takes more time to complete, the attacker prefer this technique only when there is a hope that the password contain same type of characters or may be two. i.e only loweralpha, only alpha, only numeric or may be loweralpha-numeric, also it should contain less than 7 characters. Otherwise it takes more time to crack password, which may be the mixture of all types of characters along with special symbols. The step-by-step explaination for this technique is given below- 1) Open the tool "Cain and Abel"
  • 4. 2) Go into the category "Cracker" it displays all sub-categories under "Cracker" in left panel.
  • 5. 3) Select "LM & NTLM Hashes" from left panel and then click on symbol, you will be greeted by a window as shown.
  • 6. 4) Check "import hashes from local system" and then click "Next". This shows all the active accounts on local system like administrator, guest, etc. along with LM and NT hashed values of their respective passwords, as shown below.
  • 7. 5) Right clicking on any username shows all available options using which we can crack it's password.
  • 8. 6) Here we select "Brute-Force Attack" and then "NTLM Hashes", since windows uses NTLM hashes to store local users' passwords. 7) You will be greeted by a window where you can modify properties for brute-force attack such as password length, character set, etc.
  • 9. 8) Click on "Start" button. 9) On completion it will reveal the exact password.
  • 10. ShareThis NEXT -: Windows-XP Password Cracking :- Cryptanalisys :- Basically, Cryptanalisys means Operations performed in converting encrypted messages to plain text without initial knowledge of the crypto-algorithm and/or key employed in the encryption. This is the fastest technique of password cracking possible due to "Rainbow Tables". A rainbow table is a file that is used to lookup an unknown plaintext from a known hash for an algorithm that does not usually permit this operation. Steps 1 to 4 i.e upto importing hashes from local system, are similar to previous technique (i.e brute-force). The steps coming after that are as follows- 5) Here, select "cryptanalisys attack" then "NTLM hashes" and then select "via rainbow tables". Here we can choose either OphCrack or RainbowCrack formats of tables. The rainbow tables are
  • 11. available free to download on internet. Due to large file size of rainbow tables (350MB - 3GB); instead of downloading we can also create at own just by downloading rainbow table generator (winrtgen.zip of 181KB) free download at "http://www.oxid.it/downloads/winrtgen.zip" 6) Click on "Add Table"
  • 12. 7) Browse for the location of rainbow table on your system, select proper table and click "open".
  • 13. 8) Select the loaded table and then click on "Start" button. 9) On completetion it will show the exact password.
  • 14. To learn windows password cracking techniques properly, one must understand "LM" & "NTLM" algorithms, SAM File, Dumping NTLM hashes from local SAM, Rainbow Tables, etc.......! ShareThis -: IP Spoofing :- The term IP (Internet Protocol) address spoofing refers to the creation of IP packets with a forged (spoofed) source IP address with the purpose of concealing the identity of the sender or impersonating another computing system. Why it works ? IP-Spoofing works because trusted services only rely on network address based authentication. Since IP is easily duped, address forgery is not difficult. The main reason is security weakness in the TCP protocol known as sequence number prediction. How it works ? To completely understand how ip spoofing can take place, one must examine the structure of the TCP/IP protocol suite. A basic understanding of these headers and network exchanges is crucial
  • 15. to the process. Internet Protocol (IP) : It is a network protocol operating at layer 3 (network) of the OSI model. It is a connectionless model, meaning there is no information regarding transaction state, which is used to route packets on a network. Additionally, there is no method in place to ensure that a packet is properly delivered to the destination. Examining the IP header, we can see that the first 12 bytes (or the top 3 rows of the header) contain various information about the packet. The next 8 bytes (the next 2 rows), however, contains the source and destination IP addresses. Using one of several tools, an attacker can easily modify these addresses – specifically the “source address” field. Transmission Control Protocol (TCP) : It is the connection-oriented, reliable transport protocol in the TCP/IP suite. Connection-oriented simply means that the two hosts participating in a discussion must first establish a connection via the 3-way handshake (SYN-SYN/ACK-ACK). Reliability is provided by data sequencing and acknowledgement. TCP assigns sequence numbers to every segment and acknowledges any and all data segments recieved from the other end.
  • 16. As you can see above, the first 12 bytes of the TCP packet, which contain port and sequencing information. TCP sequence numbers can simply be thought of as 32-bit counters. They range from 0 to 4,294,967,295. Every byte of data exchanged across a TCP connection (along with certain flags) is sequenced. The sequence number field in the TCP header will contain the sequence number of the *first* byte of data in the TCP segment. The acknowledgement number field in the TCP header holds the value of next *expected* sequence number, and also acknowledges *all* data up through this ACK number minus one. TCP packets can be manipulated using several packet crafting softwares available on the internet. The Attack IP-spoofing consists of several steps. First, the target host is choosen. Next, a pattern of trust is discovered, along with a trusted host. The trusted host is then disabled, and the target's TCP sequence numbers are sampled. The trusted host is impersonated, the sequence numbers guessed, and a connection attempt is made to a service that only requires address-based authentication. If successful, the attacker executes a simple command to leave a backdoor. Spoofing can be implemented by different ways as given below - Non-Blind Spoofing :- This type of attack takes place when the attacker is on the same subnet as the victim. The sequence and acknowledgement numbers can be sniffed, eliminating the potential difficulty of calculating them accurately. Blind Spoofing :- Here the sequence and acknowledgement numbers are unreachable. In order to circumvent this, several packets are sent to the target machine in order to sample sequence numbers.
  • 17. Both types of spoofing are forms of a common security violation known as a Man In The Middle Attack. In these attacks, a malicious party intercepts a legitimate communication between two friendly parties. The malicious host then controls the flow of communication and can eliminate or alter the information sent by one of the original participants without the knowledge of either the original sender or the recipient. In this way, an attacker can fool a victim into disclosing confidential information by “spoofing” the identity of the original sender, who is presumably trusted by the recipient. IP spoofing is almost always used in what is currently one of the most difficult attacks to defend against – Denial of Service attacks, or DoS. CounterMeasures 1) Filtering at the Router :- Implementing ingress and egress filtering on your border routers is a great place to start your spoofing defense. You will need to implement an ACL (access control list) 2) Encryption and Authentication :- Implementing encryption and authentication will also reduce spoofing threats. Both of these features are included in Ipv6, which will eliminate current spoofing threats. 3) Initial Sequence Number Randomizing. ShareThis -: The ZIP of Death :- 1) This is a exploit of the compression algorithms to make a small zip that will extract into extream amounts their are more ways and better ones than this one but i will only show how to make a simple 1k = 1m ratio. 1) Make a.txt file 2) Open and type the null character (alt + 255) 3) Press ctrl + a then ctrl + v a couple times to make some null bytes 4) If u have a hexeditor make the hex 00 for about 50 kilobytes. 5) Now make several copies of a.txt and name accordinly
  • 18. 6) Open cmd.exe 7) Type copy /b *.txt b.txt 8) Now every copy is made into a super copy and repeat 9) Once you have a nice empty big text file like 1gb. Put it in a zip archive. Because of the simple construction of the file, 1gb of null bytes.....! The zip is only 1 mb in size and can really annoy freinds. For added fun hex edit the zip and you will see a bunch of hex 5555 Just add some more and the file will expand amazingly Make sure to not open this after You can always create your zip of death from the command line in linux dd if=/dev/zero bs=1000 count=1000000 | gzip > test.gz ShareThis -: Create An Ftp Server On Your PC :- Process-1: First of all u have to get an static IP-Address. Need a a static ip-address for ur FTP Server.Necessity for getting this static ip-address is ur not suppose to use ur own IP-Address.The main reason is u dont want to show ur IP-Address to everyone , there are many other reasons too but leave them aside.. 1) Goto no-ip & create urself a free account. 2) Now ur account been created & ll receive ur account password via mail to ur email address. 3) After getting ur password login to ur account of no-ip.com 4.After getting logged in, click upon add a HOST its on the left menu. 5) Type any hostname u want (eg:-abc) & select any domain from da given list (eg:- ftpserve.com) Click on Submit. 6) Now u have owned ur own static address (example: abc.serveftp.com)
  • 19. 7) Now click downloads button which is present above on the page & click on which operating system ur using & den download DNS update client or u can download it from here directly, this is for microsoft window users.. 8) After getting downloaded, u have to install this software & login here with ur email addresss & p/w wen asked for it. 9) At last tick on da check box present at the static address. 10) U have ur own static web address. Process-2: Installation & setting of the FTP-Server 1) You have to install Serv-U 4.1.03 , download this software from here 2) Run Serv-U & use da wizard to setup ur FTP. 3) Click on next until u have been asked for IP-Address, leave it as it is & click upon next. 4) Enter ur domain name u have registered (example: abc.serveftp.com) it above in da domain field & click upon next. 5) U ll be asked for anonymous access, select No & click upon next. 6) Next u ll be asked for creating a named account, select yes & click upon next. 7) Choose any user name u wish (eg:-xyz) & clcik upon next. 8) Enter password for dis account (eg:-adc341) for security purpose choose difficult password. 9) U ll be asked for da home directory for the account which u have created above.Select directory & click upon next. 10) Click on yes for locking dis account to da home directory, doing dis da user cannot further move up into home directory, click upon next. 11) At last ur account has been created click finish. Process-3: Configuring the user accounts which u have been created. 1) On the left tree-menu, select da account which u have been created above & den click upon General Tab.
  • 20. 2) Goto Hide 'Hidden' Files. 3) Check Allow only and enter the number one in the box. 4) Set da maximum downloading speed upto wat extent u want.As this is an account so many ll be using so set it low(eg:-10-20) to save ur bandwidth.Don't leave it blank as uers can download with full bandwidth. 5) choose how many users u want to login at on time.It depends on ur connection speed try these (56 - 1, ISDN - 3, ADSL or cable - 5-6 users.) 6) Click upon Dir Access Tab. 7) Now u can c home folder here.Highlight it & make ur permission. 8) If u want only users to download check only these Read,List & Inherit. 9) If u want ur users to upload into ur server & bu tto only 1 particular folder but not to downlaod, click upon dat add button & then select dat folder, Now u have to highlight dat folder & set these permissions on dat folder.Check,Write,Appened,List,Create & Inherit after setting these permissions click on the arrow which is present at the bottom right-hand corner.U want dis upload folder 2 be list first, before da home folder. 10) If der is any folder which u dont want anyone to access it, & it is present in the home folder, den click da add button & den select da folder.Now u have to highlight dat folder & see dat no all da checkboxes are left.After doing this click upon upper arrow which is present at bottom right hand corner. 11) There are many things u can do, These are only the basics.... 12) Your server is now ready to be connected.. 13) Login with your username & password... 1) ShareThis 2) -: Reveal *****(Asterisk) Passwords Using Javascript :- 3) Want to Reveal the Passwords Hidden Behind Asterisk (****) ? Follow the steps given below- 1) Open the Login Page of any website. (eg. http://mail.yahoo.com) 2) Type your 'Username' and 'Password'.
  • 21. 3) Copy and paste the JavaScript code given below into your browser's address bar and press 'Enter'. 4) javascript: alert(document.getElementById('Passwd').value); 5) 4) As soon as you press 'Enter', A window pops up showing Password typed by you..! Note :- This trick may not be working with firefox. -: Increase Broadband Speed Using Simple Tweak :- A Simple Tweak (XP Pro only) which will increase your Broadband Speed. Make sure you Log on as Administrator, not as a user with Administrator privileges. Follow the steps as given below- 1) Click on Start Button. 2) Select Run From Start Menu. 3) Type gpedit.msc 4) Expand the [Administrative Templates] branch. 5) Then Expand the [Network] branch. 6) Highlight(Select by Single Click) [QoS Packet Scheduler] 7) Double-click [Limit Reservable Bandwidth] (Available in Right Side Panel) 8) Check(Select By Single Click on it) [Enabled] 9) Change [Bandwidth limit %] to 0 % 10) Click [OK] Button. 11) Restart Your PC.
  • 22. 12) Now Check Your Broadband Speed. -: Wireless Hacking :- Wireless networks broadcast their packets using radio frequency or optical wavelengths. A modern laptop computer can listen in. Worse, an attacker can manufacture new packets on the fly and persuade wireless stations to accept his packets as legitimate. The step by step procerdure in wireless hacking can be explained with help of different topics as follows:- 1) Stations and Access Points :- A wireless network interface card (adapter) is a device, called a station, providing the network physical layer over a radio link to another station. An access point (AP) is a station that provides frame distribution service to stations associated with it. The AP itself is typically connected by wire to a LAN. Each AP has a 0 to 32 byte long Service Set Identifier (SSID) that is also commonly called a network name. The SSID is used to segment the airwaves for usage. 2) Channels :- The stations communicate with each other using radio frequencies between 2.4 GHz and 2.5 GHz. Neighboring channels are only 5 MHz apart. Two wireless networks using neighboring channels may interfere with each other. 3) Wired Equivalent Privacy (WEP) :- It is a shared-secret key encryption system used to encrypt packets transmitted between a station and an AP. The WEP algorithm is intended to protect wireless communication from eavesdropping. A secondary function of WEP is to prevent unauthorized access to a wireless network. WEP encrypts the payload of data packets. Management and control frames are always transmitted in the clear. WEP uses the RC4 encryption algorithm. 4) Wireless Network Sniffing :- Sniffing is eavesdropping on the network. A (packet) sniffer is a program that intercepts and decodes network traffic broadcast through a medium. It is easier to sniff wireless networks than wired ones. Sniffing can also help find the easy kill as in scanning for open access points that allow anyone to connect, or capturing the passwords used in a connection session that does not even use WEP, or in telnet, rlogin and ftp connections. 5 ) Passive Scanning :- Scanning is the act of sniffing by tuning to various radio channels of the devices. A passive network scanner instructs the wireless card to listen to each channel for a few messages. This does not reveal the presence of the scanner. An attacker can passively scan without transmitting at all. 6) Detection of SSID :- The attacker can discover the SSID of a network usually by passive scanning because the SSID occurs in the following frame types: Beacon, Probe Requests, Probe Responses, Association Requests, and Reassociation Requests. Recall that management frames are always in the clear, even when WEP is enabled. When the above methods fail, SSID discovery is done by active scanning
  • 23. 7) Collecting the MAC Addresses :- The attacker gathers legitimate MAC addresses for use later in constructing spoofed frames. The source and destination MAC addresses are always in the clear in all the frames. 8) Collecting the Frames for Cracking WEP :- The goal of an attacker is to discover the WEP shared-secret key. The attacker sniffs a large number of frames An example of a WEP cracking tool is AirSnort ( http://airsnort.shmoo.com ). 9) Detection of the Sniffers :- Detecting the presence of a wireless sniffer, who remains radio- silent, through network security measures is virtually impossible. Once the attacker begins probing (i.e., by injecting packets), the presence and the coordinates of the wireless device can be detected. 10) Wireless Spoofing :- There are well-known attack techniques known as spoofing in both wired and wireless networks. The attacker constructs frames by filling selected fields that contain addresses or identifiers with legitimate looking but non-existent values, or with values that belong to others. The attacker would have collected these legitimate values through sniffing. 11) MAC Address Spoofing :- The attacker generally desires to be hidden. But the probing activity injects frames that are observable by system administrators. The attacker fills the Sender MAC Address field of the injected frames with a spoofed value so that his equipment is not identified. 12) IP spoofing :- Replacing the true IP address of the sender (or, in rare cases, the destination) with a different address is known as IP spoofing. This is a necessary operation in many attacks. 13) Frame Spoofing :- The attacker will inject frames that are valid but whose content is carefully spoofed. 14) Wireless Network Probing :- The attacker then sends artificially constructed packets to a target that trigger useful responses. This activity is known as probing or active scanning. 15) AP Weaknesses :- APs have weaknesses that are both due to design mistakes and user interfaces 16) Trojan AP :- An attacker sets up an AP so that the targeted station receives a stronger signal from it than what it receives from a legitimate AP. 17) Denial of Service :- A denial of service (DoS) occurs when a system is not providing services to authorized clients because of resource exhaustion by unauthorized clients. In wireless networks, DoS attacks are difficult to prevent, difficult to stop. An on-going attack and the victim and its clients may not even detect the attacks. The duration of such DoS may range from milliseconds to hours. A DoS attack against an individual station enables session hijacking. 18) Jamming the Air Waves :- A number of consumer appliances such as microwave ovens,
  • 24. baby monitors, and cordless phones operate on the unregulated 2.4GHz radio frequency. An attacker can unleash large amounts of noise using these devices and jam the airwaves so that the signal to noise drops so low, that the wireless LAN ceases to function. 19) War Driving :- Equipped with wireless devices and related tools, and driving around in a vehicle or parking at interesting places with a goal of discovering easy-to-get-into wireless networks is known as war driving. War-drivers (http://www.wardrive.net) define war driving as “The benign act of locating and logging wireless access points while in motion.” This benign act is of course useful to the attackers. Regardless of the protocols, wireless networks will remain potentially insecure because an attacker can listen in without gaining physical access. Tips for Wireless Home Network Security 1) 1) Change Default Administrator Passwords (and Usernames) 2) Turn on (Compatible) WPA / WEP Encryption 3) Change the Default SSID 4) Disable SSID Broadcast 5) Assign Static IP Addresses to Devices 6) Enable MAC Address Filtering 7) Turn Off the Network During Extended Periods of Non-Use 8) Position the Router or Access Point Safely 2) -: BlueTooth Hacking :- 3) Discovering Bluetooth Devices :- Before any two bluetooth enabled devices can start communicating with one another, they must carry out a procedure known as discovery. It can be carried out by scanning for other active devices within the range. Recommended Tools It will try to extract as much information as possible for each BlueScanner newly discovered device Download It is a GUI-based utility for finding discoverable and hidden BlueSniff Bluetooth-enabled devices Download It is a J2ME application that can browse and explore the technical specification of surrounding Bluetooth enabled devices. BTBrowser It works on phones that supports JSR-82 - the Java Bluetooth Download specification It is a scanner for Windows Mobile based devices. It also BTCrawler implements the BlueJacking and BlueSnarfing attacks ----- 4) Hacking Bluetooth Devices :- There are a variety of different types of bluetooth related threats and attacks that can be
  • 25. executed against unsuspecting mobile phone users. Following are some of the most common types of threats :- 1) BluePrinting Attack :- Information gathering is the first step in the quest to break into target system. Even BlueTooth devices can be fingerprinted or probed for information gathering using the technique known as BluePrinting. Using this one can determine manufacturer, model, version, etc. for target bluetooth enabled device. Recommended Tools BluePrint As the name suggests Download It is an information gathering tool that allows attacker to query BTScanner devices without the need to carry out pairing Download 5) 2) BlueJack Attack :- Bluejacking is the process of sending an anonymous message from a bluetooth enabled phone to another, within a particular range without knowing the exact source of the recieved message to the recepient. Recommended Tools FreeJack Bluejacking tool written in JAVA ----- Can I Hack With Bluetooth (CIHWB) is a Bluetooth security auditing framework for Windows Mobile 2005. Supports CIHWB BlueSnarf, BlueJack, and some DoS attacks. Should work on any Download PocketPC with the Microsoft Bluetooth stack 6) 3) BlueSnarf Attack :- Bluesnarfing is the process of connecting vulnerable mobile phones through bluetooth, without knowing the victim. It involves OBEX protocol by which an attacker can forcibly push/pull sensitive data in/out of the victim's mobile phone, hence also known as OBEX pull attack. This attack requires J2ME enabled mobile phones as the attacker tool. With J2ME enabled phone, just by using bluesnarfing tools like Blooover, Redsnarf, Bluesnarf, etc. an attacker can break into target mobile phone for stealing sensitive data such as address book, photos, mp3, videos, SMS, ......! Recommended Tools It is a J2ME-based auditing tool. It is intended to serve as an Blooover auditing tool to check whether a mobile phone is vulnerable. It Download can also be used to carry out BlueBug attack RedSnarf One of the best bluesnarfing tool ----- It downloads the phone-book of any mobile device vulnerable to BlueSnarfer Bluesnarfing Download -: BlueTooth Hacking :- 4) Blue Backdoor Attack :- Here, the bluetooth related vulnerability exploits the pairing
  • 26. mechanism that is used to establish a connection between two bluetooth enabled devices.Not only does it gives the attacker complete access and control over the target but also allows the attacker to place strategic backdoors for continued access and entry. 5) BlueBug Attack :- It was first discovered by Martin Herfurt and allows attackers to gain complete control over the data, voice and messaging channels of vulnerable target mobile phones. Recommended Tools BlueBugger Exploits the BlueBug vulnerability Download It is a Bluetooth penetration testing suite. It implements attacks Bluediving like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack, etc. Download 6) The bluetooth protocol allows devices to use 16 digit long pairing codes. Unfortunately many applications continue to use only 4 digit pairing codes which can be easily brute-forced. This is known as short pairing codes. Most slave bluetooth devices continue to use default pairing codes such as 0000, 1111, 1234, etc. So, easy to crack and gain access...! Recommended Tools BTCrack is a Bluetooth Pass phrase (PIN) cracking tool. BTCrack BTCrack aims to reconstruct the Passkey and the Link key from Download captured Pairing exchanges -: Other Powerful BlueTooth Hacking Tools :- Transient Bluetooth Environment Auditor :- T-BEAR is a security-auditing platform for Bluetooth-enabled devices. The platform consists of Bluetooth discovery tools, sniffing tools and various cracking tools. Download BlueTest :- BlueTest is a Perl script designed to do data extraction from vulnerable Bluetooth-enabled devices. Download BTAudit :- BTAudit is a set of programs and scripts for auditing Bluetooth-enabled devices. Download RedFang :- It is a brute force tool that finds even non-discoverable device. Download BlueAlert :- A windows based tool that runs on bluetooth enabled computer and alerts the user each time a blurtooth device leaves or enters into its range.
  • 27. BlueFang :- Similar to BlueAlert. Bluestumbler :- One of the best BluePrinting tool. Super Bluetooth Hack :- With this java software you can connect to another mobile and …. Once connected to a another phone via bluetooth you can-  Read his/her messages  Read his/her contacts  Change profile  Play ringtone even if phone is on silent  Play songs  Restart the phone  Switch off the phone  Restore factory settings  Change ringing volume  Call from his phone it includes all call functions like hold, etc. Notes:- 1) When connecting devices use a code 0000 2) At start of program on smartphones do not forget to turn on bluetooth before start of the mobile . Download- Super_Bluetooth_Hack_v1.07.zip (99 KB) What is 94FBR ?? goto google type like this–> 94fbr kaspersky 94fbr nero 94fbr winrar 94fbr avast 94fbr adobe photoshop etc 94fbr followed by software name or software name followed by 94fbr,then click search you will get the serial and cracks. 94FBR was part of a Microsoft Office 2000 product key that was released on the internet that bypassed Microsofts activation system.Because it is a relatively uncommon term, when you add it to your search queries, it will generally return results of pages listing illegal serial numbers.
  • 28. enjoy it…. Get free domain names There are many website which offer free domain names for some time.You can register and try them www.co.cc you can register 3 domains as a free member and 100 domains if you pay them a fee of about $10 www.eu.tv This is a new domain and you can register 3 domains for free and then you must pay. www.co.tv you can register 3 domains for free and pay from your 4th domain There are many others Display Message at Windows Startup This is a simple registry trick by which you can display your message at windows startup.You have to edit your registry.It will pop message just before a user is going to log on.Check the following steps 1.Go to your registry 2. Navigate to HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionWinLogon Now create a new string Value in the right pane named LegalNoticeCaption and enter the value that you want to see in the Menu Bar. Now create another new string value and name it: LegalNoticeText Now insert the message you want to display each time Windows startup Change My documents location in xp I think many of you don‟t know about this fact that the storage location of “My Documents” can be changed. Its is safe , when crash or need to be formatted Normally windows save the “My Documents” folder on your C-drive. But when you right-click on it and go to properties, you can change the location where you want windows to save your Documents folder. Steps
  • 29. 1.Right-click on My documents 2.Go to properties 3.Change your location This can be very useful when If windows hangs or become crupt and you have to format your C- drive again,Then you documents will not be lost due to formating. Hack Windows XP Administrator Password This is one of the best method to Hack Windows XP Administrator Password.For hacking admin you must have log in as guest or limited account.This methodod hacking sdmin is very easy.You don‟t need any software or live cd.All hacking is done manual.To hack XP admin password follow these steps.Please backup your files which we are going to use here. Method 1.Go to C:/windows/system32 2.Copy cmd.exe and paste it on desktop 3.Rename cmd.exe to sethc.exe 4.Copy the new sethc.exe to system 32,when windows asks for overwriting the file,then click yes 5.Now press shift key 5 times you will get cmd prompt close that 6.Now Log out from your guest account and at the login screen,press shift key 5 times. 7.You will get commmand prompt there Now type “ NET USER ADMINISTRATOR mypassword” where “mypassword” can be any password and Administrator is name of admin account ,then press enter. 8.You will see “ The Command completed successfully” and then exit the command prompt. Thats done…You have hacked administrator password If you have any problem comment here.Please backup your cmd.exe and sethc.exe if you are trying this on your own computer.This works because of sethc.exe process Vulnerability in Windows XP.You can search google for more information about it. This method of hacking XP admin password can be used in your college lab where you have limited or guest access to computers.
  • 30. How to Send Fake & Anonymous email To Friend There are many website which allows you to send fake and anonymous email.You can put your own From address, To address, Subject and message and can play a prank with your friend or whoever you want.Here is a list of some websites which you can use.You can play prank and fun with your friend by sending fake email with his girlfriend email address. Check it out 1.http://deadfake.com/ Deadfake – a site that lets you send free fake emails to anyone you like. Not only is it anonymous, you can make it appear to come from anyone you choose.This is a good site to send fake emails.This is best site to send fake emails. 2.http://funworld-free-mail.emailsender.mobi/ This a another site to send fake emails http://www.anonymailer.net/ Anonymous email, often referred to as prank email, allows the user to send an email without disclosing their identity. This site is not fully free you have to paid.You can check this by sending fake emails to yourself. If you have more sited to send fake Email To your Friend share it here. Enjoy fake email prank Don’t send any spam or other illegal things . Email is never really fully anonymous Incoming search terms: How to change START Text in XP Its a very powerful tool & you can do almost anything wid this tool. Now since you just wanna know how to change the “start” button…follow the steps: 1) After downloading the file….open ResHacker.exe 2) B4 dat go 2 C:WINDOWS n take d backup of explorer.exe & copy it to a different location. Just 4 safety…there‟s no danger in the method 3) Now as you‟ve opened ResHacker.exe…goto File –> Open Now look for explorer.exe in the path C:WINDOWS… click on it & open it 4) Once u open it u‟ll see a list of items on d left side starting form Bitmap to 240
  • 31. 5) Now double click on “String Table” 6) Now if you have a “Classic look/style” for windows….double click on 38 else if you are having a “Windows XP style” click on 37 7) When you double-click on either of these. you will see a no. 1033…click on it Now if you are following a Windows XP style then on d text area u will see “start” written in d manner i‟ve written on line no. 578. Give d name u wnt but within d quotes. And 4 Windows Classic Style…its written on line no. 595 9) After you write the name you want….click on compile script, a tabular button on top of text area 10) Now most important…go 2 File & click on SAVE AS button & not save 11) Save it with any name u want…in C:WINDOWS folder. For e.g. explorerrahul.exe. Don‟t 4get 2 end the name u‟ve given with d extention .exe & write the word “explorer” in front of name u‟ve given. It may work if u don‟t write explorer too. But i haven‟t tried it 12) Now exit ResHacker.exe & goto Start –> Run….type regedit & hit enter 13) Now goto HKEY_LOCAL_MACHINE –> SOFTWARE –> MICROSOFT –> WINDOWS NT –> Winlogon & single click on it. On d right side look 4 “Shell REG_SZ Explorer.exe”. Double click on Shell & write thename u‟d given along with the extention .exe and remember, the name that u had given for the “start”button and the name with which you saved it need not be the same. Click on Ok & exit. Log off & Log on, That DONE. Guyz it SAFE, plz don‟t worry. Just do exactly as i‟ve said…and everything will run accordingly. You can try different things too…if You dare. I‟ve done it !!! ResHacker is power tool. Play around with it. And u‟ll get to know more. Add Photos in My Computer Properties.. Add your Photos in My Computer Properties Todo this: 1. Open Notepad. 2. Type the following: [General] Manufacturer=”Your company name” Model=Intel® Core™2 Duo [Support Information] Line1= Your phone number
  • 32. Line2= address Line3= Your email or website 3. Save as “oeminfo.ini” in the System32 folder.(Without Quote) 4. Create a bmp file(Your Photo) and save it the System32 folder as “oemlogo.bmp”(Without Quote). 5. Now Check your My Computer Properties. And I just have done it………..! XP game cheats: Freecell Secret – Instant Win Instructions – Hold down Ctrl + Shift + F10 during game play. Then you will be asked if you want to Abort, Retry or Ignore. Choose Abort, then move any card to instantly win. Secret – Hidden Game Modes Instructions – In the “Game” menu choose “Select Game”. Enter -1 or -2 to activate the hidden game modes. Hearts Secret – Show All Cards Instructions – Go to Start, Run, Type: „Regedit‟, OK. Edit this registry key: HKEY_CURRENT_USERSoftwareMicrosoft WindowsCurrentVersionAppletsHearts Right click on the Hearts folder, select New, String Value and name it ZB. Right-click on ZB, select Modify and enter a Value Data of 42, OK and close Regedit. Start Hearts (not Internet Hearts). Once in a game Press Ctrl + Alt + Shift + F12 to show all the cards. How to make file undetectable Use binding ,this is simple binding.In this tutorial you will see how to bind two files together using WinRAR.This is useful if you are sending a file and you want it to extract and run straight away.For this tutorial I will be using a simple .exe file (command[1].exe) and game.exe file Step 1:Get the files you want to bind. Step 2:Highlight them both and add to archive. Step 3:Change the name and select “Create SFX archive” Step 4:Go to the “Advanced” tab at the top and click on “SFX options”
  • 33. Step 5:In the “General” tab type in the name of the file you want to run after the extraction. Step 6:Go to the “Modes” tab and select “Hide all” Step 7:Go to the “Text and icon” tab and change the icon to something other than the WinRAR icon Step 8:Click “OK” on the advanced window and “OK” in the main window and it will create the file. Now when the user clicks on it extracts and automatically runs command[1].exe This can be used in a variety of ways, you can experiment with the options to get different results. Incoming search term How to Protect Your Web Server From Hackers ? Creating your own website is not simply about putting some pages and information online. Ensuring the security of your website is a bigger and highly crucial task. Most websites these days have a dedicated web server that gives them the leverage to grow and develop further. Basically the websites with a high volume of web traffic, a heavy database and complex application specifications require an exclusive web server. It is extremely important to hack proof your web server in order to protect your website and business. There are a great number of hackers out there in the web world who are looking for opportunities to exploit your web server and cause serious damage. These hackers look to deface the websites with malicious content, use the scripts on the server to send out spam or phish out the personal sensitive information of the website users. Such attacks also attempt to tamper with parameters and gain access to confidential files or cross-site scripting or cookie poisoning to alter the customer data. These kinds of invasions can prove to be fatal for e-commerce and finance based websites. To prevent your web server from falling prey to such web attacks, here are some important recommendations and anti hacking tips.You need to follow a two-pronged approach to safeguard your web server from any hackers. The first layer is a firewall that exists to block any unwarranted unused Internet ports. A good firewall will use a rule based access system to allow only the legitimate users to enter and filter out as well as obstruct any malicious traffic from accessing the server. Also create strong passwords that use a combination of characters, numbers and special characters in order to keep the password hackers at bay. The second element is to put in place an intrusion protection service. This is a more sophisticated approach to deal with hackers wherein you stop the illegitimate entry of users at the source itself. If a firewall works on the front line, an intrusion protection system works on the back end to deal with the enemies. This involves putting all the compromised hosts in the quarantine section and
  • 34. letting the genuine users move through efficiently. But setting up such an anti-hacking arrangement is only the first step. The hackers are moving fast and ahead with newer techniques to break into and sabotage the web servers. So, you need to continually update and monitor the filters, blacklists and all other aspects. Incoming search terms: Command Prompt Tricks Tips & Hacks There are lot of command prompt tricks and tips which many of us don‟t know about.Command prompt can be very useful if you know how to use.Just go to cmd and check the following cool commands 1. systeminfo With this command, you can retrieve the following information: Host Name OS Name OS Version OS Manufacturer OS Configuration OS Build Type Registered Owner etc 2. driverquery Get Installed Driver Information 3. ipconfig /all information about your network connection and IP address 4. subst W: C:windows Map A Drive Letter to a Folder 5. tasklist List All Tasks Running On The Computer 6.taskkill /im programnames.exe /f to Kill A Program
  • 35. There are many other also will update soon Blocking unblocking websites manually Do The Following : For eg you want to block www.xyz.com ! 1. Open the folder C:WINDOWSsystem32driversetc 2. There you will find a file named HOSTS 3. Click on the file and press SHIFT and now right click on it . 4. From the right click menu select Open with . 5. Now, select Notepad to open the file from the list ! 6. Now, in the file under the line 127.0.0.1 localhost add another line as 127.0.0.2 www.xyz.com. 7. Now, File>>Save ! For unblocking just follow the same procedure vice versa. Ntoskrnl.exe Missing or Corrupt XP Try the following method to fix this ntoskrnl.exe problem.Hope this will fix your problem 1.Start the computer by using your Windows XP CD-ROM. Press any key to boot from the CD. 2.After the setup files are finished loading press R to repair using Recovery Console. 3.When you are in the recovery console, select the installation to log on to (usually number 1), and then press ENTER. 4.Login to the Administrator account by typing the password for this account, and then press ENTER. 5.At the recovery console command prompt, type the following command, and then press ENTER: For Uni-Processor systems: expand :i386ntoskrnl.ex_ :Windowssystem32ntoskrnl.exe For Multi-Processor systems: expand :i386ntkrnlmp.ex_ :Windowssystem32ntoskrnl.exe Note In these two commands, the
  • 36. placeholder represents the drive letter of your CD drive, and the placeholder represents the drive letter of the hard disk on which windows is installed. 6.If you receive a prompt to overwrite the file, press Y. 7.Type exit, and press ENTER at the command prompt. This method from microsoft support .If this does not work check the following help link http://support.microsoft.com/kb/314477 Mozialla FireFox tricks copy the line written in bold in address bar and hit enter.. chrome://browser/content/browser.xul Opens another Firefox inside a tab in the the existing Firefox window. chrome://browser/content/preferences/preferences.xul :: Opens the Options dialog box inside the Firefox tab. chrome://browser/content/bookmarks/bookmarksPanel.xul :: Opens the “Book Marks Manager” inside a tab in the Firefox window. chrome://browser/content/history/history-panel.xul :: Opens the History Panel in the Firefox tab. chrome://mozapps/content/extensions/extensions.xul?type=extensions :: Opens the Extensions window in the current tab. chrome://browser/content/preferences/cookies.xul :: Opens the “cookies window” inside a tab in the Firefox window. chrome://browser/content/preferences/sanitize.xul :: Opens the “Clear Private Data” window inside the current tab. chrome://browser/content/aboutDialog.xul :: Opens the “About Firefox” Dialog box inside the tab. chrome://browser/content/credits.xhtml :: A scrolling list of name.