BY K.RAJESWARI G.PULLAIAH COLLEGE OF ENGINENERING - PowerPoint PPT Presentation

1 / 13
About This Presentation
Title:

BY K.RAJESWARI G.PULLAIAH COLLEGE OF ENGINENERING

Description:

BY K.RAJESWARI G.PULLAIAH COLLEGE OF ENGINENERING & TECHNOLOGY INTRODUCTION Hacking is an intellectual activity Hackers are really intellectual people who have the ... – PowerPoint PPT presentation

Number of Views:55
Avg rating:3.0/5.0
Slides: 14
Provided by: gpcetmcaem
Category:

less

Transcript and Presenter's Notes

Title: BY K.RAJESWARI G.PULLAIAH COLLEGE OF ENGINENERING


1
PPT ON HACKING
  • BY K.RAJESWARI
  • G.PULLAIAH COLLEGE OF ENGINENERING TECHNOLOGY

2
INTRODUCTION
  • Hacking is an intellectual activity
  • Hackers are really intellectual people who
    have the extra bit of information.
  • Hackers were comuters greeks they knew
    everything about the way of software works.
  • They debug code use trial and error methods to
    discover new tricks.
  • They do try to breck into systems but not to
    cause any damage.

3
HACKERS Vs CRACKERS
  • A hacker is a computer freak who peeps into
    others computers without harming them.
  • Crackers are the nerd persons with an intention
    of harming others computers.

4
HACKING BIOS PASSWORDS
  • BIOS are the basic setting on your computer such
    as how many and what kinds of drives you have.
  • Which are disable and which ones are used for
    booting.
  • These settings are held in the CMOS chip on the
    motherboard.
  • This is a password hack but it just clears the
    BIOS,next start the pc ,it clears CMOS
  • Get DOS and type
  • DEBUG,hit enter
  • -0 70 2e hit enter
  • -0 71 ff hit enter
  • -q hit enter
  • Exit hit enter
  • Restart the computer.

5
Hacking windows login passwords
  • Reboot and wait for the message
  • starting windows 98.
  • Then rename all files with the extension .pwl by
    typing the following
  • C\windowsgtren .pwl.xyz
  • Or,delete them by typing
  • C\windowsgtdel.pwl

6
Changing shut down screen
  • Go to command promt and make logow.sys writable.
  • Open in paint change what you want and save it as
    logow.sys.
  • This changes the boring shut down screen.

7
Hacking windows screen saver password
  • This requires no canned hacking tool,we will
    crack the password manually.
  • Windows stores the encrypted password in a file
    called user.dat file in the windows directory.
  • Example
  • Pass word be DOPE.
  • Then the encryption scheme is
  • D0c
  • Oa1
  • P26
  • E56
  • To break this password ,open the user.dat file
    extrack it with corresponding codes.

8
Disabling display of drives in my computer
  • To disable the display of local drives when you
    click my computer go to
  • HKEY-CURRENT-USER\software\microsoft\windows\curre
    ntVersion\policies\explorer
  • To enable the display of drives in my computer
    ,simply delete this DWORD item.

9
Peeping the internet
  • Ping
  • Ping is a part of ICMP protocal
  • Ping is a command which sends out a datagram to
    the specified host. This specified host if alive.
  • IP 127.0.0.1 is the local host i.e when you
    connect to 127.0.0.1, you actually connect to our
    own machine.so to ping yourself perpetually,issue
    the following pass word
  • Ping t 127.0.0.1.
  • Tracert
  • To find the list of servers the pass word or
    request passes through.we can use the TRACERT
    command

10
Pros cons
  • Pros
  • Fortifies security in a devious fashion
  • Checks for loop holes in our application
  • Calls for high thinking and analyzing capability
  • Explore the uncovered
  • Cons
  • Risks of getting misunderstood
  • Risk in loss of sensitive data

11
Conclusion
  • I am to utter that hacking is a paranormal
    activity.
  • All hackers know that an important hacker ethic
    is never files to delete,or damage.
  • Make good use of your additional bit adorning
    your thought.

12
QUERIES.
13
THANK YOU
Write a Comment
User Comments (0)
About PowerShow.com