Sei sulla pagina 1di 18

What you need to know -By Komaragiri Srinivas Jagannath

Values of money, bullets, armies, etc stored on RAM RAM accessible by cheatengine One filters all values to try and find needed one By changing value to what we want, we can win the game Cheatengine can also be used as a disassembler, debugger, etc.

How to bypass nationwide cordons<tor,VPN> &(or) secure your IP address Some popular tools for hacking

Metasploit SQLi

Review of SQL hacking

WHAT IS SQL

You will learn the basics of: O.S. booting SAM files How applications work What are serials? How to crack application security

Operating Systems allow human-computer interaction The computer hardware boots up the O.S., which is present on hard drives, CDs,etc BIOS resides on ROM BIOS loads up first on power on, performs hardware tests and boots up the OS

Forgotten passwords Prankster friends Disgruntled co-workers Second hand systems

boot up refers to loading the OS onto the RAM and executing it. The BIOS loads the boot-loader onto the RAM NTLDR(NT loader) uses the MBR(master boot record) to load windows One can, by manipulating the BIOS, interrupt this and load a live OS

A live OS is an OS that runs from a removable disk It is mostly loaded onto the RAM and makes no persistent changes Most live OSs depend on Linux to run One can set up small OSs(Crunchbang,Xpud,etc) to access Windows systems

We can run multiple OS at the same time You can run red hat linux(college version) on top of windows, like a game We have a virtual XP system set up We will use an ISO(virtual CD) to hack in The ISO used is a Linux OS

We now go to the system Sethc.exe manipulates the sticky key sticky key is activated, at ANYTIME, if you press shift five times We replace this with command prompt We now reboot and go to command prompt Via the new command prompt(press shift 5 times at login) we can now change passwords, access data, etc, anytime we want.

To change password, we will use Net user <username> * It is a command that changes password

All operating systems(Windows, Mac, etc) are vulnerable Interruption in BIOS is hard to prevent Set up BIOS password(hardware hacking needed to recover) Encrypt hard drive(assume all data lost if password is lost) Simplest, DONT PUT SENSITIVE DATA ON PUBLICLLY ACCESIBLE COMPUTERS

Applications are coded in high level languages Compilers convert this to machine code Only the machine code files are given to users One can use a disassembler or debugger to get at the assembly language code of the program

Assembly code is a hard to understand code It is easily converted to machine code Format of all commands: OPCODE OPERAND1 OPERAND2 OPCODE: operator like add, multiply, etc OPERANDs: memory location of data to be changed

ADD 8088, 9099 Adds the number in 9099 to the number in 8088 and stores the result in 8088. Jump 9999 Jump to the code in 9999 location The computer doesnt differentiate between code and data, to it, all code & data is simply bits

Binary is hard to understand for humans All code is converted to this machine code by assemblers, etc. We use other representations such as Octal, Hexadecimal etc.

IF( a=b) //if equal let a be at 4545, b at 6565 { //code at 7777 loc } Assembly: Cmp 4545 6565 compare a,b Je 7777 Jump if equal . . . .

Modify the JE to JNE and the resulting code (jne 7777) means: If(a!=B) { . . } As our random password is wrong, move in.

Potrebbero piacerti anche