DEVIL'S BLOG ON SECURITY


A DEVIL'S BLOG ON COMPUTER AND INFORMATION SECURITY, ETHICAL HACKING AND COUNTERMEASURES


Learn Ethical Hacking | Learn Hacking Online | Learn How To Hack|Hack Counter Hack| Ethical Hacking Tutorials


Home   ||   See All Tutorials  ||   Products  ||   About This Blog   ||  Subscribe To RSS Feed



Join facebook group THE HACKER DEVIL


Password Tools That May Come Handy In Need

Password Tools That May Come Handy In Need


We use several passwords everyday and sometimes it might happen that we may forget password and there we might be in damn need to access our system or tool or application which is protected by password.

L0phtCrack | A Beginner's Tutorial

L0phtCrack | A Beginner's Tutorial


L0phtCrack is known as best windows password auditing tool. It can be used by network/system administrator for auditing weak passwords and can also help a hacker to recover password from password hashes. Using L0phtCrack is not a rocket science but still I found there are many who always got stuck with a problem using this awesome tool.

Password Changer:A Privilege Escalation Tool

Password Changer | A Privilege Escalation Tool


Active @ password changer is a tool that is used for password recovery but can be used as a privilege escalation tool. Active @ Password Changer is designed for resetting local administrator and user passwords on Windows XP / VISTA / 2008 / 2003 / 2000 & Windows 7 systems in case an Administrator's password is forgotten or lost.

Privilege Escalation

Privilege Escalation


As we discussed earlier enumeration only means identification of information that can be used to intrude system. And an attacker needs a weak user account to intrude system, it doesn't matter if that user account doesn't have administrative privileges or not because its job of hacker to grant himself/herself administrative privileges or add an account that will be having administrative privileges for him/her.

About Key Loggers

About Key Loggers


Key loggers are tools that are used for logging key strokes, hence they are also known as keystroke loggers. Key loggers come in both software and hardware form and are used to capture and record everything typed using keyboard. The logged data is hidden in system and can be delivered to attacker by means of e-mail or FTP server.

Password Cracking Countermeasures

Password Cracking Countermeasures


The first best counter measure against password cracking is using strong password. Possible strong password should be implemented to protect you against password cracking. This means a password must be at least 8-12 characters long and should be made of uppercase, lowercase, alphabets as well as numerals and

Best Password Crackers In Hackers Toolkit

Best Password Crackers In Hackers Toolkit


Yep, you read it right best password cracker tools in hacker's toolkit. Following is list of some well known and powerful password cracking tools that usually each and every hacker has in his/her toolkit. Since they are best sooner or later we will cover all of them on this blog.

Make Your Windows XP Genuine

Make Your Windows XP Genuine


You have a copy of Windows XP which several times pop up message about its activation, you don't have internet connection to activate your XP. So here's the trick that can help you get rid of this problem. Please note that this trick will only work on ordinary Windows XP SP1-SP2 installation that too before installing any other program on it i.e

Dump Password Using Pwdump And Fgdump

Dump Password Using Pwdump And Fgdump


One of the crucial stage in hacking is dumping passwords. As we know passwords are stored in encrypted form in system, these encrypted passwords needs to be dumped to be cracked before using some good password cracking tool like Lopht Crack, John The Ripper etc. But before we crack passwords lets make our-self aware of two cool password hash dumping tools

Types Of Password Attack-2

Types Of Password Attack-2


In last section we covered basic types of password attacks. Here in this section we will cover them in little detail. But before you read this post if you haven't read the previous post on types of password attacks I urge you to read it. So now lets move on to the second part of types of password hacking

Hack Using Default Password

Hack Using Default Password


Password hacking is complicated stage in hacking cycle since it is not only the step which allows you access in victim’s PC but it marks origin of real hacking. But before trying anything else an attacker will always try to exploit victim using default password of device used by victim. A unchanged default password is always held as misconfiguration as per hacking is concerned. An attacker at very first stage may try to crack BIOS passwords,

Types Of Password Attack

Types Of Password Attack


The next stage to Enumeration is system hacking and password hacking is one of the crucial part of hacking a system. Depending on how an attacker tries to attack password for hacking password attacks can be classified as follows,

Free Ethical Hacking Training | Learn Ethical Hacking Online Free | Learn How To Hack | Hack Counter Hack | Ethical Hacking Tutorials | Devil's Blog On Security