8004044 seminar on hacking

Upload: xplyct

Post on 05-Apr-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/2/2019 8004044 Seminar on Hacking

    1/34

    PRESENTATIONON

    Harmless Hacking

    Think Beyond The Boundaries

  • 8/2/2019 8004044 Seminar on Hacking

    2/34

    4/30/2012 2

    Prerequisites

    What is Harmless Hacking; who are Hackers? General Features of Hacking.

    Knowledge of Operating System(Windows98).

    Basic Knowledge of Hardware. A Computer with minimum configuration as:

    -A 486 Processor.

    -A 32 Mb RAM.-An Internet Service Provider.

  • 8/2/2019 8004044 Seminar on Hacking

    3/34

    4/30/2012 3

    Introduction

    The word hacker is used in two different ways:

    1.Hacker is merely enthusiast of any kind ,who love working oncomputer.

    2.Hacker or cracker which hack computer with bad intentions.

    Hacking consist of attempting to make unauthorized entryinto computers and explore what is there.

    The main aim and purpose is widely misunderstood, mosthackers are not interested in doing massive frauds, modifypersonnel banking, taxation and employee records.

    The aim of seminar is merely to give you some grasp ofmethodology, help you to develop the appropriate attitude andskills and point you in right direction for more knowledge.

  • 8/2/2019 8004044 Seminar on Hacking

    4/34

    4/30/2012 4

    Learning Objectives

    Hacking windows98-Editing Windows Registry.-Enhance windows by modifying System Files.-How to hack your Pentium CMOS password.

    -Several ways to hack your Windows 98 logonpassword.

    Blocking Programs

    Mail Bombing

    Psychological Hacking-Hacking Password

  • 8/2/2019 8004044 Seminar on Hacking

    5/34

    4/30/2012 5

    Registry Editor

    Registry: The Registry is hierarchical databasethat contain virtually all information of yourcomputer .

    Registry Editor: The registry editor is a utility

    allow you to see, search, modify and save theregistry database of windows.

    How to run registry Editor?

    1. click on start menu2. click on Run.

    3. type regedit.exe under Windows 95,98.

    4. type regedit32.exe under Windows NT

  • 8/2/2019 8004044 Seminar on Hacking

    6/34

    4/30/2012 6

    View of Registry Editor

  • 8/2/2019 8004044 Seminar on Hacking

    7/34

    4/30/2012 7

    Enhance Windows98

    Ban Shutdowns.

    Disabling Display of Drives.

    Pop a Welcome banner at the time ofLogin.

    Customize Right Click of the Start

    Menu. Deleting System Options from Start

    Menu.

  • 8/2/2019 8004044 Seminar on Hacking

    8/34

    4/30/2012 8

    Ban Shutdown

    Step1:Open Registry Editor.

    Step2:click on HKEY_CURRENT_USER\ Software\Microsoft\Windows\Current Version \Policies \Explorer.

    Step3:create NoClose key in the right panel.

    step4:Modify NoClose key by typing 1 in value data Box

    Step5:Save by Pressing F5.now, see your shutdown option is hidden.

    Note:- It will Works only in Windows 98 not in Windows95.

  • 8/2/2019 8004044 Seminar on Hacking

    9/34

    4/30/2012 9

    Disabling Display of Drives

    Step 1:Open the Registry Editor.

    Step2:Click on HKEY_CURRENT_USER \Software\Microsoft\Windows\Current Version\Policies\Explorer.

    Step3:Create a new DWORD item and Rename it NoDrives.

    Step4:Modify it values and set 3FFFFFF(hexadecimal).

    Step5:Press F5 and Refresh.

    Now when you click on My Computer it will not Showyour Drives.

  • 8/2/2019 8004044 Seminar on Hacking

    10/34

    4/30/2012 10

    Popup Banner

    Step1: Open Registry Editor.

    Step2:Click on HKEY_LOCAL_MACHINE \Software\Microsoft\ Windows\Current Version\ WinLogon.

    Step3:now, Create new String Value and rename it

    LegalNoticeCaption.Step4:Enter the value you want to see in the menu bar.

    Step4: Create new String Value and rename itLegalNoticeText.

    Step5:Insert the message you want to display.

    now you will see popup banner at the time of logon.

  • 8/2/2019 8004044 Seminar on Hacking

    11/34

    4/30/2012 11

    Customize Right Click of Start Menu

    Step1:open Registry editor.

    Step2:Click on HKEY_CLASSES_ROOT\Directory\ Shell

    Step3:Right click on Shell and Create a new Sub key nameit by typing application name.

    Step4:Right Click on new subkey and create new subkeyas command.

    Step5: Enter full path of Application in Right panel.

    Step6: save and Refresh.

    now it will be placed on the right click popup menu.

  • 8/2/2019 8004044 Seminar on Hacking

    12/34

    4/30/2012 12

    View

  • 8/2/2019 8004044 Seminar on Hacking

    13/34

    4/30/2012 13

    Deleting Options from Start Menu

    Step1:Open Registry Editor.

    Step2:Click on HKEY_CURRENT_USER \Software\Microsoft\ Windows\Current Version\Policies\Explorer.

    Step3:Create new DWORD value and Name it NoFind.

    Step4:Edit the value from 0 to 1.

    This will disable Find option from start menu andalso disable shortcut key.

  • 8/2/2019 8004044 Seminar on Hacking

    14/34

    4/30/2012 14

    Hacking CMOS Password

    Step one: Get a screwdriver.

    Step two: open up your victim i.e. your CPU.

    Step three: remove the battery .

    Step four: plug the battery back in after 30secs.

    Alternate step three: many motherboards have a 3 pin jumper toreset the CMOS to its default settings. Look for a jumper close to thebattery or look at your manual if you have one.

    For example, you might find a three pin device with pins one and twojumper. If you move the jumper to pins two and three and leave itthere for over five seconds, it may reset the CMOS. Warning -- thiswill not work on all computers!

    Step five: Your victim computer now hopefully has the CMOS defaultsettings.

  • 8/2/2019 8004044 Seminar on Hacking

    15/34

    4/30/2012 15

    Hacking CMOS Password

    There is an another method to crack the Biospassword .

    There is the simple debug command whichallow us to do.

    To clear the CMOS do the following:GO to Dos and type

    DEBUG hit enter

    -o 70 2e hit enter

    -o 71 ff hit enter-q hit enter

    exit hit enter

  • 8/2/2019 8004044 Seminar on Hacking

    16/34

    4/30/2012 16

    Hacking Windows 98

    To edit start Button

    Step 1: Restart your Computer in MSDOS mode.

    Step 2: Go to the Windows directory.

    Step 3: Open the file explorer.exe in dos editor mode.(The screen is full of weird characters) with 70 letters inthe columns.

    Step 4 : Go to the Desired line and change it accordingto you.

  • 8/2/2019 8004044 Seminar on Hacking

    17/34

    4/30/2012 17

    View

  • 8/2/2019 8004044 Seminar on Hacking

    18/34

    4/30/2012 18

    Hacking Windows 98

    Easy Win 9x Breaking #1:

    Step one: boot up your computer.

    Step two: When the "system configuration" screen comes up,

    press the "F5" key. If your system doesn't show this screen,just keep on pressing the F5 key.

    If your Win 98 has the right settings, this boots you into"safe mode." Everything looks weird, but you don't have togive your password and you still can run your programs.

    Too easy! OK, if you want to do something that looks a littleclassier, here's another way to evade that new password.

  • 8/2/2019 8004044 Seminar on Hacking

    19/34

    4/30/2012 19

    Hacking Windows 98

    Easy Win 9x Breaking #2:

    Step one: Boot up.

    Step two: when you get to the "system configuration" screen, press theF8 key. This gives you the Microsoft Windows 95 Startup Menu.

    Step three: choose number 7. This puts you into MS-DOS. At the prompt,give the command "rename c:\windows\*pwl c:\windows\*zzz."

    Step four: reboot. You will get the password dialog screen. You can thenfake out your friends by entering any darn password you want. It will askyou to reenter it to confirm your new password.

    Step five. Your friends are smart enough to suspect you just created anew password, huh? Well, you can put the old one your friends picked.Again come to MS-DOS -- to rename *.zzz back to *.pwl.

    step six: reboot and let your friends use their secret password. It stillworks!

  • 8/2/2019 8004044 Seminar on Hacking

    20/34

    4/30/2012 20

    Editing Registry Step one: Back up all your files. Have a boot disk handy. If you mess up

    the Registry badly enough you may have to reinstall your operatingsystem.

    Step two: Run Regedit.exe Click on it. It brings up several folders:-HKEY_CLASSES_ROOT-HKEY_CURRENT_USER-HKEY_LOCAL_MACHINE

    -HKEY_USERS-HKEY_CURRENT_CONFIG-HKEY_DYN_DATA

    Step three: Get into one of these HKEY things. Let's check outCURRENT_USER by clicking the plus sign to the left of it. Play around

    awhile. You'll soon realize that Microsoft is babysitting you. All you see ispictures with no clues.

    Step four. Now act like real hackers. We are going to put part of theRegistry where we can see and change anything. First click theHKEY_CLASSES_ROOT line to highlight it. Then go up to the Regeditmenu bar. Click it, then choose Export Registry File. with extension .reg.

  • 8/2/2019 8004044 Seminar on Hacking

    21/34

    4/30/2012 21

    Editing Registry Step five. Open that part of the Registry in Word Pad. One way is to right click

    on it from Explorer. IMPORTANT WARNING: if you left click on it, it will automatically import it back

    into the Registry. If you were messing with it and accidentally left click, youcould trash your computer big time.

    Step six: Read everything you ever wanted to know about Windows securitythat Microsoft was afraid to let you find out. Things that look like:

    [ [HKEY_CLASSES_ROOT\htmlctl.PasswordCtl.1]@="PasswordCtl Object"

    [HKEY_CLASSES_ROOT\htmlctl.PasswordCtl.1\CLSID]@="{EE230860-5A5F-11CF-8B11-00AA00C00903}"

    The stuff inside the brackets in this last line is an encrypted password

    controlling access to a program or features of a program such as the netcensorship feature of Internet Explorer.

    Step seven: It isn't real obvious which password goes to what program. Youcan say delete them all! Of course this means your stored passwords forlogging on to your ISP, for example, may disappear. Also, Internet Explorerwill pop up with a warning that "Content Advisor configuration information ismissing. Someone may have tried to tamper with it." This will look really bad.

  • 8/2/2019 8004044 Seminar on Hacking

    22/34

    4/30/2012 22

    Editing Registry

    Step eight (optional): Want to erase your surfing records? For InternetExplorer you'll have to edit HKEY_CURRENT_USER, HKEY_LOCAL_MACHINEand HKEY_USERS. You can also delete the files c:\windows\cookies \mm2048.dat and c:\windows\cookies\mm256.dat. These also store URL data.

    Step nine. Import your .reg files back into the Registry. Either click on your.reg files in Explorer or else use the "Import" feature next to the "Export" youjust used in Regedit. This only works if you remembered to name them with

    the .reg extension.

    Step nine: Oh, no, Internet Explorer makes this loud obnoxious noise the firsttime I run it and puts up a bright red "X" with the message that I tamperedwith the net nanny feature! It looks bad.

    Erase the Registry and its backups. These are in four files: system.dat,

    user.dat, and their backups, system.da0 and user.da0. Your operating systemwill immediately commit suicide.

    Now, use bootable floppy and install windows98 again.

    Now,your censorship program is not enabled.

  • 8/2/2019 8004044 Seminar on Hacking

    23/34

    4/30/2012 23

    Blocking Programs

    The Programs Blocks your System operations eitherblocking your RAM or any other device As example thiscode.

    while(1){w1=window.open();w1.document.write("

    blaaaast!!");

    }

  • 8/2/2019 8004044 Seminar on Hacking

    24/34

    4/30/2012 24

    Blocking Programs

    This code will generate window given below:

  • 8/2/2019 8004044 Seminar on Hacking

    25/34

    4/30/2012 25

    Blocking Programs

    When you will click on blast! Hyperlink itwill generate this

  • 8/2/2019 8004044 Seminar on Hacking

    26/34

    4/30/2012 26

    Mail Bombing

    Mail bombing means to send hugenumber of e-mails (may be hundredsthousands or million) to a single e-mail account, so that the maximum

    space of account is filled up andowner of account cant receive anynew messages that come .if hisinbox is filled with so many new

    useless messages, that he cannoteven read the existing messages anddeleting all the useless messagestakes up a lot of valuable time.

  • 8/2/2019 8004044 Seminar on Hacking

    27/34

    4/30/2012 27

    Types of Mail bombing

    There are two types of mail bombing1. Mass Mail Bombing.2. List Linking.

    Mass Mail Bombing:- In these method the victims inbox is

    flooded with a huge number of the same emails.

    List Linking:- In these method the victims inbox is subscribedto thousands of mailing list whose subjects are different.

    Note: The method of mail bombing now a days not in usebecause capacity of mail boxes is very big so, it is difficult.

  • 8/2/2019 8004044 Seminar on Hacking

    28/34

    4/30/2012 28

    Psychological Hacking

    Most of the hackers study the psychology of a computeruser and use it for hacking. These hackers are very harm full and canbe found anywhere in chat or discussion group etc. They email yousaying that they want to gift you a heavy amount and take all yourpersonal or credit card information for further scamming. Here is angood example on Psychology in hacking. In this example hacker'semail address is [email protected] (not associated to anyYAHOO official). Hacker sends a mail (in html format) to the user as a

    Yahoo. COM administrative official telling that Yahoo server had atechnical failure due to which Yahoo User database is destroyed soyou are requested to fill your personal information in given form toprevent Mail-box cancellation.

    In this way, when user submits the form given inthe mail the information reaches to hacker's mail box, and you arehacked!!!. Do you want to try it to your friend? ,If yes then, compose

    an email with subject like "URGENT MAIL" or "NOTICE" etc. Select andCopy the code given below in the text area and paste it in messagebody of your mail and send it as HTML to your friend. But don't forgetto replace [email protected] with your own email address and"Please enter your details in the given form"with your own messageto your friend.

    http://www.yahoo.com/http://www.yahoo.com/http://www.yahoo.com/
  • 8/2/2019 8004044 Seminar on Hacking

    29/34

    4/30/2012 29

    Psychological Hacking

    Dear friend,

    Please enter your details in given form.

  • 8/2/2019 8004044 Seminar on Hacking

    30/34

    4/30/2012 30

    Last name:

    Email ID: Full Postal Address:

    " " " " ""

    Psychological Hacking

  • 8/2/2019 8004044 Seminar on Hacking

    31/34

    4/30/2012 31

    View of Form

  • 8/2/2019 8004044 Seminar on Hacking

    32/34

    4/30/2012 32

    Ethics and Safety

    Don't ever maliciously hack a system. Do not delete or modify files unnecessarily, or

    intentionally slow down or crash a system.

    Don't use codes from your own home, ever! Period.

    Watch what you post. Don't post accounts or codes overopen nets as a rule.They will die within days, and youwill lose your new treasure.

    Don't play tricks to others, no matter how bad you hate

    them. Make the tracking of yourself as difficult as possible for

    others.

  • 8/2/2019 8004044 Seminar on Hacking

    33/34

    4/30/2012 33

    BIBILOGRAPHY

    Ethical Hacking by Ankit Fadia The Hackers Handbook Hugo Cornwall. Beginner Guide to Hacking by Carolyn meinel

    Websites: http://www.eskimo.com/~nwps/index.html http://www.geocities.com/siliconvalley/park/2613/links.html http://www.ilf.net/Toast/ http://www.islandnet.com/~cliffmcc

    http://www.simtel.net/simtel.net http://www.supernet.net/cwsapps/cwsa.html http://www.trytel.com/hack/ http://www.tucows.com http://www.windows95.com/apps/ http://www2.southwind.net/%7emiker/hack.html

  • 8/2/2019 8004044 Seminar on Hacking

    34/34

    4/30/2012 34

    Thank U for your time.

    QUERIES

    THANK-YOU