CHAPTER
-IV
[
SYSTEM HACKING ]
TYPES OF PASSWORD HACKING
There are of four types of password attack
1.passive online attack
2.Active online attack
3.Offline attack
4.Non technical attack
PASSIVE ONLINE ATTACK
In passive online
attacks an attacker don’t contact with authorizing party for stealing password,
in other words he attempts password hacking but without communicating with
victim or victim account. Types of passive online attacks includes wire
sniffing, Man in the middle attack and reply attack.
ACTIVE
ONLINE ATTACK
This type of attack
can be directly termed as password guessing. An attacker tries number of
passwords one by one against victim to crack his/her password.
OFFLINE
ATTACK
Offline password attacks are performed from a location other than the
actual computer where the password reside or were used. Offline attacks
requires physical access to the computer which stores password file, the
attacker copies the password file and then tries to break passwords in his own
system. Offline attacks include, dictionary attacks, hybrid attacks, brute
force attack, precomputed hash attacks, syllable attacks, rule based attacks
and rainbow attacks.
NON TECHNICAL ATTACK
This
type of attacks does not require any technical knowledge hence termed as
non-technical attacks. This kind of attacks may include, social engineering,
shoulder surfing, keyboard sniffing and dumpster diving.
WHAT IS ROOTKITS??
A
rootkit is a type of malicious software that is activated each time
your systemboots up. Rootkits are difficult to detect because they are
activated before your system's Operating System has completely booted
up. A rootkit often allows the installation of hidden files, processes, hidden
user accounts, and more in the systems OS. Rootkits are able to
intercept data from terminals, networkconnections, and
the keyboard.
Root kit helps hackers to maintain hidden access to the system using virus ,torjan horse, spyware ect....
Root kit helps hackers to maintain hidden access to the system using virus ,torjan horse, spyware ect....
STEGANOGRAPHY
The art and science of hiding
information by embedding messages within other, seemingly harmless messages.
Steganography works by replacing bits of useless or unused data in
regular computer files (such
as graphics, sound, text, HTML, or even floppy
disks ) with bits of different, invisible information.
This hidden information can be plain text, cipher
text, or even images.
Steganography sometimes is used when
encryption is not permitted. Or, more commonly, steganography is used to
supplement encryption. An encrypted file may still hide information using
steganography, so even if the encrypted file is deciphered, the hidden message
is not seen.
DEFAULT
PASSWORDS
These are the some of the default
password database
http://www.virus.org/default-password
HACKING TOOLS
1.LOPHTCRACK
Its a password auditing and recovery software
Download from: http://1337x.org/torrent/42867/0/ (use torrent client to download)
2. LCP
Main purpose of LCP program is user account passwords auditing and recovery in Windows NT/2000/XP/2003.
General features of this product << visit there website>>
HACKING TOOLS
1.LOPHTCRACK
Its a password auditing and recovery software
Download from: http://1337x.org/torrent/42867/0/ (use torrent client to download)
2. LCP
Main purpose of LCP program is user account passwords auditing and recovery in Windows NT/2000/XP/2003.
General features of this product << visit there website>>
3.Hacking windows administrator
password of xp/vista/7
4.KEY-LOGGER
It Capture all the keystrokes
5.USB KEYLOGGER
It capture all the keystrokes by using a usb drive which contain the usb
keylogger software
6.KEYLOGGER FOR MOBILE
Visit :http://mobihacking.blogspot.com/2011/08/keylogger-for-symbian-s60v3-devices.html
7.SPYWARE
It will capture all the events , activities , website visited ,
keystroke, screenshots, from a remote machine to our machine through mail
8.OPENPUFF (STENOGRAPHY TOOL)
Download from :embeddedsw.net/zip/OpenPuffv340.zip
pdf tutorial: embeddedsw.net/doc/OpenPuff_Help_EN.pdf