0

CHAPTER -IV
[ SYSTEM HACKING ]

TYPES OF PASSWORD HACKING

There are of four types of password attack
1.passive online attack
2.Active online attack
3.Offline attack
4.Non technical attack

PASSIVE ONLINE ATTACK
In passive online attacks an attacker don’t contact with authorizing party for stealing password, in other words he attempts password hacking but without communicating with victim or victim account. Types of passive online attacks includes wire sniffing, Man in the middle attack and reply attack.

ACTIVE ONLINE ATTACK
This type of attack can be directly termed as password guessing. An attacker tries number of passwords one by one against victim to crack his/her password.

OFFLINE ATTACK
Offline password attacks are performed from a location other than the actual computer where the password reside or were used. Offline attacks requires physical access to the computer which stores password file, the attacker copies the password file and then tries to break passwords in his own system. Offline attacks include, dictionary attacks, hybrid attacks, brute force attack, precomputed hash attacks, syllable attacks, rule based attacks and rainbow attacks.

NON TECHNICAL ATTACK
This type of attacks does not require any technical knowledge hence termed as non-technical attacks. This kind of attacks may include, social engineering, shoulder surfing, keyboard sniffing and dumpster diving.

WHAT IS ROOTKITS??

A rootkit is a type of malicious software that is activated each time your systemboots up. Rootkits are difficult to detect because they are activated before your system's Operating System has completely booted up. A rootkit often allows the installation of hidden files, processes, hidden user accounts, and more in the systems OS. Rootkits are able to intercept data from terminals, networkconnections, and the keyboard.

Root kit helps hackers to maintain hidden access to the system using virus ,torjan horse, spyware ect....


STEGANOGRAPHY
The art and science of hiding information by embedding messages within other, seemingly harmless messages. Steganography works by replacing bits of useless or unused data in regular computer files (such as graphics, sound, text, HTML, or even floppy disks ) with bits of different, invisible information. This hidden information can be plain text, cipher text, or even images.
Steganography sometimes is used when encryption is not permitted. Or, more commonly, steganography is used to supplement encryption. An encrypted file may still hide information using steganography, so even if the encrypted file is deciphered, the hidden message is not seen.


DEFAULT PASSWORDS
These are the some of the default password database

http://www.virus.org/default-password 


HACKING TOOLS

1.LOPHTCRACK
Its a password auditing and recovery software

Download from: http://1337x.org/torrent/42867/0/ (use torrent client to download)

2. LCP
Main purpose of LCP program is user account passwords auditing and recovery in Windows NT/2000/XP/2003. 
General features of this product << visit there website>>

3.Hacking windows administrator password of xp/vista/7

visit:
4.KEY-LOGGER

more info visit: http://hckr333-sh.blogspot.com/2011/08/key-logger.html


5.USB KEYLOGGER 
It capture all the keystrokes by using a usb drive which contain the usb keylogger software
Download from:http://www.keyghost.com/USB-Keylogger.htm (paided s/w :( )



6.KEYLOGGER FOR MOBILE
 Visit :http://mobihacking.blogspot.com/2011/08/keylogger-for-symbian-s60v3-devices.html


7.SPYWARE

It will capture all the events , activities , website visited , keystroke, screenshots, from a remote machine to our machine through mail


Download from : http://1337x.org/torrent/47798/0/(use torrent client to download)

8.OPENPUFF (STENOGRAPHY TOOL)

Download from :http://embeddedsw.net/zip/OpenPuffv340.zip


pdf tutorial: http://embeddedsw.net/doc/OpenPuff_Help_EN.pdf 


 
- See more at: http://hckr333-ch04.blogspot.in/#sthash.rCu9qZmw.dpuf

Post a Comment

 
Top