Hacking Guide by HANS
Hacking Guide by HANS
Guide
BY
HANS
By: ER.RISHI AGGARWAL
([email protected])
Windows hacking notes:
1) All the passwords with in an operating system are saved in the file named “
sam”
We can locate that file at c:/windows/system32/config/sam.
1) Local user password can be broken by login to admin or any other account “
other than the account which we have to break.
Then we have to follow these steps
Run: cmd
Cmd: net user username *
2) For administrator passwords:- as we know that all the passwords are save in
the file called sam , so it will be possible for us to break an admin password, by
just replacing that file.
Boot a win xp cd: give a repair option, after the installation of drivers, when
there will be 37 min remaining, press ( shift + f10), which will take you to the
command prompt, there we have to type nusrmgr.cpl , it will take you to the
admin account properties screen , then after just we have to click , the remove
password option.
2
And you got access to the admin account….
3) There is one another option to break or reset the passwords of local users:
Windows games:
Information gathering
There are many tools to gather the information fro a particular domain.
They are explained as following:
3
1) Ping: this tool is used to convert a domain name to an IP address,
to get its actual name, to get TTL value: i.e. Time To Live, and
check whether there is connectivity between victim and attacker.
Run – cmd -Syntax: ping www.yahoo.com
Ping flooding: - ping www.yahoo.com –t
2) Trace route: this tool is used to trace the path between an attacker
and victim. It tells a total number of router or nodes in between
them. It also tells about the location of nodes and firewall.
Run – cmd – syntax: tracert www.yahoo.com
4
Tools: visualware traceroute, 3d information with map.
5
4) Port scanner: there are basically two types of ports with in a node
physical and logical ports, in hacking we deals with logical ports
only, these are also known as back doors. With the help of port
scanners we came to know about an open ports of a specified
node. This tool is freely available on the Internet, where we have
to just put, a domain name or its IP address.
6
5) Telnet: Its also known to be back door entry, with the help of
knowing open ports, then we can enter into that port, using telnet.
There we will get a banner, called demon banner, which gives
information regarding a server. This process is called demon
banner grabbing.
Run – cmd – Syntax: telnet www.yahoo.com n
Where n is a port number, which are open.
Example: telnet www.yahoo.com 25
7
Tracing E-mails
Tracing an E-mail is quite interesting process, by this a defender may, trace
an exact location, IP address, Operating System, time when Mail was
opened, how many times it was open, address bar contents and many more.
Basically there are two ways a defender can trace a mail, first is to read the
option of “FULL HEADERS” which is associated with each mail, there we
can get an information like, originating IP address- a address from where the
mail was born, time when mail was sent, an operating system used by the
sender, a unique ID associated with each mail, and many more…
8
Second option is to use 3rd party software or online services, which helps
even a layman to trace someone using mail . eg:
WWW.READNOTIFY.COM , which provides a online utility to send a
mail , which when opened by the victim will retrieve all the information
from the node where the mail was opened, or we can say it is an advance
version of full headers…
PHISING
Creating Viruses
10
While simply remove the config directory from the operating system, which
contains the password of xp.
We can also work more, with the simple command coding.
ADDUSERS Add or list users to/from a CSV file
ARP Address Resolution Protocol
ASSOC Change file extension associations
ASSOCIAT One step file association
AT Schedule a command to run at a later time
ATTRIB Change file attributes
BOOTCFG Edit Windows boot settings
BROWSTAT Get domain, browser and PDC info
CACLS Change file permissions
CALL Call one batch program from another
CD Change Directory - move to a specific Folder
CHANGE Change Terminal Server Session properties
CHKDSK Check Disk - check and repair disk problems
CHKNTFS Check the NTFS file system
CHOICE Accept keyboard input to a batch file
CIPHER Encrypt or Decrypt files/folders
CleanMgr Automated cleanup of Temp files, recycle bin
CLEARMEM Clear memory leaks
CLIP Copy STDIN to the Windows clipboard.
CLS Clear the screen
CLUSTER Windows Clustering
11
CMD Start a new CMD shell
COLOR Change colors of the CMD window
COMP Compare the contents of two files or sets of files
COMPACT Compress files or folders on an NTFS partition
COMPRESS Compress individual files on an NTFS partition
CON2PRT Connect or disconnect a Printer
CONVERT Convert a FAT drive to NTFS.
COPY Copy one or more files to another location
CSVDE Import or Export Active Directory data
DATE Display or set the date
Dcomcnfg DCOM Configuration Utility
DEFRAG Defragment hard drive
DEL Delete one or more files
DELPROF Delete NT user profiles
DELTREE Delete a folder and all subfolders
DevCon Device Manager Command Line Utility
DIR Display a list of files and folders
DIRUSE Display disk usage
DISKCOMP Compare the contents of two floppy disks
DISKCOPY Copy the contents of one floppy disk to another
DNSSTAT DNS Statistics
DOSKEY Edit command line, recall commands, and create
macros
DSADD Add user (computer, group..) to active directory
DSQUERY List items in active directory
DSMOD Modify user (computer, group..) in active
directory
ECHO Display message on screen
ENDLOCAL End localisation of environment changes in a batch
file
ERASE Delete one or more files
EXIT Quit the CMD shell
EXPAND Uncompress files
EXTRACT Uncompress CAB files
FC Compare two files
FDISK Disk Format and partition
FIND Search for a text string in a file
FINDSTR Search for strings in files
FOR /F Loop command: against a set of files
FOR /F Loop command: against the results of another
command
FOR Loop command: all options Files, Directory, List
FORFILES Batch process multiple files
FORMAT Format a disk
FREEDISK Check free disk space (in bytes)
FSUTIL File and Volume utilities
FTP File Transfer Protocol
FTYPE Display or modify file types used in file
extension associations
12
GLOBAL Display membership of global groups
GOTO Direct a batch program to jump to a labelled line
HELP Online Help
HFNETCHK Network Security Hotfix Checker
IF Conditionally perform a command
IFMEMBER Is the current user in an NT Workgroup
IPCONFIG Configure IP
KILL Remove a program from memory
LABEL Edit a disk label
LOCAL Display membership of local groups
LOGEVENT Write text to the NT event viewer.
LOGOFF Log a user off
LOGTIME Log the date and time in a file
MAPISEND Send email from the command line
MEM Display memory usage
MD Create new folders
MODE Configure a system device
MORE Display output, one screen at a time
MOUNTVOL Manage a volume mount point
MOVE Move files from one folder to another
MOVEUSER Move a user from one domain to another
MSG Send a message
MSIEXEC Microsoft Windows Installer
MSINFO Windows NT diagnostics
MSTSC Terminal Server Connection (Remote Desktop
Protocol)
MUNGE Find and Replace text within file(s)
MV Copy in-use files
NET Manage network resources
NETDOM Domain Manager
NETSH Configure network protocols
NETSVC Command-line Service Controller
NBTSTAT Display networking statistics (NetBIOS over
TCP/IP)
NETSTAT Display networking statistics (TCP/IP)
NOW Display the current Date and Time
NSLOOKUP Name server lookup
NTBACKUP Backup folders to tape
NTRIGHTS Edit user account rights
PATH Display or set a search path for executable files
PATHPING Trace route plus network latency and packet loss
PAUSE Suspend processing of a batch file and display a
message
PERMS Show permissions for a user
PERFMON Performance Monitor
PING Test a network connection
POPD Restore the previous value of the current
directory saved by PUSHD
PORTQRY Display the status of ports and services
PRINT Print a text file
13
PRNCNFG Display, configure or rename a printer
PRNMNGR Add, delete, list printers set the default printer
PROMPT Change the command prompt
PsExec Execute process remotely
PsFile Show files opened remotely
PsGetSid Display the SID of a computer or a user
PsInfo List information about a system
PsKill Kill processes by name or process ID
PsList List detailed information about processes
PsLoggedOn Who's logged on (locally or via resource
sharing)
PsLogList Event log records
PsPasswd Change account password
PsService View and control services
PsShutdown Shutdown or reboot a computer
PsSuspend Suspend processes
PUSHD Save and then change the current directory
QGREP Search file(s) for lines that match a given
pattern.
RASDIAL Manage RAS connections
RASPHONE Manage RAS connections
RECOVER Recover a damaged file from a defective disk.
REG Read, Set or Delete registry keys and values
REGEDIT Import or export registry settings
REGSVR32 Register or unregister a DLL
REGINI Change Registry Permissions
REM Record comments (remarks) in a batch file
REN Rename a file or files.
REPLACE Replace or update one file with another
RD Delete folder(s)
RDISK Create a Recovery Disk
RMTSHARE Share a folder or a printer
ROBOCOPY Robust File and Folder Copy
ROUTE Manipulate network routing tables
RUNAS Execute a program under a different user account
RUNDLL32 Run a DLL command (add/remove print connections)
SC Service Control
SCHTASKS Create or Edit Scheduled Tasks
SCLIST Display NT Services
ScriptIt Control GUI applications
SET Display, set, or remove environment variables
SETLOCAL Control the visibility of environment variables
SETX Set environment variables permanently
SHARE List or edit a file share or print share
SHIFT Shift the position of replaceable parameters in a
batch file
SHORTCUT Create a windows shortcut (.LNK file)
SHOWGRPS List the NT Workgroups a user has joined
SHOWMBRS List the Users who are members of a Workgroup
SHUTDOWN Shutdown the computer
14
SLEEP Wait for x seconds
SOON Schedule a command to run in the near future
SORT Sort input
START Start a separate window to run a specified program
or command
SU Switch User
SUBINACL Edit file and folder Permissions, Ownership and
Domain
SUBST Associate a path with a drive letter
SYSTEMINFO List system configuration
TASKLIST List running applications and services
TIME Display or set the system time
TIMEOUT Delay processing of a batch file
TITLE Set the window title for a CMD.EXE session
TOUCH Change file timestamps
TRACERT Trace route to a remote host
TREE Graphical display of folder structure
TYPE Display the contents of a text file
USRSTAT List domain usernames and last login
VER Display version information
VERIFY Verify that files have been saved
VOL Display a disk label
WHERE Locate and display files in a directory tree
WHOAMI Output the current UserName and domain
WINDIFF Compare the contents of two files or sets of files
WINMSD Windows system diagnostics
WINMSDP Windows system diagnostics II
WMIC WMI Commands
XCACLS Change file permissions
XCOPY Copy files and folders
---------------------------End-----------------------------
-
Key logger
This is an wonderful technology, that deals with monitoring a
remote computer in given ways: It can monitor keys typed, sites
visited, screen shots, audible, and many more stuff.
Just we have to install this techno on the victim’s node, after that
we have to assign a password, so that a victim should not be able
to enter or alter the setting of his own system. After this one can
easily monitor these contents and even can transfer or export the
data trough mail, using SMTP, free SMTP service is provided by
www.gawab.com.
16
17