Social Icons

twitterfacebookgoogle pluslinkedinrss feedemail

Windows User Account Attack | Windows Hacking and Security #5



1) To See all the account present on the computer

[Net user]

2) To change the password without knowing the old password.

[Net user administrator *]

To hide a file behind an image | Windows Hacking and Security #4


To hide a file behind a image file which means that if any one opens that image he will see the image only but if you open in a special way then you can open the hidden file behind the image.

So to hide the file behind a image open CMD.exe

Cracking Windows User Account password | Windows Hacking and Security #3




  • Passwords are Stored and Transmitted in an encrypted form called a Hash. When a User logs on to a system and enters a password, a hash is generated and compared to a stored hash. If the entered and the stored hashes match, the user is authenticated (This is called the Challenge/Response).

Windows user account architecture | Windows Hacking and Security #2




  • User account passwords are contained in the SAM in the Hexadecimal Format called Hashes.
  • Once the Passwords converted in Hashes, you cannot convert back to the Clear Text.

Security Architecture of Windows | Windows Hacking and Security #1



There are three components of Windows Security:
  • LSA (Local Security Authority)
  • SAM (Security Account Manager)
  • SRM (Security Reference Monitor)

Securing your Email account | Email Hacking #10


  • Always configure a Secondary Email Address for the recovery purpose.
  • Properly configure the Security Question and Answer in the Email Account.
  • Do Not Open Emails from strangers.

Keystroke loggers | Email Hacking #9


  • Keystroke Loggers (or Key loggers) intercept the Target’s keystrokes and either saves them in a file to be read later, or transmit them to a predetermined destination accessible to the Hacker.
  • Since Keystroke logging programs record every keystroke typed in via the keyboard, they can capture a wide variety of confidential information, including passwords, credit card numbers, and private Email correspondence, names, addresses, and phone numbers.

Email Tracing | Email Hacking #8



  • Tracing an Email means locating the Original Sender and Getting to know the IP address of the network from which the Email was actually generated.
  • To get the information about the sender of the Email we first must know the structure of the Email.
  • As we all know the travelling of the Email. Each message has exactly one header, which is structured into fields.

Prevention against Phishing | Email Hacking #7


Prevention against Phishing | Email Hacking

  • Read all the Email Carefully and Check if the Sender is Original.
  • Watch the Link Carefully before Clicking.

Phishing | Email Hacking #6


Phishing

  • The act of sending an Email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.

Email Spamming | Email Hacking #5



Email Spamming

  • Email Spamming is a variant of Bombing; it refers to sending Email to hundreds or thousands of users (or to lists that expand to that many users). Email spamming can be made worse if recipients reply to the Email, causing all the original addressees to receive the reply. It may also occur innocently, as a result of sending a message to mailing lists and not realizing that the list explodes to thousands of users, or as a result of a responder message (such as vacation(1)) that is setup incorrectly.

PHP Mail sending script | Email Hacking #4


PHP Mail sending script










Email Spoofing | Email Hacking #3


Email Spoofing

Email Spoofing

  • Email spoofing is the forgery of an Email header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately.

Email Service Protocols | Email Hacking #2


Email Service Protocols

SMTP


  • SMTP stands for Simple Mail Transfer Protocol. SMTP is used when Email is delivered from an Email client, such as Outlook Express, to an Email server or when Email is delivered from one Email server to another. SMTP uses port 25.

How Email Works? | Email hacking #1


How Email Works?

How Email Works?

  • Email sending and receiving is controlled by the Email servers. All Email service providers configure Email Server before anyone can Sign into his or her account and start communicating digitally.
  • Once the servers are ready to go, users from across the world register in to these Email servers and setup an Email account. When they have a fully working Email account, they sign into their accounts and start connecting to other users using the Email services.

Working of an ethical hacker | Concept of Ethical Hacking #6


Working of an ethical hacker

Obeying the Ethical Hacking Commandments:
  • Every Ethical Hacker must follow few basic principles. If he do not follow, bad things can happen. Most of the time these principles get ignored or forgotten when planning or executing ethical hacking tests. The results are even very dangerous.

Steps Performed By Hackers | Concept of Ethical Hacking #5

Steps Performed By Hackers

1) Reconnaissance
2) Scanning
3) Gaining Access
4) Maintaining Access
5) Clearing Tracks
• Performing Reconnaissance
• Scanning and Enumeration
• Gaining access
• Maintaining access and Placing Backdoors
• Covering tracks or Clearing Logs

Prevention from Hackers | Concept of Ethical Hacking #4

  • What can be done to prevent Hackers from finding new holes in software and exploiting them?
  • Information security research teams exist—to try to find these holes and notify vendors before they are exploited. There is a beneficial competition occurring between the Hackers securing systems and the Hackers breaking into those systems. This competition provides us with better and stronger security, as well as more complex and sophisticated attack techniques.

Why Hackers Hack? | Concept of Ethical Hacking #3

Why Hackers Hack?

  • The main reason why Hackers hack is because they can hack. Hacking is a casual hobby for some Hackers — they just hack to see what they can hack and what they can’t hack, usually by testing their own systems. Many Hackers are the guys who get kicked out of corporate and government IT and security organizations. They try to bring down the status of the organization by attacking or stealing information.

Types Of Hackers | Concept of Ethical Hacking #2


Types Of Hackers


Types of Hackers

Let’s see the categories of Hackers on the basis on their knowledge.

What is Hacking | Concept of Ethical Hacking #1

What is Hacking

Hacking

  • The Art of exploring various security breaches is termed as Hacking.
  • Computer Hackers have been around for so many years. Since the Internet became widely used in the World, We have started to hear more and more about hacking. Only a few Hackers, such as Kevin Mitnick, are well known.