Ethical Hacking Tutorials - What is Windows Hacking
What is Registry in Windows Hacking?
The Registry is a repository of data about data which Microsoft is afraid to tell the people..why
How to Open Registry in Windows
Press Windows + R and then type regedit after that a prompt will open then press yes after that you will see a hive this is called registry
Gpedit
The Local Group Policy Editor is a Microsoft Management Console(MMC) snap-in that provides a single user interface through which all the settings of the Local Group Policy object can be managed.
The registry can Change Everything on Windows Control
Example:
- Blocking Accessing to Drives
- Locking CD/DVD Drive
- Block Control Panel
- Change the Default Location for installing the program
- Disable Shutdown Option
- Disable Keyboard
- Disable Mouse
- Change Start Button Name and Refresh Name
- Recent Internet Access /Run/Search
- Display legal notice on startup
REG_SZ (String value)
This data type is easy to understand and edit because it is made up of plain text and numbers, It is one of the most common data types in the Registry. The value for Double Click Speed.
REG_MULTI_SZ(String array value)
This data type contains several strings of plain text and numbers. The Registry Editor will let you edit these values, but it won't let you create them.
REG_EXPAND_SZ(Expanded string value)
This data type contains variables that Windows uses to point to the location of files.
REG_BINARY(Binary values)
This data type is made up of binary data: 0s and 1s As a general rule you won't edit binary values-- instead you'll edit string values because they're made up of text and numbers.
REG_DWORD(DWORD values)
This data type is represented as a number. Sometimes a 0 turms on the key or 1 turns off the key though it can use other numbers as well While you see and edit the value as a number such as 456 the Registry itself views the number as a hexadecimal number.
HKEY CLASSES ROOT - This hive contains information about file types filename extensions and similar information
HKEY CURRENT USER - This hive contains configuration information about the system setup of the user that is currently logged into XP/7/8/10
HKEY LOCAL MACHINE - This hive contains information about the computer itself, as well as about the operating system. It includes specific details about all hardware, including keyboard, printer ports, storage the entire hardware setup.
HKEY USERS - This hive contains information about every user profile on the system.
HKEY CURRENT CONFIG - This hive contains information about the current hardware configuration of the system, in the same way, that HKEY_CURRENT_USER contains information about the current user of the system.
There are Settings You can Change your Windows
1. Ho to Remove and add Right-Click menu items from Files and Folders
HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers
2. How to add legal Notice
HKLM\SOFT|MICRO\WIN\CV\POLICIES\SYSTEM
3. Remove Clock from the system notification area
HKCU\Soft\Micro\Win\CV\Polici\Explorer!HideClock
4. Remove Control Panel from the system notification area
HKCU\Soft\Micro\Win\CV\Polic\Explorer!NoControlPanal
5. Remove Search from the system
HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer!NoFind
6. Remove Run from the system
HKCU\Software\Widnows\CurrentVersion\Policies\Explorer!NoRun
Password Hacking
What is Password?
A password is an unspaced sequence of characters used to determine system a Computer user requesting access to a Computer system is really that particular user.
Criteria when choosing a password
- Don't pick a password that someone can easily guess if they know who you are, for example, not your mobile number, birthday, or pet name, or Favorite Actor Name).
- Don't pick a word that can be found in the dictionary
- Don't pick a word that is currently newsworthy
- Don't pick a password that is similar to your previous password
- Do pick a mixture of letters and at least one number
- Do pick a word that you can easily remember
- Create Easy To Remember Passwords - America is a Develop Country -- A0I1A2D3C
Types of Password Cracking Techniques
- Dictionary Attack
- Rul-Basic Attack
- Bruteforce Attack
- Hybrid Hashes
- Syllable Attack
Types of Password Attack
Passive Online Attack - The Attack is to purely monitor and record Data.
Wire Sniffing - Run packet sniffing tools Wire shark and Cain and Able.
MITM(Main In The Middle Attack) - When two parties communicating the MITM CAN TAKE PLACE
Replay - A replay attack/playback attack is a form of network attack in which valid data transmission is maliciously or fraudulently repeated or delayed.
Active Online Attack - An Easy Way to Gain Access unauthorized accessive level.
- Hash Injection
- Trojan/Spyware/Key Loggers
- Password Guessing
- Phishing
- Pre Computed Hashes
- Distributed Network
- Rainbow
- Shoulder Surfing
- Social Engineering
- Dumpster Diving
- Windows XP
- Windows 7
- Windows 8
- Windows 10
- Linux
Related:
- Ethical Hacking Tutorials - What is Enumeration?
- Ethical Hacking Tutorials - What is Scanning?
- Ethical Hacking Tutorials - What is Viruses?
- How to Open Blocked Website?
Tags: ethical hacking,hacking,hacking tools,windows,wifi hacking,exploit a windows ethical hacking,masters in ethical hacking,learn ethical hacking in hindi,hacking tutorials,complete hacking tutorial,windows hacking tricks,hacking tricks in windows,ethical hacking course in hindi,windows 10 hacking tricks,hacking in windows,windows hacking commands,cmd hacking,windows hacking,advanced ethical hacking,ethical hacking lab
No comments:
Post a Comment