18-01-2013, 04:13 PM
Hacking
1Hacking.doc (Size: 138 KB / Downloads: 34)
Introduction:
Hacking is an intellectual activity and a sort of mental gymnasium. Hackers are really intellectual people who have the extra bit of information.
Hackers were computer geeks who knew everything about the way of software works. They have this uncanny ability of finding out ways of doing the impossible.
They debug code and use trial and error methods to discover unknown and new tricks and secrets. They do try to break into systems but have the decency not to cause any damage but instead they report the whole to the system administrator.
Hackers Vs Crackers:
A hacker is a computer freak who peeps into others computers without harming them. Hackers are actually nice people from which you could actually learn a lot.
However, after saying all this I must admit that there is a thin line between hackers and crackers.
Crackers are the nerd persons with an intention of harming others computers. Besides unauthorized entry they try to destroy others resources.
Hacking BIOS passwords:
BIOS are the basic settings on your computer, such as how many and what kinds of disk drives you have, which ones are enabled and which are disabled and which ones are used for booting. These settings are held in the CMOS chip on the motherboard.
A common method of entering the BIOS is pressing the Del key at boot up. Most computers have BIOS which can be configured to ask for a password as soon as the computer is switched on. If the ask password option is enabled then as soon as the PC is switched on, a dialog box welcomes you and asks for the password. You cannot override this and there is no way of disabling this because to enter the BIOS you need to know the BIOS password. Disable it by hacking into the BIOS setup. The most common method of overriding this password prompt is by trying out some default BIOS passwords. Some common passwords are:
J262
AWARD_SW
AWARD_PW
The Company name and version of the BIOS is displayed on the screen each time the system boots.
If the default passwords did not work, the other way is remove the lithium battery from the computer and put it back after 30 seconds.
Hacking windows screen saver password:
This is an interesting hack and not many people know about it. This requires no canned hacking tool, we will crack the password manually.
If a screen saver is password protected, then it does not allow us to do anything on a system until and unless we enter the password. Here, not even CTRL+ALT+DEL works.
To begin with, Windows stores the encrypted password in a file called “user.dat” file in the Windows directory. Test the coding scheme in your own system by giving the letters whose codes you are to know. Now you are armed with the letters and their corresponding codes and you are at a step to break any password.
Peeping the Internet:
Ping:
Ping is a part of ICMP protocol, i.e. the Internet Control message Protocol, that is used to trouble shoot the TCP\IP networks.
Ping is a command which sends out a datagram to the specified host. This specified host if alive, i.e. turned on, sends out reply or echoes off the same datagram. If the datagram that returns to your computer has the same datagram that was sent, then it means that the host is alive. So ping is a command that allows you to check if a host is alive or not. It can also be used to calculate the amount of time taken for a datagram to reach the Host.
It is so deadly that it can be used to ping a hostname perpetually that may even cause the Host to crash. Now, what happens is that when a host receives a ping signal, it allocates some of its resources to attend to or echo back the datagram. Now if you ping a host perpetually, then time will occur when all resources of the host are used and the host either hangs or restarts.
You can even ping yourself. The IP 127.0.0.1 is the local host. This means that when you connect to 127.0.0.1, you actually connect to your own machine. So to ping yourself perpetually, issue the following command: