wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

STUDY OF SYSTEM HACKING TOOLS

profile
Taha Chatriwala
Nov 30, 2017
0 Likes
0 Discussions
1424 Reads

The information provided by website should be used for educational purpose only, website will not be held responsible in the event any criminal charges be brought against any individuals misusing the information in this website to break the law.

  Today we will be Studying System hacking with the help of following 6 tools. We will be understanding what this tools exactly does and what information will it give us from the target system.

Tool 1 :LCP

LCP program mainly audits user account passwords and recovers them. It can be used to test password security, or to recover lost passwords. The program can import from the local (or remote) computer, or by loading a SAM, LC, LCS, Pw Dump or Sniff file. LCP supports dictionary attack, brute force attack, as well as a hybrid of dictionary and brute force attacks.

  Step 1: Open LCP tool. LCP 1 Step 2: Click on import -> PwDump file. LCP 2 Step 3: Select hybrid  attack and click on play button. LCP 3 DONE !!

Tool 2 : NTFS Streams and ADS Spy

Ads Spy is a tool that can be used to search for and remove Alternate Data Streams (ADS) from NTFS file systems. Alternate Data Streams are a way of storing meta-information for files without actually storing the information in the file it belongs to. Recently browser hijackers began using this technique to store hidden information on the system, and even store trojan executable files in ADS streams of random files on the system. Step 1: Create 2 text files name 1.txt and 2.txt. Step 2: Open cmd and write the commands by redirecting the location of files. NTFS and ADS 1 Step 3: Now open adsSpy. Step 4: Select scan only this folder and click on scan the system. ADS 3 DONE !!

Tool 3 : Stealth Files Tool

Stealth Files hides any type of file in almost any other type of file. This is called steganography. This is a way of encrypting data so that it is hard to find. You can not decrypt something unless you know what to decrypt. Using steganography, Stealth Files compresses, encrypts, and then hides any type of file inside many other types of files, including EXE, DLL, OCX, COM, JPG, GIF, ART, MP3, AVI, WAV, DOC, BMP, and most other types of video, image, and executable files. You will still be able to view, open, and run these files without and problems. If you want to, you can also use a password to encrypt the hidden files. Step 1: Open stealth files. Stealth files tool 1 Step 2: Click on hide files. Select Destroy source file and add file to hide and choose carrier file where file can hide and provide password. Stealth files tool 2 Step 3: Select retrieve files. Choose carrier file where file is hidden and provide password and location where retrieved file can be stored. Stealth files tool 3 DONE !!

Tool 4 : Rainbow Crack

RainbowCrack uses time-memory tradeoff algorithm to crack hashes. It differs from brute force hash crackers. A time-memory tradeoff hash cracker need a pre-computation stage, at the time all plaintext/hash pairs within the selected hash algorithm, charset, plaintext length are computed and results are stored in files called rainbow table. It is time consuming to do this kind of computation. But once the one time pre-computation is finished, hashes stored in the table can be cracked with much better performance than a brute force cracker. Step 1: Visit website htts://www.crackstation.net. Rainbow crack 1 Step 2: Enter the hash values and crack on click hash. Rainbow crack 2 Step 3: Shows the plain text value for hash values. Rainbow crack 3 DONE !!

Tool 5 : LOpht Crack

L0phtCrack attempts to crack Windows passwords from hashes which it can obtain (given proper access) from stand-alone Windows workstations, networked servers, primary domain controllers, or Active Directory. In some cases it can sniff the hashes off the wire. It also has numerous methods of generating password guesses (dictionary, brute force, etc). Step 1: Open LOpht crack. LOpht 1   LOpht 2 Step 2: Shows the password for users. LOpht 3 DONE !!

Tool 6: QuickStego

QuickStego is again another software used for Steganography (explained above). It can hide text messages in the image files(.JPG, GIF, BMP), also it can retrieve secret text messages from image files(.JPG, GIF, BMP). You will still be able to view, open, and run these files without even knowing that it contains a hidden message in it. Step 1: Open Quick Stego. Quickstego 1 Step 2: Open image and write text and click on hide text and save image. Quickstego 2 Step 3: Now open the saved image and click on get text. Quickstego 3 Step 4: Do this for hiding text files  in image Quickstego 4 DONE !!

Comments ()


Sign in

Read Next

THE INPACT OF SOCIAL MEDIA!

Blog banner

Challenges of Digital forensics in cloud computing environment

Blog banner

Protect yourself from System Hacking with these Simple Steps

Blog banner

Uniprocessor Scheduling

Blog banner

File management in os

Blog banner

I/O buffer and its techniques

Blog banner

Why Summer Break Is Important for Emotional and Cognitive Growth?

Blog banner

The Future of Patola Weaving in a Sustainable Fashion World

Blog banner

Virtual Machine

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

All you need to know about “On-page SEO”

Blog banner

Ethical Hacking

Blog banner

AN EVENT-BASED DIGITAL FORENSIC INVESTIGATION

Blog banner

Why Does Hierarchy Still matter in Organizations?

Blog banner

Modern Operating System - Suren Kotian

Blog banner

What is Spyware?

Blog banner

A Journey By Train

Blog banner

S-Tool : Steganography

Blog banner

Types of Malware in Cyber Security

Blog banner

INTRODUCTION

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

What is the point of living if we can die at any moment of our lives ?

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

Data is an asset and it is your responsibility!

Blog banner

Advantage of freedom

Blog banner

Fitness

Blog banner

What Function Does SEO Serve in Digital Marketing?

Blog banner

Operating system

Blog banner

Operating system

Blog banner

Memory input output management

Blog banner

Shoulders

Blog banner

Number Guessing game --lisp

Blog banner

TECHNOLOGY : BOON OR CURSE ?

Blog banner

What is process

Blog banner

Raising Emotionally Intelligent Students: The Classroom Beyond Academics

Blog banner

Concurrency:Deadlock and Starvation

Blog banner

ONLINE NEWSROOMS

Blog banner

10 Reasons to Date a South Indian Girl

Blog banner

Cache Memory

Blog banner

Boxing

Blog banner

SNAPCHAT

Blog banner