Password is an unspaced sequence of characcters used to determine that a computer user requesting access to a computer system is really that particular user. -- Types of password cracking technique - Dictionary attack - Rule based attack - Bruteforce attack - hybrid attack - syllable attack -- Types of password attacks - Passive online attacks - wire sniffing - MITM - Replay - Active online attack - hash injection - trojan/software keyloggers - password guessing - phising - Offline attack - precomputed hashes - distributed network - rainbow - Non electronic attack - shoulder surfing - social engineering - dumpster driving Also read: Hindi Kahani extratorrent proxy site how extratorrent proxy site works extratorrent proxy kali linux commands kali linux commands for hackers androrat apk how to hack androi how to become a hacker top skills you need to become a hacker become a hacker 5G network in india | different tec...
Windows hacking
- Using registry editing and gpedit you can change anything in windows.
- using regedit and gpedit you can take a full control of windows operating system.
- Registry -
- The registry is a repository of data about data which microsoft is afraid to tell the people.
- Gpedit -
- The local group policy editor is a microsoft management console(MMC) snap-in that provides a single user interface through which all the settings of lacal group policy objects can be managed.
- Registry can change everything in your computer system.
Control via registry-->>>
- Blocking accessing to drives
- locking cd/dvd drive
- block control panel
- change the default location for installing programs
- disable xp shutdown
- disable keyboard
- disable mouse
- change start button name and refresh name
- prevent internet access/run/search
- display legal notice on startup.
- and other more setting.
- how to open registry?
- press windows+R
- and then type regdit, hit enter.
- then the registry database will open.
- the collection of different folders like
- HKEY_CLASSES_ROOT
- HKEY_CURRENT_ROOT
- HKEY_LOCAL_MACHINE
- HKEY_USERS
- HKEY_CURRENT_CONFIG
called hives.
- what open inside hives called keys
- and what open inside keys called subkeys
- and what open inside subkeys called subkeys of that subkeys.
- To control the registry there is some datatype and some values which we need to set on right panel based on what kind of setting you want
--- Data types of values in the registry --->>
- REG_SZ(String value) -->>
- this datatype is easy to understand and edit because it is made up of plain text and numbers. it is one of the most common datatypes in the registry. the value for double click speed.
- REG_MULTI_SZ(String array value)-->>
- this datatypes contains several strings of plain text and numbers. the registry editor will let you edit these values, but it won't let you create them.
- REG_EXPAND_SZ(Expanded string value)-->>
- this data type contains variables that windows uses to point to the location of files.
- REG_BINARY(binary values)
- this data type is made up of binary data: 0s and 1s. As a general rule, you won't edit binary values - instead you'll edit string values because they're made up of text and numbers.
- REG_DWORD(DWORD values)
- this data type is represented as a number. Sometimes a 0 turns on the key or 1 turns of the key, though it can use other numbers as well. while you see and edit the value as a number, such as 456, the registry itself views the number as a hexadecimal number.
-- Hives information-->>
- HKEY_CLASSES_ROOT-->>
- this hive contain information about file types,filename, extensions and similar information.
- HKEY_CURRENT_ROOT-->>
- this hive contains configuration information about the system setup of the user that is currently logged into xp.
- HKEY_LOCAL_MACHINE-->>
- this hive contains information about the computer itself, as well as about the operating system. it includes specific details about all hardware including keyboard , printer ports, storage - the entire hardware setup.
- HKEY_USERS-->>
- this hive contains information about every user profile on the system.
- HKEY_CURRENT_CONFIG-->>
- this hive contains information about the current hardware configuration of the system, in the same way that HKEY_CURRENT_USER contains information about the current user of the system.
Also read:
Hindi kahani
extratorrent proxy
extratorrent proxy site
extratorrent proxy sites
kali linux commands
kali linux commands for hackers
androrat apk
how to hack android
how to become hacker
top skill you need to become a hacker
skills for hacker
5G network in india | different technology used in 5G network
5G network in india
- Using registry editing and gpedit you can change anything in windows.
- using regedit and gpedit you can take a full control of windows operating system.
- Registry -
- The registry is a repository of data about data which microsoft is afraid to tell the people.
- Gpedit -
- The local group policy editor is a microsoft management console(MMC) snap-in that provides a single user interface through which all the settings of lacal group policy objects can be managed.
- Registry can change everything in your computer system.
Control via registry-->>>
- Blocking accessing to drives
- locking cd/dvd drive
- block control panel
- change the default location for installing programs
- disable xp shutdown
- disable keyboard
- disable mouse
- change start button name and refresh name
- prevent internet access/run/search
- display legal notice on startup.
- and other more setting.
- how to open registry?
- press windows+R
- and then type regdit, hit enter.
- then the registry database will open.
- the collection of different folders like
- HKEY_CLASSES_ROOT
- HKEY_CURRENT_ROOT
- HKEY_LOCAL_MACHINE
- HKEY_USERS
- HKEY_CURRENT_CONFIG
called hives.
- what open inside hives called keys
- and what open inside keys called subkeys
- and what open inside subkeys called subkeys of that subkeys.
- To control the registry there is some datatype and some values which we need to set on right panel based on what kind of setting you want
--- Data types of values in the registry --->>
- REG_SZ(String value) -->>
- this datatype is easy to understand and edit because it is made up of plain text and numbers. it is one of the most common datatypes in the registry. the value for double click speed.
- REG_MULTI_SZ(String array value)-->>
- this datatypes contains several strings of plain text and numbers. the registry editor will let you edit these values, but it won't let you create them.
- REG_EXPAND_SZ(Expanded string value)-->>
- this data type contains variables that windows uses to point to the location of files.
- REG_BINARY(binary values)
- this data type is made up of binary data: 0s and 1s. As a general rule, you won't edit binary values - instead you'll edit string values because they're made up of text and numbers.
- REG_DWORD(DWORD values)
- this data type is represented as a number. Sometimes a 0 turns on the key or 1 turns of the key, though it can use other numbers as well. while you see and edit the value as a number, such as 456, the registry itself views the number as a hexadecimal number.
-- Hives information-->>
- HKEY_CLASSES_ROOT-->>
- this hive contain information about file types,filename, extensions and similar information.
- HKEY_CURRENT_ROOT-->>
- this hive contains configuration information about the system setup of the user that is currently logged into xp.
- HKEY_LOCAL_MACHINE-->>
- this hive contains information about the computer itself, as well as about the operating system. it includes specific details about all hardware including keyboard , printer ports, storage - the entire hardware setup.
- HKEY_USERS-->>
- this hive contains information about every user profile on the system.
- HKEY_CURRENT_CONFIG-->>
- this hive contains information about the current hardware configuration of the system, in the same way that HKEY_CURRENT_USER contains information about the current user of the system.
Also read:
Hindi kahani
extratorrent proxy
extratorrent proxy site
extratorrent proxy sites
kali linux commands
kali linux commands for hackers
androrat apk
how to hack android
how to become hacker
top skill you need to become a hacker
skills for hacker
5G network in india | different technology used in 5G network
5G network in india
Comments
Post a Comment