Documente Academic
Documente Profesional
Documente Cultură
C ONTENT S
The above explained procedure is normal way that users use to change windows
administrator or users password.
But we all know that there are several uncommon ways of changing windows ad-
ministrator or users password. These ways is what we call HACK.
Now in above explained procedure wont work if I dont have administrator rights or
I forgot the administrator password. Now how I will change the administrator pass-
word or unlock system.
Here the term Hack and Hacker will come into picture. Now we have to use un-
common ways to achieve the target as normal procedure is no longer working in
our situation.
Novice Users: They will format the windows operating system or will take experts
help.
Script Kiddies (beginner level hackers): They will use Linux live disks or Emer-
gency rescue disks to reset the password.
Medium Level Hackers (who have good knowledge of system and hacking
tools): They will use advance Hacking tools like OPHCrack or Backtrack OS to re-
trieve the password.
Elite Hackers (expert level hackers): Why to use any third party tool (know
how to do with third party tools) when I can do this manually by breaking into sys-
tem root and reset it.
I will explain all the above methods in forthcoming classes but I want to tell the
elite ones procedure to give you an idea about up to what level we will learn
things.
Elite Hackers do things based on situations say how I will do if its my own system
and if its somebody elses system (i.e. I want to break into his/her system without
getting tracked).
If its my own system, I have two choices: First, I can reset the password and
Second, I can retrieve the password.
If its somebody elses system, I am left with only one choice i.e. I need to retrieve
the password because if I reset it then victim will know that somebodys has broken
into his/her system and you cannot call yourself elite if you can be tracked.
So as a elite hacker I will try to retrieve the administrator password without getting
tracked or caught and its simplest way is using OPHCrack Live CD because this is
the only possible way to retrieve the existing password without resetting it. All oth-
er methods reset the windows password. Alternatively, I will insert windows operat-
ing system CD/DVD and try to retrieve the windows password encrypted file and
then decrypt it at my own system. I will share the exact methods in later classes.
And old folks like Parents. Ok leave others parents I will share things about mine.
One day I was performing penetration testing on ICIC I website and in between I
called my father and told him that see how many vulnerabilities and bugs this IC ICI
bank website has. Now you will be surprised what he replied Thief stop bugging
bank website, you will go to Jail. I really felt bad and told my father what the hell
you are saying, I am just analyzing website to report the bugs to their developers
and his reply was Stop doing crap stuff. I was shocked but didnt say anything be-
cause it is because of euphoric hype created by Media.
So friends, dont get demotivated by things that you see on media or hear from
folks. They are saying it bad because it is represented as bad to them by our me-
dia.
Actually its not only media who is responsible for this. Its us also. Why so?
Because when i frankly asked people, why you want to learn Hacking? This is the
reply what I got:
See only 16% people (15% Ethical hackers + 1% learn cool stuff) want to learn
ethical hacking for good reasons.
I will teach you everything but its solely your decision whats your reason to learn
Hacking.
Target Target can be any system or network or web application which a Hacker
wishes to hack.
Attack Attack is basically system violation which is launched against any system
or network or web application.
Security It is a set of rules which are made to harden system so that others can-
not penetrate into the system.
Are you all still unclear about above terms, what they practically mean? So lets
consider an example, we want to hack into some website and deface the website
home page. Then, threat is defacing a website, exploit is the procedure that we will
use to hack it, vulnerability is SQL injection bug in the website, target is website
itself, attack is website hacking and defacement, security is set of rules which we
will use to make system harden so that hacker cannot hack it.
We cannot make a system which is completely unhackable; we can only
make system harden so that it cannot be hacked.
For performing such tasks Ethical hackers are handsomely paid. In IT world termi-
nology this type of Hacking is referred as Penetration testing. Is this the only way
to become Ethical Hacker?
Answer is absolutely NO. There are several hackers who find out the bugs in the
web application or system and report them back to company instead of using those
bugs to attack the web application. This type of hackers are also considered as Eth-
ical Hacker but technically there is separate term defined in hacking world for such
hackers which is known as Grey Hat Hackers.
Ethical Hacking Means you think like Hackers that is first you Hack the System s and
find out the loop holes and then try to correct those Loop Holes. These types of
hackers protect the cyber world from every possible threat and fix the future com-
ing security loop holes. These peoples are also called as "GURU's" of Computer Se-
curity.
Crackers: Crackers or Black Hat hackers or cheaters or simply criminals, they are
called criminals because they are having the mindset of causing harm to security
and they steals very useful data and use it in wrong ways. Phishers also come in
this category who steals account info and steal your credit card nos. and money
over the Net.
Note: We will learn all basic stuff and below list of attacks precisely.
Confidentiality is necessary (but not sufficient) for maintaining the privacy of the
people whose personal information a system holds.
Integrity can even include the notion that the person or entity in question entered
the right information -- that is, that the information reflected the actual circums-
tances (in statistics, this is the concept of "validity") and that under the same cir-
cumstances would generate identical data (what statisticians call "reliability").
Availability: For any information system to serve its purpose, the information
must be available when it is needed. This means that the computing systems used
to store and process the information, the security controls used to protect it, and
the communication channels used to access it must be functioning correctly. High
availability systems aim to remain available at all times, preventing service disru p-
tions due to power outages, hardware failures, and system upgrades. Ensuring
availability also involves preventing denial-of-service attacks.
Almost all modern organizations are highly dependent on functioning info rmation
systems. Many literally could not operate without them. Availability, like other as-
pects of security, may be affected by purely technical issues (e.g., a malfunctioning
part of a computer or communications device), natural phenomena (e.g., wind or
water), or human causes (accidental or deliberate).
While the relative risks associated with these categories depend on the particular
context, the general rule is that humans are the weakest link. (That's why each
user's ability and willingness to use a data system securely are critical.)
HOW HACKERS PERFORM THEIR HACK
ATTACKS?
There are several ways using which Hackers perform Hack attacks. I have broken a
complete Hacking attempt into several phases (generally). How a hacker performs
hacking attempt is solely dependent on Hacker but we can tell the fundamentals of
doing it because fundamentals are always same. Most hackers architect their hack-
ing attempt before performing a hacking attempt to understand what he is going to
do and how he is going to perform it and how he will prevent himself from being
caught. Hackers who hack without thinking anything prior are considered as novice
hackers and they can be easily tracked or caught during the process because each
step is damn important. Also chances of success increases when we follow some
procedure rather than following nothing.
I have divided any hacking attempt into 5 different phases mentioned be-
low:
This is how a hacking attempt is launched o r performed. Now lets learn these
phases in detail to get a clear view.
We all know that we can extract above mentioned things quite easily. Now how this
can be useful. First we can use above information for launching Social Eng ineering
attack (according to latest research 80% people use passwords that are related to
above details). Secondly we can use these details to retrieve accounts or recover
passwords. Thirdly, we can use his/her favorites/hobbies/passions to create a
phishing/Key logging trap. We can do much more these are just examples.
This is the step where the actual hacking attempt is launched. In this system hack-
er exploits the vulnerabilities that are found in the scanning phase to gain the
access of the system.
Young generation want to become Ethical Hacker or just want to limit itself to
Girlfriends email and Facebook?
In this phase Hacker tries to maintain his ownership inside the victim s system or
web server. By ownership, I meant that we can upload, download, configure or ma-
nipulate the data whenever we want.
Maintaining access depends upon the host system. For Example, if we have hacked
into victims computer system, we will install keyloggers, backdoors or spy rootkits
so that we can remain inside the victims system. Now if we have hacked into some
website, then we will create one more admin user inside the database or change
the file permissions or simply enable the anonymous login so that whenever we
want, we can hack into website again.
Hence the tools like keyloggers, Rats, Trojans, spywares are general tools to main-
tain access into the system.
i
If a Hacker wants to get into your system then he will, what all you can do is that make his
entry harder.