Join facebook group THE HACKER DEVIL
We use several passwords everyday and sometimes it might happen that we may forget password and there we might be in damn need to access our system or tool or application which is protected by password.
L0phtCrack | A Beginner's Tutorial
L0phtCrack is known as best windows password auditing tool. It can be used by network/system administrator for auditing weak passwords and can also help a hacker to recover password from password hashes. Using L0phtCrack is not a rocket science but still I found there are many who always got stuck with a problem using this awesome tool.
Password Changer | A Privilege Escalation Tool
Active @ password changer is a tool that is used for password recovery but can be used as a privilege escalation tool. Active @ Password Changer is designed for resetting local administrator and user passwords on Windows XP / VISTA / 2008 / 2003 / 2000 & Windows 7 systems in case an Administrator's password is forgotten or lost.
As we discussed earlier enumeration only means identification of information that can be used to intrude system. And an attacker needs a weak user account to intrude system, it doesn't matter if that user account doesn't have administrative privileges or not because its job of hacker to grant himself/herself administrative privileges or add an account that will be having administrative privileges for him/her.
About Key Loggers
Key loggers are tools that are used for logging key strokes, hence they are also known as keystroke loggers. Key loggers come in both software and hardware form and are used to capture and record everything typed using keyboard. The logged data is hidden in system and can be delivered to attacker by means of e-mail or FTP server.
Labels: Key Loggers
Password Cracking Countermeasures
The first best counter measure against password cracking is using strong password. Possible strong password should be implemented to protect you against password cracking. This means a password must be at least 8-12 characters long and should be made of uppercase, lowercase, alphabets as well as numerals and
Best Password Crackers In Hackers Toolkit
Yep, you read it right best password cracker tools in hacker's toolkit. Following is list of some well known and powerful password cracking tools that usually each and every hacker has in his/her toolkit. Since they are best sooner or later we will cover all of them on this blog.
Make Your Windows XP Genuine
You have a copy of Windows XP which several times pop up message about its activation, you don't have internet connection to activate your XP. So here's the trick that can help you get rid of this problem. Please note that this trick will only work on ordinary Windows XP SP1-SP2 installation that too before installing any other program on it i.e
Labels: Windows Hacking
Dump Password Using Pwdump And Fgdump
One of the crucial stage in hacking is dumping passwords. As we know passwords are stored in encrypted form in system, these encrypted passwords needs to be dumped to be cracked before using some good password cracking tool like Lopht Crack, John The Ripper etc. But before we crack passwords lets make our-self aware of two cool password hash dumping tools
Types Of Password Attack-2
In last section we covered basic types of password attacks. Here in this section we will cover them in little detail. But before you read this post if you haven't read the previous post on types of password attacks I urge you to read it. So now lets move on to the second part of types of password hacking
Hack Using Default Password
Password hacking is complicated stage in hacking cycle since it is not only the step which allows you access in victim’s PC but it marks origin of real hacking. But before trying anything else an attacker will always try to exploit victim using default password of device used by victim. A unchanged default password is always held as misconfiguration as per hacking is concerned. An attacker at very first stage may try to crack BIOS passwords,