System Hacking:-
System hacking is the process of intruding a system or
network has not given authorization to the intruder. The goal of the system
hacking to use a victims system or network use remotely.
System hacking Techniques:-
· Steps to crack Passwords
There is no prefix sure method for
cracking Password, There are different ways of cracking Password. Following are
bored category of creaking Password.
Ø Dictionary
Ø Brute force
Ø Circumvention
Ø Decryption
: Dictionary:-
Dictionary attack use to words out
from a dictionary instead of attempting words combination.
Following are some Software’s for Dictionary Attack:-
1)Cainn-able
2)Aircrack
NG
3)Ophcrack
4)Metaspolite
Project
: Brute force:-
In brute force attack hacker trying
lot of passwords to crack system, it’s a most simple method to gain access. It
attempt user names and other combination to gain access.
· Hybrid:-
Hybrid attack is a combination of brute force and dictionary attack, a
full bruteforce key space connected to the word of dictionary.
v LM Hash ad Sam file:-
Originally window password more then
15 characters store in LM hash format. LM hash is a compromised password
hashing function, used to store a password.
v Hindan files :-
Hackers will store a hidden file In a
system, using WinRAR or changing file exchanger.
v Key logger:-
The key logger is a record a struck
on keyboard and computer, typically in a convert manner so that the person
using keyboard is unaware.
v Rootkit:-
The rootkit is a collection of
programs that enable administrator access to a computer system.
ü Application level Rootkit:-
Application level Rootkit operate
inside the victim’s computer by editing standard application files with rootkit
files or changing the functioning of present applications, injected codes etc.
: Cover Tracks:-
What is the covering tracks?
Attackers prepares to clear the evidence from
the log or history of victims system, installing Rootkits and installing Rootkit
ad backdoor.
· Login Records
· File access / update time
· Stop and restarted service
: Clearing Track Tools:-
· Backtrack
· Attackers ca alter log files via editors such as vi or emacs
· Winzapper tool allows attacker to selectively delete security evet.
-----
No comments:
Post a Comment