LightBlog

Wednesday 28 November 2018

Ethical Hacking Tutorials - What is Windows Hacking

Ethical-Hacking-Tutorials-Windows-Hacking

Ethical Hacking Tutorials - What is Windows Hacking


What is Registry in Windows Hacking?


The Registry is a repository of data about data which Microsoft is afraid to tell the people..why

How to Open Registry in Windows

Press Windows + R and then type regedit after that a prompt will open then press yes after that you will see a hive this is called registry

Gpedit

The Local Group Policy Editor is a Microsoft Management Console(MMC) snap-in that provides a single user interface through which all the settings of the Local Group Policy object can be managed. 

The registry can Change Everything on Windows Control 


Example:
  1. Blocking Accessing to Drives
  2. Locking CD/DVD Drive
  3. Block Control Panel
  4. Change the Default Location for installing the program
  5. Disable Shutdown Option
  6. Disable Keyboard 
  7. Disable Mouse
  8. Change Start Button Name and Refresh Name
  9. Recent Internet Access /Run/Search
  10. Display legal notice on startup

Data types of values in the Registry


REG_SZ (String value)

This data type is easy to understand and edit because it is made up of plain text and numbers, It is one of the most common data types in the Registry. The value for Double Click Speed.

REG_MULTI_SZ(String array value)

This data type contains several strings of plain text and numbers. The Registry Editor will let you edit these values, but it won't let you create them.

REG_EXPAND_SZ(Expanded string value)

This data type contains variables that Windows uses to point to the location of files.

REG_BINARY(Binary values)

This data type is made up of binary data: 0s and 1s As a general rule you won't edit binary values-- instead you'll edit string values because they're made up of text and numbers.

REG_DWORD(DWORD values)

This data type is represented as a number. Sometimes a 0 turms on the key or 1 turns off the key though it can use other numbers as well While you see and edit the value as a number such as 456 the Registry itself views the number as a hexadecimal number.

HKEY CLASSES ROOT - This hive contains information about file types filename extensions and similar information

HKEY CURRENT USER - This hive contains configuration information about the system setup of the user that is currently logged into XP/7/8/10

HKEY LOCAL MACHINE - This hive contains information about the computer itself, as well as about the operating system. It includes specific details about all hardware, including keyboard, printer ports, storage the entire hardware setup.

HKEY USERS - This hive contains information about every user profile on the system.

HKEY CURRENT CONFIG - This hive contains information about the current hardware configuration of the system, in the same way, that HKEY_CURRENT_USER contains information about the current user of the system.

There are Settings You can Change your Windows

1. Ho to Remove and add Right-Click menu items from Files and Folders

    HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers

2. How to add legal Notice

    HKLM\SOFT|MICRO\WIN\CV\POLICIES\SYSTEM

3. Remove Clock from the system notification area

    HKCU\Soft\Micro\Win\CV\Polici\Explorer!HideClock

4. Remove Control Panel from the system notification area

    HKCU\Soft\Micro\Win\CV\Polic\Explorer!NoControlPanal

5. Remove Search from the system

HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer!NoFind

6. Remove Run from the system

HKCU\Software\Widnows\CurrentVersion\Policies\Explorer!NoRun

Password Hacking


What is Password?


A password is an unspaced sequence of characters used to determine system a Computer user requesting access to a Computer system is really that particular user.

Criteria when choosing a password

  • Don't pick a password that someone can easily guess if they know who you are, for example, not your mobile number, birthday, or pet name, or Favorite Actor Name).
  • Don't pick a word that can be found in the dictionary
  • Don't pick a word that is currently newsworthy
  • Don't pick a password that is similar to your previous password
  • Do pick a mixture of letters and at least one number
  • Do pick a word that you can easily remember
  • Create Easy To Remember Passwords - America is a Develop Country  --  A0I1A2D3C

Types of Password Cracking Techniques


  • Dictionary Attack
  • Rul-Basic Attack
  • Bruteforce Attack
  • Hybrid Hashes  
  • Syllable Attack

Types of Password Attack

Passive Online Attack - The Attack is to purely monitor and record Data.

Wire Sniffing - Run packet sniffing tools Wire shark and Cain and Able.

MITM(Main In The Middle Attack) - When two parties communicating the MITM CAN TAKE PLACE

Replay - A replay attack/playback attack is a form of network attack in which valid data transmission is maliciously or fraudulently repeated or delayed.

Active Online Attack - An Easy Way to Gain Access unauthorized accessive level.
  • Hash Injection
  • Trojan/Spyware/Key Loggers
  • Password Guessing
  • Phishing
Offline Attack  - you don't attack the system, you already have the hashed/encrypted password.
  • Pre Computed Hashes
  • Distributed Network
  • Rainbow
Not Electronic Attack - Doesn't require technical knowledge.
System Password Attack -
  • Windows XP
  • Windows 7
  • Windows 8
  • Windows 10
  • Linux

Related: 



Tags:  ethical hacking,hacking,hacking tools,windows,wifi hacking,exploit a windows ethical hacking,masters in ethical hacking,learn ethical hacking in hindi,hacking tutorials,complete hacking tutorial,windows hacking tricks,hacking tricks in windows,ethical hacking course in hindi,windows 10 hacking tricks,hacking in windows,windows hacking commands,cmd hacking,windows hacking,advanced ethical hacking,ethical hacking lab

No comments:

Post a Comment