8004044 seminar on hacking
TRANSCRIPT
-
8/2/2019 8004044 Seminar on Hacking
1/34
PRESENTATIONON
Harmless Hacking
Think Beyond The Boundaries
-
8/2/2019 8004044 Seminar on Hacking
2/34
4/30/2012 2
Prerequisites
What is Harmless Hacking; who are Hackers? General Features of Hacking.
Knowledge of Operating System(Windows98).
Basic Knowledge of Hardware. A Computer with minimum configuration as:
-A 486 Processor.
-A 32 Mb RAM.-An Internet Service Provider.
-
8/2/2019 8004044 Seminar on Hacking
3/34
4/30/2012 3
Introduction
The word hacker is used in two different ways:
1.Hacker is merely enthusiast of any kind ,who love working oncomputer.
2.Hacker or cracker which hack computer with bad intentions.
Hacking consist of attempting to make unauthorized entryinto computers and explore what is there.
The main aim and purpose is widely misunderstood, mosthackers are not interested in doing massive frauds, modifypersonnel banking, taxation and employee records.
The aim of seminar is merely to give you some grasp ofmethodology, help you to develop the appropriate attitude andskills and point you in right direction for more knowledge.
-
8/2/2019 8004044 Seminar on Hacking
4/34
4/30/2012 4
Learning Objectives
Hacking windows98-Editing Windows Registry.-Enhance windows by modifying System Files.-How to hack your Pentium CMOS password.
-Several ways to hack your Windows 98 logonpassword.
Blocking Programs
Mail Bombing
Psychological Hacking-Hacking Password
-
8/2/2019 8004044 Seminar on Hacking
5/34
4/30/2012 5
Registry Editor
Registry: The Registry is hierarchical databasethat contain virtually all information of yourcomputer .
Registry Editor: The registry editor is a utility
allow you to see, search, modify and save theregistry database of windows.
How to run registry Editor?
1. click on start menu2. click on Run.
3. type regedit.exe under Windows 95,98.
4. type regedit32.exe under Windows NT
-
8/2/2019 8004044 Seminar on Hacking
6/34
4/30/2012 6
View of Registry Editor
-
8/2/2019 8004044 Seminar on Hacking
7/34
4/30/2012 7
Enhance Windows98
Ban Shutdowns.
Disabling Display of Drives.
Pop a Welcome banner at the time ofLogin.
Customize Right Click of the Start
Menu. Deleting System Options from Start
Menu.
-
8/2/2019 8004044 Seminar on Hacking
8/34
4/30/2012 8
Ban Shutdown
Step1:Open Registry Editor.
Step2:click on HKEY_CURRENT_USER\ Software\Microsoft\Windows\Current Version \Policies \Explorer.
Step3:create NoClose key in the right panel.
step4:Modify NoClose key by typing 1 in value data Box
Step5:Save by Pressing F5.now, see your shutdown option is hidden.
Note:- It will Works only in Windows 98 not in Windows95.
-
8/2/2019 8004044 Seminar on Hacking
9/34
4/30/2012 9
Disabling Display of Drives
Step 1:Open the Registry Editor.
Step2:Click on HKEY_CURRENT_USER \Software\Microsoft\Windows\Current Version\Policies\Explorer.
Step3:Create a new DWORD item and Rename it NoDrives.
Step4:Modify it values and set 3FFFFFF(hexadecimal).
Step5:Press F5 and Refresh.
Now when you click on My Computer it will not Showyour Drives.
-
8/2/2019 8004044 Seminar on Hacking
10/34
4/30/2012 10
Popup Banner
Step1: Open Registry Editor.
Step2:Click on HKEY_LOCAL_MACHINE \Software\Microsoft\ Windows\Current Version\ WinLogon.
Step3:now, Create new String Value and rename it
LegalNoticeCaption.Step4:Enter the value you want to see in the menu bar.
Step4: Create new String Value and rename itLegalNoticeText.
Step5:Insert the message you want to display.
now you will see popup banner at the time of logon.
-
8/2/2019 8004044 Seminar on Hacking
11/34
4/30/2012 11
Customize Right Click of Start Menu
Step1:open Registry editor.
Step2:Click on HKEY_CLASSES_ROOT\Directory\ Shell
Step3:Right click on Shell and Create a new Sub key nameit by typing application name.
Step4:Right Click on new subkey and create new subkeyas command.
Step5: Enter full path of Application in Right panel.
Step6: save and Refresh.
now it will be placed on the right click popup menu.
-
8/2/2019 8004044 Seminar on Hacking
12/34
4/30/2012 12
View
-
8/2/2019 8004044 Seminar on Hacking
13/34
4/30/2012 13
Deleting Options from Start Menu
Step1:Open Registry Editor.
Step2:Click on HKEY_CURRENT_USER \Software\Microsoft\ Windows\Current Version\Policies\Explorer.
Step3:Create new DWORD value and Name it NoFind.
Step4:Edit the value from 0 to 1.
This will disable Find option from start menu andalso disable shortcut key.
-
8/2/2019 8004044 Seminar on Hacking
14/34
4/30/2012 14
Hacking CMOS Password
Step one: Get a screwdriver.
Step two: open up your victim i.e. your CPU.
Step three: remove the battery .
Step four: plug the battery back in after 30secs.
Alternate step three: many motherboards have a 3 pin jumper toreset the CMOS to its default settings. Look for a jumper close to thebattery or look at your manual if you have one.
For example, you might find a three pin device with pins one and twojumper. If you move the jumper to pins two and three and leave itthere for over five seconds, it may reset the CMOS. Warning -- thiswill not work on all computers!
Step five: Your victim computer now hopefully has the CMOS defaultsettings.
-
8/2/2019 8004044 Seminar on Hacking
15/34
4/30/2012 15
Hacking CMOS Password
There is an another method to crack the Biospassword .
There is the simple debug command whichallow us to do.
To clear the CMOS do the following:GO to Dos and type
DEBUG hit enter
-o 70 2e hit enter
-o 71 ff hit enter-q hit enter
exit hit enter
-
8/2/2019 8004044 Seminar on Hacking
16/34
4/30/2012 16
Hacking Windows 98
To edit start Button
Step 1: Restart your Computer in MSDOS mode.
Step 2: Go to the Windows directory.
Step 3: Open the file explorer.exe in dos editor mode.(The screen is full of weird characters) with 70 letters inthe columns.
Step 4 : Go to the Desired line and change it accordingto you.
-
8/2/2019 8004044 Seminar on Hacking
17/34
4/30/2012 17
View
-
8/2/2019 8004044 Seminar on Hacking
18/34
4/30/2012 18
Hacking Windows 98
Easy Win 9x Breaking #1:
Step one: boot up your computer.
Step two: When the "system configuration" screen comes up,
press the "F5" key. If your system doesn't show this screen,just keep on pressing the F5 key.
If your Win 98 has the right settings, this boots you into"safe mode." Everything looks weird, but you don't have togive your password and you still can run your programs.
Too easy! OK, if you want to do something that looks a littleclassier, here's another way to evade that new password.
-
8/2/2019 8004044 Seminar on Hacking
19/34
4/30/2012 19
Hacking Windows 98
Easy Win 9x Breaking #2:
Step one: Boot up.
Step two: when you get to the "system configuration" screen, press theF8 key. This gives you the Microsoft Windows 95 Startup Menu.
Step three: choose number 7. This puts you into MS-DOS. At the prompt,give the command "rename c:\windows\*pwl c:\windows\*zzz."
Step four: reboot. You will get the password dialog screen. You can thenfake out your friends by entering any darn password you want. It will askyou to reenter it to confirm your new password.
Step five. Your friends are smart enough to suspect you just created anew password, huh? Well, you can put the old one your friends picked.Again come to MS-DOS -- to rename *.zzz back to *.pwl.
step six: reboot and let your friends use their secret password. It stillworks!
-
8/2/2019 8004044 Seminar on Hacking
20/34
4/30/2012 20
Editing Registry Step one: Back up all your files. Have a boot disk handy. If you mess up
the Registry badly enough you may have to reinstall your operatingsystem.
Step two: Run Regedit.exe Click on it. It brings up several folders:-HKEY_CLASSES_ROOT-HKEY_CURRENT_USER-HKEY_LOCAL_MACHINE
-HKEY_USERS-HKEY_CURRENT_CONFIG-HKEY_DYN_DATA
Step three: Get into one of these HKEY things. Let's check outCURRENT_USER by clicking the plus sign to the left of it. Play around
awhile. You'll soon realize that Microsoft is babysitting you. All you see ispictures with no clues.
Step four. Now act like real hackers. We are going to put part of theRegistry where we can see and change anything. First click theHKEY_CLASSES_ROOT line to highlight it. Then go up to the Regeditmenu bar. Click it, then choose Export Registry File. with extension .reg.
-
8/2/2019 8004044 Seminar on Hacking
21/34
4/30/2012 21
Editing Registry Step five. Open that part of the Registry in Word Pad. One way is to right click
on it from Explorer. IMPORTANT WARNING: if you left click on it, it will automatically import it back
into the Registry. If you were messing with it and accidentally left click, youcould trash your computer big time.
Step six: Read everything you ever wanted to know about Windows securitythat Microsoft was afraid to let you find out. Things that look like:
[ [HKEY_CLASSES_ROOT\htmlctl.PasswordCtl.1]@="PasswordCtl Object"
[HKEY_CLASSES_ROOT\htmlctl.PasswordCtl.1\CLSID]@="{EE230860-5A5F-11CF-8B11-00AA00C00903}"
The stuff inside the brackets in this last line is an encrypted password
controlling access to a program or features of a program such as the netcensorship feature of Internet Explorer.
Step seven: It isn't real obvious which password goes to what program. Youcan say delete them all! Of course this means your stored passwords forlogging on to your ISP, for example, may disappear. Also, Internet Explorerwill pop up with a warning that "Content Advisor configuration information ismissing. Someone may have tried to tamper with it." This will look really bad.
-
8/2/2019 8004044 Seminar on Hacking
22/34
4/30/2012 22
Editing Registry
Step eight (optional): Want to erase your surfing records? For InternetExplorer you'll have to edit HKEY_CURRENT_USER, HKEY_LOCAL_MACHINEand HKEY_USERS. You can also delete the files c:\windows\cookies \mm2048.dat and c:\windows\cookies\mm256.dat. These also store URL data.
Step nine. Import your .reg files back into the Registry. Either click on your.reg files in Explorer or else use the "Import" feature next to the "Export" youjust used in Regedit. This only works if you remembered to name them with
the .reg extension.
Step nine: Oh, no, Internet Explorer makes this loud obnoxious noise the firsttime I run it and puts up a bright red "X" with the message that I tamperedwith the net nanny feature! It looks bad.
Erase the Registry and its backups. These are in four files: system.dat,
user.dat, and their backups, system.da0 and user.da0. Your operating systemwill immediately commit suicide.
Now, use bootable floppy and install windows98 again.
Now,your censorship program is not enabled.
-
8/2/2019 8004044 Seminar on Hacking
23/34
4/30/2012 23
Blocking Programs
The Programs Blocks your System operations eitherblocking your RAM or any other device As example thiscode.
while(1){w1=window.open();w1.document.write("
blaaaast!!");
}
-
8/2/2019 8004044 Seminar on Hacking
24/34
4/30/2012 24
Blocking Programs
This code will generate window given below:
-
8/2/2019 8004044 Seminar on Hacking
25/34
4/30/2012 25
Blocking Programs
When you will click on blast! Hyperlink itwill generate this
-
8/2/2019 8004044 Seminar on Hacking
26/34
4/30/2012 26
Mail Bombing
Mail bombing means to send hugenumber of e-mails (may be hundredsthousands or million) to a single e-mail account, so that the maximum
space of account is filled up andowner of account cant receive anynew messages that come .if hisinbox is filled with so many new
useless messages, that he cannoteven read the existing messages anddeleting all the useless messagestakes up a lot of valuable time.
-
8/2/2019 8004044 Seminar on Hacking
27/34
4/30/2012 27
Types of Mail bombing
There are two types of mail bombing1. Mass Mail Bombing.2. List Linking.
Mass Mail Bombing:- In these method the victims inbox is
flooded with a huge number of the same emails.
List Linking:- In these method the victims inbox is subscribedto thousands of mailing list whose subjects are different.
Note: The method of mail bombing now a days not in usebecause capacity of mail boxes is very big so, it is difficult.
-
8/2/2019 8004044 Seminar on Hacking
28/34
4/30/2012 28
Psychological Hacking
Most of the hackers study the psychology of a computeruser and use it for hacking. These hackers are very harm full and canbe found anywhere in chat or discussion group etc. They email yousaying that they want to gift you a heavy amount and take all yourpersonal or credit card information for further scamming. Here is angood example on Psychology in hacking. In this example hacker'semail address is [email protected] (not associated to anyYAHOO official). Hacker sends a mail (in html format) to the user as a
Yahoo. COM administrative official telling that Yahoo server had atechnical failure due to which Yahoo User database is destroyed soyou are requested to fill your personal information in given form toprevent Mail-box cancellation.
In this way, when user submits the form given inthe mail the information reaches to hacker's mail box, and you arehacked!!!. Do you want to try it to your friend? ,If yes then, compose
an email with subject like "URGENT MAIL" or "NOTICE" etc. Select andCopy the code given below in the text area and paste it in messagebody of your mail and send it as HTML to your friend. But don't forgetto replace [email protected] with your own email address and"Please enter your details in the given form"with your own messageto your friend.
http://www.yahoo.com/http://www.yahoo.com/http://www.yahoo.com/ -
8/2/2019 8004044 Seminar on Hacking
29/34
4/30/2012 29
Psychological Hacking
Dear friend,
Please enter your details in given form.
-
8/2/2019 8004044 Seminar on Hacking
30/34
4/30/2012 30
Last name:
Email ID: Full Postal Address:
" " " " ""
Psychological Hacking
-
8/2/2019 8004044 Seminar on Hacking
31/34
4/30/2012 31
View of Form
-
8/2/2019 8004044 Seminar on Hacking
32/34
4/30/2012 32
Ethics and Safety
Don't ever maliciously hack a system. Do not delete or modify files unnecessarily, or
intentionally slow down or crash a system.
Don't use codes from your own home, ever! Period.
Watch what you post. Don't post accounts or codes overopen nets as a rule.They will die within days, and youwill lose your new treasure.
Don't play tricks to others, no matter how bad you hate
them. Make the tracking of yourself as difficult as possible for
others.
-
8/2/2019 8004044 Seminar on Hacking
33/34
4/30/2012 33
BIBILOGRAPHY
Ethical Hacking by Ankit Fadia The Hackers Handbook Hugo Cornwall. Beginner Guide to Hacking by Carolyn meinel
Websites: http://www.eskimo.com/~nwps/index.html http://www.geocities.com/siliconvalley/park/2613/links.html http://www.ilf.net/Toast/ http://www.islandnet.com/~cliffmcc
http://www.simtel.net/simtel.net http://www.supernet.net/cwsapps/cwsa.html http://www.trytel.com/hack/ http://www.tucows.com http://www.windows95.com/apps/ http://www2.southwind.net/%7emiker/hack.html
-
8/2/2019 8004044 Seminar on Hacking
34/34
4/30/2012 34
Thank U for your time.
QUERIES
THANK-YOU