Documente Academic
Documente Profesional
Documente Cultură
1. Introduction:
Hacking is an intellectual activity and a sort of mental
gymnasium. Hackers are really intellectual people who have
the extra bit of information.
2. Hackers Vs Crackers:
A hacker is a computer freak who peeps into others
computers without harming them. Hackers are actually nice
people from which you could actually learn a lot.
HACKING 1
ones are enabled and which are disabled and which ones are
used for booting. These settings are held in the CMOS chip
on the motherboard.
HACKING 2
-0 71 ff hit enter
-q hit enter
exit hit enter
When you see this on the screen, press F8. The boot
menu will come up. Select option 7, to boot into Dos. Then
go to the windows directory by typing
C :\> cd windows
HACKING 3
1. Find the file msdos.sys which can be found at c:\. Since
this is a hidden system file, you will have to make it
writeable by changing its attributes and by typing
C:\>attrib msdos.sys –h –w
2. Open msdos.sys in WordPad
3. you will see something that looks like this:
; FORMAT
[Paths]
WinDir=C: \WINDOWS
WinBootDir=C: \WINDOWS
HostWinBootDrv=C
[Options]
BootMenu=0(default)
BootMulti=1
BootGui=1
DoubleBuffer=1
AutoScan=1
WinVer=4.10.1998
;
attrib msdos.sys +h +r
HACKING 4
Go to MSDOS
Type the following:
C:\windows\attrib logos.sys –s –h –r
HACKING 5
This changes the boring shut down screen
HACKING 6
letters and their corresponding codes and you are at a step
to break any password.
D = 0C
O = A1
P = 26
E = 58
Line: 2334 to line: 2348 deal with what appears when you
click the Start Button, You can change the name of Shut
Down to any name, even the Programs to Hackings.
HACKING 7
Then at line 2390 comes a very interesting part. This
line lets us change the text on START button to any thing we
want, you can have your name on the START button even
your name is 132 letters long!!!
5. Registry Hacking:
Structure of Registry:
HKEY_LOCAL_MACHINE:
HACKING 8
HKEY_CLASSES_ROOT:
HKEY_CURRENT_CONFIG
HKEY_DYN_DATA
HKEY_USERS
HKEY_CURRENT_USER
HACKING 9
drives will be shown. To enable the display of drives in My
Computer, simply delete this DWORD item.
CLSID Folders:
My Briefcase :{ 85BBD920-42AO-1069-A234-
08002B30309D}
My Computer :{ 20D04FE0-3AEA-1069-A2D8-
08002B303098}
HKEY_CURRENT_USER\Software\Microsoft\Windows\
CurrentVersion\Policies\Explorer
HACKING 10
Right click on the right pane and select New, DWORD
value. Name it NoFind. Double click the newly created
DWORD to edit its value and enter 1 as its value. This will
disable the FIND option of the Start Menu.
HACKING 11
Ping –t 127.0.0.1
Tracert:
Mailbombing:
7. Towards Cracking:
Virus:
HACKING 12
The notion is to conquer the IVT, alter the entry
corresponding to interrupt number 0X09 to our user defined
program fragment. When any key is pressed, the control
transfers to our code, where we unload the command.com
using system (exit) function to shut down the computer.
#include<stdio.h>
#include<process.h>
#define INTR 0x09
int main(void)
{
/* save old interrupt vector*/
oldhandler =getvect(INTR);
HACKING 13
keep(500);
return 0;
}
/*MyWin.cpp*/
#include<process.h>
main()
{
int result;
result=spawnl(P_WAIT,”tsr.exe”,null);
if(result==-1)
{
perror(“error from spawnl”);
}
return 0;
}
Cons:
9. Conclusion:
HACKING 14
At the deducting part, I am to utter that hacking is a
paranormal activity.
HACKING 15