Monday, 9 July 2018

System Hacking


System Hacking:-

            System hacking is the process of intruding a system or network has not given authorization to the intruder. The goal of the system hacking to use a victims system or network use remotely.

System hacking Techniques:-

·       Steps to crack Passwords

        There is no prefix sure method for cracking Password, There are different ways of cracking Password. Following are bored category of creaking Password.
Ø  Dictionary
Ø  Brute force
Ø  Circumvention
Ø  Decryption

  : Dictionary:-

Dictionary attack use to words out from a dictionary instead of attempting words combination.
Following are some Software’s for Dictionary Attack:-
                        1)Cainn-able
                        2)Aircrack NG
                        3)Ophcrack
                        4)Metaspolite Project

  : Brute force:-

In brute force attack hacker trying lot of passwords to crack system, it’s a most simple method to gain access. It attempt user names and other combination to gain access.

·       Hybrid:-

Hybrid attack is a combination of brute force and dictionary attack, a full bruteforce key space connected to the word of dictionary.

v LM Hash ad Sam file:-
Originally window password more then 15 characters store in LM hash format. LM hash is a compromised password hashing function, used to store a password.
v Hindan files :-
Hackers will store a hidden file In a system, using WinRAR or changing file exchanger.
v Key logger:-
The key logger is a record a struck on keyboard and computer, typically in a convert manner so that the person using keyboard is unaware.

v Rootkit:-
The rootkit is a collection of programs that enable administrator access to a computer system.
ü  Application level Rootkit:-
Application level Rootkit operate inside the victim’s computer by editing standard application files with rootkit files or changing the functioning of present applications, injected codes etc.


  : Cover Tracks:-

What is the covering tracks?
 Attackers prepares to clear the evidence from the log or history of victims system, installing Rootkits and installing Rootkit ad backdoor.
·       Login Records
·       File access / update time
·       Stop and restarted service

  : Clearing Track Tools:-

·       Backtrack
·       Attackers ca alter log files via editors such as vi or emacs
·       Winzapper tool allows attacker to selectively delete security evet.


----- 



No comments:

Post a Comment

WEP INSECURITIES

  WEP I NSECURITIES Two researchers from the University of California at Berkeley and one from Zero Knowledge Systems Inc. published a repor...