Skip to main content

Different types of attack

Password is an unspaced sequence of characcters used to determine that a computer user requesting access to a computer system is really that particular user. -- Types of password cracking technique - Dictionary attack - Rule based attack - Bruteforce attack - hybrid attack - syllable attack -- Types of password attacks - Passive online attacks - wire sniffing - MITM - Replay - Active online attack - hash injection - trojan/software keyloggers - password guessing - phising - Offline attack - precomputed hashes - distributed network - rainbow - Non electronic attack - shoulder surfing - social engineering - dumpster driving Also read: Hindi Kahani extratorrent proxy site how extratorrent proxy site works extratorrent proxy kali linux commands kali linux commands for hackers androrat apk how to hack androi how to become a hacker top skills you need to become a hacker become a hacker 5G network in india | different tec

Windows Hacking

Windows hacking

- Using registry editing and gpedit you can change anything in windows.

- using regedit and gpedit you can take a full control of windows operating system.

- Registry -

- The registry is a repository of data about data which microsoft is afraid to tell the people.

- Gpedit -

- The local group policy editor is a microsoft management console(MMC) snap-in that provides a single user interface through which all the settings of lacal group policy objects can be managed.


- Registry can change everything in your computer system.


Control via registry-->>>

- Blocking accessing to drives
- locking cd/dvd drive
- block control panel
- change the default location for installing programs
- disable xp shutdown
- disable keyboard
- disable mouse
- change start button name and refresh name
- prevent internet access/run/search
- display legal notice on startup.
- and other more setting.

- how to open registry?

- press windows+R
- and then type regdit, hit enter.
- then the registry database will open.
- the collection of different folders like

- HKEY_CLASSES_ROOT
- HKEY_CURRENT_ROOT
- HKEY_LOCAL_MACHINE
- HKEY_USERS
- HKEY_CURRENT_CONFIG

called hives.

- what open inside hives called keys
- and what open inside keys called subkeys
- and what open inside subkeys called subkeys of that subkeys.


- To control the registry there is some datatype and some values which we need to set on right panel based on what kind of setting you want


--- Data types of values in the registry --->>

- REG_SZ(String value) -->>

                  - this datatype is easy to understand and edit because it is made up of plain text and numbers. it is one of the most common datatypes in the registry. the value for double click speed.

- REG_MULTI_SZ(String array value)-->>

  - this datatypes contains several strings of plain text and numbers. the registry editor will let you edit these values, but it won't let you create them.

- REG_EXPAND_SZ(Expanded string value)-->>

  - this data type contains variables that windows uses to point to the location of files.

- REG_BINARY(binary values)

  - this data type is made up of binary data: 0s and 1s. As a general rule, you won't edit binary values - instead you'll edit string values because they're made up of text and numbers.

- REG_DWORD(DWORD values)

  - this data type is represented as a number. Sometimes a 0 turns on the key or  1 turns of the key, though it can use other numbers as well. while you see and edit the value as a number, such as 456, the registry itself views the number as a hexadecimal number.


-- Hives information-->>

- HKEY_CLASSES_ROOT-->>

- this hive contain information about file types,filename, extensions and similar information.
- HKEY_CURRENT_ROOT-->>

- this hive contains configuration information about the system setup of the user that is currently logged into xp.
- HKEY_LOCAL_MACHINE-->>

- this hive contains information about the computer itself, as well as about the operating system. it includes specific details about all hardware including keyboard , printer ports, storage - the entire hardware setup.
- HKEY_USERS-->>

- this hive contains information about every user profile on the system.
- HKEY_CURRENT_CONFIG-->>

- this hive contains information about the current hardware configuration of the system, in the same way that HKEY_CURRENT_USER contains information about the current user of the system.


Also read:
Hindi kahani
extratorrent proxy
extratorrent proxy site
extratorrent proxy sites
kali linux commands
kali linux commands for hackers
androrat apk
how to hack android
how to become hacker
top skill you need to become a hacker
skills for hacker

5G network in india | different technology used in 5G network
5G network in india


GBWhatsapp New Version Download Apk | Latest Version 2019




Comments

Popular posts from this blog

Different types of attack

Password is an unspaced sequence of characcters used to determine that a computer user requesting access to a computer system is really that particular user. -- Types of password cracking technique - Dictionary attack - Rule based attack - Bruteforce attack - hybrid attack - syllable attack -- Types of password attacks - Passive online attacks - wire sniffing - MITM - Replay - Active online attack - hash injection - trojan/software keyloggers - password guessing - phising - Offline attack - precomputed hashes - distributed network - rainbow - Non electronic attack - shoulder surfing - social engineering - dumpster driving Also read: Hindi Kahani extratorrent proxy site how extratorrent proxy site works extratorrent proxy kali linux commands kali linux commands for hackers androrat apk how to hack androi how to become a hacker top skills you need to become a hacker become a hacker 5G network in india | different tec

Wireless technology

                                Wireless technology Few year back there was no technology which can help us to communicate without having present there. Sometime later a technology came in the market internet which was specially invented for defense. Internet means internatnational network, network means having a connection between different computers. We can communicate over the internet in two ways:- The first one wired communication in which we are connecting different computers with wire. The another way is wireless communication, as its name suggest wireless means communication without wire. In wireless communication we use waves like radio waves, electromagnetic waves etc. for communication instead of wire. Nowdays maximum devices are available in the market which are using wireless technology like wireless router, wireless tv, wireless phone etc. In other word we can say wireless industry has covered the maximum market of IT technology.