Password is an unspaced sequence of characcters used to determine that a computer user requesting access to a computer system is really that particular user. -- Types of password cracking technique - Dictionary attack - Rule based attack - Bruteforce attack - hybrid attack - syllable attack -- Types of password attacks - Passive online attacks - wire sniffing - MITM - Replay - Active online attack - hash injection - trojan/software keyloggers - password guessing - phising - Offline attack - precomputed hashes - distributed network - rainbow - Non electronic attack - shoulder surfing - social engineering - dumpster driving Also read: Hindi Kahani extratorrent proxy site how extratorrent proxy site works extratorrent proxy kali linux commands kali linux commands for hackers androrat apk how to hack androi how to become a hacker top skills you need to become a hacker become a hacker 5G network in india | different tec
Windows hacking - Using registry editing and gpedit you can change anything in windows. - using regedit and gpedit you can take a full control of windows operating system. - Registry - - The registry is a repository of data about data which microsoft is afraid to tell the people. - Gpedit - - The local group policy editor is a microsoft management console(MMC) snap-in that provides a single user interface through which all the settings of lacal group policy objects can be managed. - Registry can change everything in your computer system. Control via registry-->>> - Blocking accessing to drives - locking cd/dvd drive - block control panel - change the default location for installing programs - disable xp shutdown - disable keyboard - disable mouse - change start button name and refresh name - prevent internet access/run/search - display legal notice on startup. - and other more setting. - how to open registry? - press windows+R