Unit No. 2 Part 3 System Hacking
Unit No. 2 Part 3 System Hacking
valid
Usernames, Email addresses,
passwords, groups, IP range,
operating
https://cirt.net/
https://default-password.info/
http://www.passwordsdatabase.com/
Offline Attack
Microsoft
platform, operating system
implements a default set of
authentication protocols
pwdump7
fgdump
L0phtCrack
Ophcrack
RainbowCrack
Cain and Abel
John the Ripper
Password Cracking tool for
Mobile
FlexySpyis one of the most powerful
monitoring, spying tools for mobile
and is compatible with Android, iPad,
iPhone, Blackberry and Symbian
Phones.
Password
Cracking using
Pwdump7 and Ophcrack tool.
Escalating Privileges
Adware
System Monitors
Tracking Cookies
Trojans
Spywares Features
Tracking Users such as Keylogging
Monitoring user’s activity such as Web sites visited
Records conversations
Blocking Application & Services
Remote delivery of logs
Email Communication tracking
Recording removable media communication like
USB
Voice Recording
Video Recording
Tracking Location (GPS)
Mobile Tracking
Rootkits
A rootkit is a collection of software designed
to provide privileged access to a remote
user over the target system.
Mostly, Rootkits are the collection of
malicious software deployed after an
attack, when the attacker has the
administrative access to the target system
to maintain its privileged access for future.
It creates a backdoor for an attacker;
Rootkits often mask the existence of its
software which helps to avoid detection.
Types of Rootkits
Avatar
Necurs
Azazel
ZeroAccess
NTFS Data Stream
Steganography is basically a
technique for hiding sensitive
information in an ordinary
message to ensure the
confidentiality.
Hidden information is extracted at
the destination by a legitimate
receiver
Types of Steganography
Whitespace Steganography
Image Steganography
Image Steganography
Document Steganography
Video Steganography
Audio Steganography
Folder Steganography
Spam/Email Steganography
Covering Tracks
Disable Auditing
Clearing Logs
Manipulating Logs