Friday, December 27, 2019

System Hacking


Before starting the system hacking phase, an ethical hacker, or pentester must
remember that you cannot gain access to the target system in a go. You must
have to wait for what you want, deeply observe and struggle Than you will success


======System Hacking ======


 System Hacking Methodology:
There same   system hacking methodology
Cracking passwords
Its mean first we crack the passwords of system
you should know about three types for crack passwrd 
onelike username and password.
 two like biometrics
three = like registered / allowed devices
Every one know that a good password contains: -

Case Sensitive letters

Special characters

Numbers

lengthy password (more than 8 letters)

Types of Password Attacks
Password Attacks are  the following types: -

Non-Electronic Attacks/physical attack (types)



Active Online Attacks (types)[
"Active Online Attack includes different techniques that directly interact
with the target for cracking the password."
]
=============================
most use full are
Dictionary Attack (D.A)
Brute Force Attack (B.F.A)
Hash Injection (H.I)
=============================
Passive Online Attacks (types)
[
"Passive online attacks are performed without interfering with the target.
Importance of these attacks is because of extraction of the password
without revealing the information as it obtains password without directly
probing the target."
]
=============================
Wire Sniffing
Man-in-the-Middle Attack
Replay Attack
=============================
Default Password (types)
["Every new equipment is configured with a default password by the
manufactures. It is recommended to change the default password to a
unique, secret set of characters."]

Offline Attack (types)["
An example of offline attacks is comparing the password using a
rainbow table. Every possible combination of character is computed for
the hash to create a rainbow table.
"]
=============================

Pre-Computed hashes and Rainbow Table
=============================




Escalating privileges


Executing applications

Hiding files


Covering tracks














If you have any problem so comment me
















Pease give me feedback

1 comment:

Hack Me Tech