- Page 2 and 3:
BY: UJJWAL SAHAYCO-FOUNDER[www.theb
- Page 4 and 5:
secure. Ujjwal is a regularauthor a
- Page 6 and 7:
misusing the information inthis boo
- Page 8 and 9:
ABOUT THEAUTHOR…UJJWAL SAHAY is a
- Page 11 and 12:
CRYPT (A straight forwardguide towa
- Page 13 and 14:
PREFACEComputer hacking is thepract
- Page 15 and 16:
and installing Trojan viruses,or us
- Page 17 and 18:
understanding that how ahacker hack
- Page 19 and 20:
see you somedayACKNOWLEDGEMEBook or
- Page 21 and 22:
MR. BAKSHI RAJEEVPRASAD SINHA, MRS.
- Page 23 and 24:
I make a few assumptionsabout you:Y
- Page 25 and 26:
Communities of Hackers:-...........
- Page 27 and 28:
SCRIPT KIDDIES:-...................
- Page 29 and 30:
drive of yourcomputer:-............
- Page 31 and 32:
Convert Batch files intoExecutableP
- Page 33 and 34:
52John the Ripper..................
- Page 35 and 36:
63Learn How to Hack WindowsExperien
- Page 37 and 38: RECYCLEBIN.........................
- Page 39 and 40: ...................................
- Page 41 and 42: GOD MODE...........................
- Page 43 and 44: Let’s startINTRODUCTIONINTRODUCTI
- Page 45 and 46: •To gain in-depth knowledgeof any
- Page 47 and 48: those tools for ethical hackingand
- Page 49 and 50: in the security community—even th
- Page 51 and 52: that they’re providing apublic se
- Page 53 and 54: who use computer devicesand softwar
- Page 55 and 56: very sloppy in their actions,leavin
- Page 57 and 58: HACKERSWANT YOURPCHACKERS WANTYOUR
- Page 59 and 60: easy place to hide.Compromised comp
- Page 61 and 62: launch a denial of service(DOS) att
- Page 63 and 64: your computer by creatingsome virus
- Page 65 and 66: Go to run option of yourcomputer by
- Page 67 and 68: document you have created.Go to fil
- Page 69 and 70: When you have done savingthe docume
- Page 71 and 72: 2.) To create more folders inC, D,
- Page 73 and 74: Copy and paste the abovecode in the
- Page 75 and 76: msg * I don't like youshutdown -c "
- Page 77 and 78: WScript.Sleep 500WshShell.SendKeys
- Page 79 and 80: the following codes:Set wshShell =w
- Page 81 and 82: To make a really cool batchfile tha
- Page 83 and 84: which will do the same thingexcept
- Page 85 and 86: Note: - some of the abovegiven code
- Page 87: almost similar way. Basicallyboth a
- Page 91 and 92: for both beginner andadvanced users
- Page 93 and 94: MESSING UPWITHREGISTRYHACKING “OP
- Page 95 and 96: registry editing.Registry: - it is
- Page 97 and 98: Then you have to click on“HKEY_CL
- Page 99 and 100: Click on the folder option toopen i
- Page 101 and 102: Just open the “Default”string (
- Page 103 and 104: Ujjwal Sahay”.
- Page 105 and 106: These have been around forsome time
- Page 107 and 108: can hit a fair number ofpasswords w
- Page 109 and 110: because someone who knowsyour login
- Page 111 and 112: organization’s operatingsystem an
- Page 113 and 114: (Hashes are cryptographicrepresenta
- Page 115 and 116: process any time and thenresume whe
- Page 117 and 118: all from a bootable CD.John the Rip
- Page 119 and 120: Aircrack-NG is a WiFipassword crack
- Page 121 and 122: Crack is a hash cracker toolthat us
- Page 123 and 124: use for your passwordcracking proce
- Page 125 and 126: (SAM) database (c:\winnt\system32\c
- Page 127 and 128: MUST HAVEPASSWORDPOLICIESPASSWORDCR
- Page 129 and 130: awareness of socialengineeringattac
- Page 131 and 132: passwords — just make themslightl
- Page 133 and 134: Use password-protectedscreen savers
- Page 135 and 136: KONBOOTBYPASS WINDOWSLOGON SCREENPA
- Page 137 and 138: knowledge of the password.Kon-Boot
- Page 139 and 140:
directly enable you into thewindows
- Page 141 and 142:
as they’re typed into thecomputer
- Page 143 and 144:
I suggest you to check outfamily ke
- Page 145 and 146:
PREVENTIONS:The best defense agains
- Page 147 and 148:
DO YOU HAVERATED 7.9 ?Learn How to
- Page 149 and 150:
because of the Graphics subscore.Ho
- Page 151 and 152:
the systemYou will see a screen sim
- Page 153 and 154:
> DataStoreYou will able to see sev
- Page 155 and 156:
hunt anything, simply changethe val
- Page 157 and 158:
To revert the changes you canre-run
- Page 159 and 160:
Which is the most commonway in thes
- Page 161 and 162:
POLICY.The group policy editor will
- Page 163 and 164:
3.) Administrative templatesJust gi
- Page 165 and 166:
arranged you can skip thisstep.Now
- Page 167 and 168:
Double click on the “hidethese sp
- Page 169 and 170:
window.After applying the settingsj
- Page 171 and 172:
window as marked in theabove screen
- Page 173 and 174:
do it on your own riskbecause it wi
- Page 175 and 176:
Double click on the savedfile to ru
- Page 177 and 178:
LET’S HAVESOME FUNFUNNY VIRUS TOS
- Page 179 and 180:
So follow the steps:Open the notepa
- Page 181 and 182:
Now your work is to executethe viru
- Page 183 and 184:
But again it does not matterif you
- Page 185 and 186:
The trick we are going tolearn here
- Page 187 and 188:
Open the“HKEY_LOCAL_MACHINE”as
- Page 189 and 190:
Then open the “Description”opti
- Page 191 and 192:
STRINGS.Search for the “processor
- Page 193 and 194:
it is written what yourcomputer’s
- Page 195 and 196:
them.Such as you canwrite”Intel(R
- Page 197 and 198:
The system properties ofyour comput
- Page 199 and 200:
proud that YOU HAVE ACORE i7 PROCES
- Page 201 and 202:
Google we use to open theGoogle web
- Page 203 and 204:
searches under double quotes.Like:
- Page 205 and 206:
iOSPASSWORDCRACKINGIOS PASSWORDCRAC
- Page 207 and 208:
To enter DFU mode, simplypower the
- Page 209 and 210:
Toolkit Ram disk onto themobile dev
- Page 211 and 212:
After that you see the toolkitwhich
- Page 213 and 214:
on the main menu:iOS Forensic Toolk
- Page 215 and 216:
So be aware about theattacks! Get u
- Page 217 and 218:
HIDE YOURRECYCLE BINHACK TO HIDETHE
- Page 219 and 220:
familiar with the “registryeditor
- Page 221 and 222:
By finalizing all steps don’tforg
- Page 223 and 224:
DDoS Attack?DDoS stands for “Dist
- Page 225 and 226:
and extra. Comprised ofSeemingly le
- Page 227 and 228:
attacked web site, andmagnitude is
- Page 229 and 230:
most ordinarily for DDoSattacks.Bot
- Page 231 and 232:
different Botnet servers,making ent
- Page 233 and 234:
additionally.Even for nontechnicalu
- Page 235 and 236:
the target network.Tor’s HammerIs
- Page 237 and 238:
of little chunks, using the“range
- Page 239 and 240:
Botnet DDoS AttacksBotnet DDoS atta
- Page 241 and 242:
by a minimum of one attackthat exce
- Page 243 and 244:
articles among all of theabove chap
- Page 245 and 246:
bypassing login …….i.e.Authenti
- Page 247 and 248:
After finding the login pageyou hav
- Page 249 and 250:
If the authentication bypasswill no
- Page 251 and 252:
For example:site:www.anyselectedsit
- Page 253 and 254:
Step 2: Finding Number ofcolumns in
- Page 255 and 256:
column is "n-1".I mean:http://www.a
- Page 257 and 258:
So now n=8, the number ofcolumn is
- Page 259 and 260:
For eg:If the number of columns is
- Page 261 and 262:
Replace the 3 from the querywith "v
- Page 263 and 264:
If the Database version is 5 orabov
- Page 265 and 266:
Let us choose the "admin "table.Ste
- Page 267 and 268:
Once you installed the addon,you ca
- Page 269 and 270:
Copy and paste the code atthe end o
- Page 271 and 272:
Now replace the " fromtable_name=CH
- Page 273 and 274:
Step 7: Finding the AdminPanel:Just
- Page 275 and 276:
flaws in your applications.SQL Inje
- Page 277 and 278:
simple. Developers need toeither: a
- Page 279 and 280:
issimplyappended to thequery allows
- Page 281 and 282:
statements (parameterizedqueries) i
- Page 283 and 284:
Dynamic SQL can almostalways be rep
- Page 285 and 286:
Supplied InputThis third technique
- Page 287 and 288:
This technique works likethis. Each
- Page 289 and 290:
5. Remove all functionalityyou don'
- Page 291 and 292:
and there is no excuse for notusing
- Page 293:
extension, the tool isavailable in
- Page 297 and 298:
As you see, there are manysteps you
- Page 299 and 300:
WPA2TESTINGWI-FI HACKINGUSINGBACKTR
- Page 301 and 302:
your computer, you will beresponsib
- Page 303 and 304:
ease. Although this is the casemany
- Page 305 and 306:
CD/DVD. For installingprocesses you
- Page 307 and 308:
interface, in this case thename is
- Page 309 and 310:
3) Now the next work is totype airm
- Page 311 and 312:
we have the capability to seeall th
- Page 313 and 314:
In the above screenshot thereis a l
- Page 315 and 316:
Wi-Fi password. This packetcapturin
- Page 317 and 318:
ends with your wirelessadapters dev
- Page 319 and 320:
In case of WPA use thefollowing com
- Page 321 and 322:
PREVENTION:For the prevention from
- Page 323 and 324:
are here with an article on thetopi
- Page 325 and 326:
process we need to deal withregiste
- Page 327 and 328:
So , let’s move towards ourway
- Page 329 and 330:
authorized to use theapplication”
- Page 331 and 332:
Basically, this is aconditional jum
- Page 333 and 334:
correct it will give you theerror m
- Page 335 and 336:
PHISHINGATTACK AHEAD
- Page 337 and 338:
give some confidentialinformation.W
- Page 339 and 340:
sends a fake login page to thevicti
- Page 341 and 342:
it with anything.phpSuch as “acti
- Page 343 and 344:
?>Andsave it as “mail.php”(save
- Page 345 and 346:
step 3: Give the link of thefake pa
- Page 347 and 348:
This page will looks exactlysimilar
- Page 349 and 350:
In the same way you can hackFACEBOO
- Page 351 and 352:
USBSECURITYSecuring Pen DrivesFrom
- Page 353 and 354:
So, if your pendrive isinfected by
- Page 355 and 356:
drive is still not totally secure.
- Page 357 and 358:
Open notepad and replica andpaste t
- Page 359 and 360:
[HKEY_LOCAL_MACHINESevicePolicies]
- Page 361 and 362:
documents. In this article Iwill sh
- Page 363 and 364:
select the option “single pdfdocu
- Page 365 and 366:
Click “save” or “save as” t
- Page 367 and 368:
folder in windows explorer.
- Page 369 and 370:
NOTIFY MESENDING AMESSAGE TOOTHER U
- Page 371 and 372:
Open the task manager ofyour pc by
- Page 373 and 374:
A dialogue box will be openafter yo
- Page 375 and 376:
A FOLDER WITHEMPTY NAMEThis is the
- Page 377 and 378:
When it asks to rename thefolder ju
- Page 379 and 380:
SPYING WITHANDROIDHACKINGANDROID PH
- Page 382:
By using this tool you caneasily ke
- Page 386 and 387:
within seconds.A very interesting t
- Page 388 and 389:
will find a lot of tools likethis a
- Page 390 and 391:
Now I have a very interestingthing
- Page 392 and 393:
lets you control your entirewindows
- Page 394 and 395:
installed it …..Launch it.Connect
- Page 396 and 397:
The “Basic input” remotewill pr
- Page 398 and 399:
Example: - keyboardcontrolling, fil
- Page 400 and 401:
to launch GOD MODE inyour computer.
- Page 402 and 403:
new folder. When it asksyou to rena
- Page 404:
press enter.And you will see that t
- Page 407:
We are going to bypass thelock scre
- Page 410 and 411:
manager zip to root of yourSD card.
- Page 412 and 413:
manager again.In aroma Go toData>>S
- Page 414 and 415:
REAVERBACKTRACKWI-FI CRACKINGUSING
- Page 416 and 417:
Now the next command towrite is:Air
- Page 418 and 419:
I have executed the commandand it s
- Page 420 and 421:
WINDOWSSHORTCUTSSOME USEFULWINDOWSS
- Page 422 and 423:
Tool11. Windows Key + M:Minimize Al
- Page 424 and 425:
DATAFORENSICSHOW TORECOVERPERMANENT
- Page 426 and 427:
By using this tool you canrecover y
- Page 428 and 429:
need.
- Page 430 and 431:
And show you the list of theentire
- Page 432 and 433:
recover option to recoveryour data
- Page 434 and 435:
deleted accidently.CONCLUSION:Thank
- Page 436:
THEBIGCOMPUTINGHACK-X-CRYPT204