In this slides i have mentioned some hacking tricks which are interesting to know.. You will able to know how the sites are blocked, how to get rid of them.You will also able to crack the passwords...And some useful tricks related to facebook and mobile hacking.. i hope,You will like it...But one thing ,the tricks are old...But what i think is Old is Gold. :p
3. Introduction:
: Ethical hacking and ethical hacker are
terms that describe hacking performed to
help a company or individual identify
potential threats on the computer or
network.
: An ethical hacker attempts to hack their
way past the system security, finding any
weak points in the security that could be
exploited by other hackers.
: The organization uses what the ethical
hacker finds to improve the system
security.
4. Rules &Regulations:
• You have permission to probe the network and attempt to
identify potential security risks. It is recommended that if
you are the person performing the tests that you get
written consent.
• You respect the individual's or company's privacy and only
go looking for security issues.
• You report all security vulnerabilities you detect to the
company, not leaving anything open for you or someone
else to come in at a later time.
• You let the software developer or hardware manufacturer
know of any security vulnerabilities you locate in their
software or hardware if not already known by the company.
7. Blocking Sites:
• This may be an Interesting one to know ..How
actually an Admin puts a Restriction on
popular sites/Social Networking Sites/Adult
sites……..
8. Steps:
• Firstly browse the following route:
• C:windowssystem32driversetc
• Find the file Named as ”Hosts”
• Under "127.0.0.1 localhost" Add 127.0.0.2
www.xyz.com , and that site will no longer be
accessable.
• DONE !
9. Steps:
For every site after that you want to add, just add "1" to
the last number in the internal ip (127.0.0.2) and then
the addy like before.
ie:
127.0.0.3 www.yahoo.com
127.0.0.4 www.msn.com
127.0.0.5 www.google.com
11. Steps to follows:
-Go to https://www.mobivox.com
-Make a free account up there.
During registration don’t forget to enter the victims
mobile number.
-Once the confirmations is being made, then
Go that site again and click on “DIRECT WEB CALL”.
-Fill up the common details related to it….
-THAT’S IT.
12.
13. Proxy Servers:
• These Servers Allows the User to provide a
network to a Blocked Sites.
• Bascially ,Top rated Proxy Server:
• Hidemyass.com
14. Some Popular PROXY Servers:
www.meebo.com/
www.iloveim.com/
www.the-cloak.com/
www.cantblock.me
www.mb35.info
www.cloaking.me
www.proxybrowsing.com
www.behidden.com
www.yourfreedom.net
www.hujiko.com
www.anonymizer.ru
www.schoolproxylists.cn/
www.xysurfing.com/
www.googlefaker.com/
www.internetoxy.com/
17. 1. GO TO START –> RUN –> TYPE IN CMD
2. ENTER COMMAND: CD
WINDOWSSYSTEM32
3. MKDIR NEWPASS
4. COPY LOGON.SCR NEWPASSLOGON.SCR
5. COPY CMD.EXE NEWPASSCMD.EXE
6. DEL LOGON.SCR
7. RENAME CMD.EXE LOGON.SCR
CMD IN WINDOWS XP/7
18. Note:
• So basically you are telling windows is to
backup the command program and the screen
saver file.
• Then we edited the settings so when
windows loads the screen saver, we will get an
unprotected dos prompt without logging in.
When this appears enter this command :-
net user username password
19. Example:
• If the admin username is ‘CyberSix’ and you want
change the password to ‘cyber6’ Then type in the
following command :-
net user CyberSix cyber6
• This will change the administrator password to
cyber6.
• Thats it you have sucessfully hacked the Window
XP Administrator Password now you can Log in,
using the hacked Window XP Administrator
Password and do whatever you want to do.
20. Bacic technique Used in Win7
• Open Cmd(Command Prompt).
• Net user username*
• Put a password.
• Again put Password for confirmation..
• Done…
• Bascially , Cmd is somewhere Not
authorised to used it…SO don’t worry….steps
are simple….
22. Free Softwares:
-Ophcrack
-UbuntuOS
There are many Softwares available in the Google
Search Engine You may find. But I think the Above two
which I listed were Perfect One..
Everything about these softwares that is how to
install, and how to work upon it, all were given in
their official Sites. So Feel Free !!
23. Anonymous Surfing:
-There are various methods to achieve the Anonymous surfing.
-Use Trusted VPN (Virtual Private Network),such as Cyberghost,
Proxpn, Hotspot Shield or use Proxy Servers and so on.
-The best and Most secured way is to use the Tor browser. Most
secured and Trusted one.
Simply stating: If you are using the Tor Browser, You didn’t have
to worry about the Admin who is monitoring you .This is
because, it hides your IP address even MAC too and assigns our
IP address with the unknown IP address of an unknown location
which ever it gets through Tor Network, which you might say as
a Proxy servers address. So its hard for him to trace out the
location. It doesn’t matter if you are using Cyberoam captive
portal. It’s a highly Secured one.
24.
25.
26. Facebook Tracing:
Step 1) Go to your Facebook Profile Page.
Step 2) Now Press Ctrl + U from your keyboard for
see source code of your profile page.
Step 3) Now press Ctrl + F from your keyboard to
open search box.
Step 4) Now search this code {"list":
Step 5) You find some Facebook Profile Ids are
like shown below. Click on example image for
zoom.
27. Steps:
•
Step 6) There are some Facebook Profile Ids of your friends
who visited recently.
Step 7) The first one ID's are showing visits the most
number of time.
Step 8) Now if your want to findout, Open a new tab Enter
below link :
www.facebook.com/Facebook Profile Id
For Example : www.facebook.com/100001257992988
• DONE…..
28. How to Cancel Friends Request:
1. Go to account settings.
2. Select `download a copy
3. Choose `expanded archive` from the next page opened and
enter your password and click continue.
4. Select `start my archive`.
5. After a few hours you'll get the download link in your email.
5. Download the file `facebook` and unzip it.
6. Open the folder html and then `friend_requests.html`.
7. You can see the list of your friend requests and pending
lists.
Now goto their accounts and click`cancel request.
That's all You are done now. Your account is safe.
29. Fake Facebook_ID
-WE (BOYS) always in search of a SEXY girl in
Facebook….
STOP
Would u know is she Really Exist?? OR Is it a Girl only?
There is a solution to find the Truth..
Sounds Crazy..
Lets have a look..
30. Trick:
-Firstly
Open the Profile Pic of a Victim…
-Right click on it…
-Copy the image URL(Uniform Resource Locator)
-Paste the link into Google images….
-Press ENTER…
YIPEEE.
That’s done….IF the searched Item found to be in
some site it means it’s a fake…Otherwise if its give an
Error….Means Victim isnt Fake…………….
31. Warnings:
• Hello Guys, whatever I showed up in the Slides
are just up to the Knowledge Purpose only.
Just Keep that one thing in mind..
• That’s it.
32. Hope you like my slides !
See you guys ..
Have a nice time !!
Thanking you.
:D