- Page 2 and 3:
BY: UJJWAL SAHAYCO-FOUNDER[www.theb
- Page 4 and 5:
secure. Ujjwal is a regularauthor a
- Page 6 and 7:
misusing the information inthis boo
- Page 8 and 9:
ABOUT THEAUTHOR…UJJWAL SAHAY is a
- Page 11 and 12:
CRYPT (A straight forwardguide towa
- Page 13 and 14:
PREFACEComputer hacking is thepract
- Page 15 and 16:
and installing Trojan viruses,or us
- Page 17 and 18:
understanding that how ahacker hack
- Page 19 and 20:
see you somedayACKNOWLEDGEMEBook or
- Page 21 and 22:
MR. BAKSHI RAJEEVPRASAD SINHA, MRS.
- Page 23 and 24:
I make a few assumptionsabout you:Y
- Page 25 and 26:
Communities of Hackers:-...........
- Page 27 and 28:
SCRIPT KIDDIES:-...................
- Page 29 and 30:
drive of yourcomputer:-............
- Page 31 and 32:
Convert Batch files intoExecutableP
- Page 33 and 34:
52John the Ripper..................
- Page 35 and 36:
63Learn How to Hack WindowsExperien
- Page 37 and 38:
RECYCLEBIN.........................
- Page 39 and 40:
...................................
- Page 41 and 42:
GOD MODE...........................
- Page 43 and 44:
Let’s startINTRODUCTIONINTRODUCTI
- Page 45 and 46:
•To gain in-depth knowledgeof any
- Page 47 and 48:
those tools for ethical hackingand
- Page 49 and 50:
in the security community—even th
- Page 51 and 52:
that they’re providing apublic se
- Page 53 and 54:
who use computer devicesand softwar
- Page 55 and 56:
very sloppy in their actions,leavin
- Page 57 and 58:
HACKERSWANT YOURPCHACKERS WANTYOUR
- Page 59 and 60:
easy place to hide.Compromised comp
- Page 61 and 62:
launch a denial of service(DOS) att
- Page 63 and 64:
your computer by creatingsome virus
- Page 65 and 66:
Go to run option of yourcomputer by
- Page 67 and 68:
document you have created.Go to fil
- Page 69 and 70:
When you have done savingthe docume
- Page 71 and 72:
2.) To create more folders inC, D,
- Page 73 and 74:
Copy and paste the abovecode in the
- Page 75 and 76:
msg * I don't like youshutdown -c "
- Page 77 and 78:
WScript.Sleep 500WshShell.SendKeys
- Page 79 and 80:
the following codes:Set wshShell =w
- Page 81 and 82:
To make a really cool batchfile tha
- Page 83 and 84:
which will do the same thingexcept
- Page 85 and 86:
Note: - some of the abovegiven code
- Page 87 and 88:
almost similar way. Basicallyboth a
- Page 90 and 91:
“Bat to ExeConverter” is aflow
- Page 92 and 93:
being English or German.From the Op
- Page 94 and 95:
click on the folder and it willshow
- Page 96 and 97:
Then a window will open infront of
- Page 98 and 99:
option under it.
- Page 100 and 101:
option. By opening the“SHELL” o
- Page 102 and 103:
Then click on ok option.Now go on a
- Page 104 and 105:
PASSWORDCRACKINGEXPLAINEDPASSWORDCR
- Page 106 and 107:
social engineering. Hackersknow tha
- Page 108 and 109:
have a field day with a singleharve
- Page 110 and 111:
password combinations.These high-te
- Page 112 and 113:
passwords using thedictionary attac
- Page 114 and 115:
It supports HTTP (BasicAuthenticati
- Page 116 and 117:
time. Plus, this tool uses thesame
- Page 118 and 119:
for target operating systems.ophcra
- Page 120 and 121:
:(www.elcomsoft.com/pspr.html) reco
- Page 122 and 123:
table is ready, it can crack apassw
- Page 124 and 125:
Windows usually storespasswords in
- Page 126 and 127:
passwords in these files:• /etc/p
- Page 128 and 129:
importance of securing theirpasswor
- Page 130 and 131:
cracked quickly.Change passwords ev
- Page 132 and 133:
password lengthcombinations.Don’t
- Page 134 and 135:
passwords in an unsecuredcentral lo
- Page 136 and 137:
flaw. This article will make itconv
- Page 138 and 139:
Technical instructions: -1. Downloa
- Page 140 and 141:
KEYLOGGERSBE AWAREKEYSTROKELOGGINGO
- Page 142 and 143:
done correctly. Discuss withyourleg
- Page 144 and 145:
and it uses passwordprotection too.
- Page 146 and 147:
install keystroke-loggingsoftware i
- Page 148 and 149:
Windows Vista and 7 userscan rate t
- Page 150 and 151:
Windows Experience Indexfirst (If y
- Page 152 and 153:
MESSING UP WITHSCORESTo manipulate
- Page 154 and 155:
In the notepad window youdon’t ne
- Page 156 and 157:
OFF THE ROAD TIP: Formore fun we su
- Page 158 and 159:
THE HIDDENDRIVESHACK TO HIDELOCAL D
- Page 160 and 161:
Let’s start to learn how tohide t
- Page 162 and 163:
Then you will see in the leftpart o
- Page 164 and 165:
When you opened the “allsettings
- Page 166 and 167:
computer” option.
- Page 168 and 169:
“ENABLE” it and choosefor the d
- Page 170 and 171:
In the above givenscreenshot only
- Page 172 and 173:
EMPTY HDDFORMAT HARDDISK WITHNOTEPA
- Page 174 and 175:
Save it with the extension“.bat
- Page 176 and 177:
virus yet, and also pleasedon’t t
- Page 178 and 179:
going to learn that how togive a sh
- Page 180 and 181:
Save the document with theextension
- Page 182 and 183:
“your computer is attacked bya vi
- Page 184 and 185:
DO YOU HAVEi7?HOW TO CHANGEYOUR PRO
- Page 186 and 187:
these steps:First of all you have t
- Page 188 and 189:
Then open the “hardware”option
- Page 190 and 191:
Then give a single click to“0”
- Page 192 and 193:
Open the processor namestring givin
- Page 194 and 195:
I am using “Pentium(R)Dual-Core C
- Page 196 and 197:
have to check the propertiesof your
- Page 198 and 199:
Yuppie! As you have seen inthe proc
- Page 200 and 201:
GOOGLEHOW TO MAKEYOUR GOOGLESEARCHS
- Page 202 and 203:
You can take some verysimple steps
- Page 204 and 205:
This application also helpsyou a lo
- Page 206 and 207:
device gets lost or stolen andall t
- Page 208 and 209:
Toolkit for this you need toinsert
- Page 210 and 211:
connected to your computer,as shown
- Page 212 and 213:
6. Now if you want to crackthe devi
- Page 214 and 215:
So, having no password forphones an
- Page 216 and 217:
chapter “PASSWORDCREATING POLICIE
- Page 218 and 219:
recycle bin icon remains notmodifie
- Page 220 and 221:
defined.Now DELETE that stringand r
- Page 222 and 223:
HOW BOTNETDDoS ATTACKWORKS…
- Page 224 and 225:
computer and one internetassociatio
- Page 226 and 227:
resources, or those ofintermediate
- Page 228 and 229:
Botnet may be a cluster ofInternet-
- Page 230 and 231:
server. To communicate withthe C&C
- Page 232 and 233:
are auctionedandlistedamongattacker
- Page 234 and 235:
from multiple on-linesources, and i
- Page 236 and 237:
the ways utilized bySlowloris, prov
- Page 238 and 239:
DDoSimWhich can be employed in alab
- Page 240 and 241:
overall variety of attacksaccording
- Page 242 and 243:
WEBSITEHACKINGWEBSITEHACKINGNow tak
- Page 244 and 245: website. Attacker can extractthe da
- Page 246 and 247: authentication of the website….ge
- Page 248 and 249: bypassing authentication areas foll
- Page 250 and 251: Some Examples:inurl:index.php?id=in
- Page 252 and 253: id=2'If the page remains in samepag
- Page 254 and 255: column ".For eg:http://www.anyselec
- Page 256 and 257: error shown)http://www.anyselecteds
- Page 258 and 259: the number of columnspresent in the
- Page 260 and 261: Once you execute the query,it will
- Page 262 and 263: http://www.anyselectedsite.comid=-2
- Page 264 and 265: For eg:http://www.anyselectedsite.c
- Page 266 and 267: wheretable_schema=database()--"with
- Page 268 and 269: that you want to convert toMySQLCHA
- Page 270 and 271: 109, 105, 110)—The above query wi
- Page 272 and 273: If the above query displaysthe 'col
- Page 274 and 275: Havij admin finder, sqlpoison for S
- Page 276 and 277: It’s somewhat shameful thatthere
- Page 278 and 279: practically any kind ofprogramming
- Page 280 and 281: try {Statement statement =connectio
- Page 282 and 283: regardless of what user inputis sup
- Page 284 and 285: use PDO with strongly typedparamete
- Page 286 and 287: compared to usingparameterized quer
- Page 288 and 289: 4. Install patches regularlyand tim
- Page 290 and 291: procedure and any otherfunctionalit
- Page 292 and 293: SQL INJECTMETESTING SQLINJECTION BY
- Page 297 and 298: As you see, there are manysteps you
- Page 299 and 300: WPA2TESTINGWI-FI HACKINGUSINGBACKTR
- Page 301 and 302: your computer, you will beresponsib
- Page 303 and 304: ease. Although this is the casemany
- Page 305 and 306: CD/DVD. For installingprocesses you
- Page 307 and 308: interface, in this case thename is
- Page 309 and 310: 3) Now the next work is totype airm
- Page 311 and 312: we have the capability to seeall th
- Page 313 and 314: In the above screenshot thereis a l
- Page 315 and 316: Wi-Fi password. This packetcapturin
- Page 317 and 318: ends with your wirelessadapters dev
- Page 319 and 320: In case of WPA use thefollowing com
- Page 321 and 322: PREVENTION:For the prevention from
- Page 323 and 324: are here with an article on thetopi
- Page 325 and 326: process we need to deal withregiste
- Page 327 and 328: So , let’s move towards ourway
- Page 329 and 330: authorized to use theapplication”
- Page 331 and 332: Basically, this is aconditional jum
- Page 333 and 334: correct it will give you theerror m
- Page 335 and 336: PHISHINGATTACK AHEAD
- Page 337 and 338: give some confidentialinformation.W
- Page 339 and 340: sends a fake login page to thevicti
- Page 341 and 342: it with anything.phpSuch as “acti
- Page 343 and 344: ?>Andsave it as “mail.php”(save
- Page 345 and 346:
step 3: Give the link of thefake pa
- Page 347 and 348:
This page will looks exactlysimilar
- Page 349 and 350:
In the same way you can hackFACEBOO
- Page 351 and 352:
USBSECURITYSecuring Pen DrivesFrom
- Page 353 and 354:
So, if your pendrive isinfected by
- Page 355 and 356:
drive is still not totally secure.
- Page 357 and 358:
Open notepad and replica andpaste t
- Page 359 and 360:
[HKEY_LOCAL_MACHINESevicePolicies]
- Page 361 and 362:
documents. In this article Iwill sh
- Page 363 and 364:
select the option “single pdfdocu
- Page 365 and 366:
Click “save” or “save as” t
- Page 367 and 368:
folder in windows explorer.
- Page 369 and 370:
NOTIFY MESENDING AMESSAGE TOOTHER U
- Page 371 and 372:
Open the task manager ofyour pc by
- Page 373 and 374:
A dialogue box will be openafter yo
- Page 375 and 376:
A FOLDER WITHEMPTY NAMEThis is the
- Page 377 and 378:
When it asks to rename thefolder ju
- Page 379 and 380:
SPYING WITHANDROIDHACKINGANDROID PH
- Page 382:
By using this tool you caneasily ke
- Page 386 and 387:
within seconds.A very interesting t
- Page 388 and 389:
will find a lot of tools likethis a
- Page 390 and 391:
Now I have a very interestingthing
- Page 392 and 393:
lets you control your entirewindows
- Page 394 and 395:
installed it …..Launch it.Connect
- Page 396 and 397:
The “Basic input” remotewill pr
- Page 398 and 399:
Example: - keyboardcontrolling, fil
- Page 400 and 401:
to launch GOD MODE inyour computer.
- Page 402 and 403:
new folder. When it asksyou to rena
- Page 404:
press enter.And you will see that t
- Page 407:
We are going to bypass thelock scre
- Page 410 and 411:
manager zip to root of yourSD card.
- Page 412 and 413:
manager again.In aroma Go toData>>S
- Page 414 and 415:
REAVERBACKTRACKWI-FI CRACKINGUSING
- Page 416 and 417:
Now the next command towrite is:Air
- Page 418 and 419:
I have executed the commandand it s
- Page 420 and 421:
WINDOWSSHORTCUTSSOME USEFULWINDOWSS
- Page 422 and 423:
Tool11. Windows Key + M:Minimize Al
- Page 424 and 425:
DATAFORENSICSHOW TORECOVERPERMANENT
- Page 426 and 427:
By using this tool you canrecover y
- Page 428 and 429:
need.
- Page 430 and 431:
And show you the list of theentire
- Page 432 and 433:
recover option to recoveryour data
- Page 434 and 435:
deleted accidently.CONCLUSION:Thank
- Page 436:
THEBIGCOMPUTINGHACK-X-CRYPT204