How to Hack/Bypass windows password. In this article we are exactly going to tell you the same. To hack or Bypass windows passwords is not a difficult task actually. If you have the required tools you can easily bypass windows password. However Learn Hacking highly discourages the use of blackhat hacking techniques and use this knowledge only for a good reason. Say you forgot your computer’s password and want to recover it, you may use this method. Now coming back to the main topic again:- We are going to use a tool called Hirens Boot CD to crack windows passwords. Download Hirens boot cd from http://www.hirensbootcd.org/files/Hirens.BootCD.15.1.zip Q) Where are windows password saved?  A) Windows first encrypts the password using some algorithm and then saves it to a Sam file.This...

What is Metasploit How to use the Metasploit Framework What is Metasploit | How to use Metasploit Framwork History of Metasploit What is Metasploit Project: The Metasploit Project is a computer security project which aims at providing information about security vulnerabilities and helps in penetration testing and Patching the exploits. Metasploit framework is its famous sub project, a tool for developing and executing exploits against a remote machine. Apart from Metasploit Framework, Metasploit Project is well known for is anti-forensics and loopholes evading tools.  Other important sub-projects include the Opcode Database, shellcode archive, and security research.  About the Metasploit framework : Metasploit Framework was programmed by HD Moore in 2003 as a network tool using...

How to Use Any SIM in Any Modem Without Unlocking it

AIRTEL,BSNL,AIRCEL,VODAFONE MODEM UNLOCKER FOR FREE Every One its not possible to use any sim in a modem without unlocking. For that you have to Pay. But dont worry with the following trick you can do it for free :-) Step by step instruction: 1. Insert SIM in Modem   2. Modem show invalid SIM, just ignore it and close modem software. 3. Start NOKIA PC...

In this tutorial we will discus how you can setup a lab for yourself to practice hacking on your system. At very basic level a hacker is in need of 2-3 systems with a Wired LAN or Wireless LAN. But if you are the one who has started just like me with just one laptop or computer then possibly there's no way you can match this setup. So following was my solution to start practicing with only one laptop or PC meeting above criteria of multiple computers connected in LAN. At most basic level following are your requirements. Requirements: A Computer: First of all a computer which must have minimum following configuration. A processor with 1.7GHz clock speed, 120GB + Hard disk 2GB RAM, Please note than your RAM must be above 1GB for practicing. If your RAM is less than 1GB...

Password hacking is complicated stage in hacking cycle since it is not only the step which allows you access in victim’s PC but it marks origin of real hacking. But before trying anything else an attacker will always try to exploit victim using default password of device used by victim. A unchanged default password is always held as misconfiguration as per hacking is concerned. An attacker...

Google Hacking Google hacking, most commonly misunderstood words by newbies as making queries on Google search to find out songs and movies. But it is just part of scope that Google hacking covers, experienced hackers will find this article as incomplete though it is stuffed with lot of things. What is Google hacking: Google hacking is term given to create and use complex queries on search box to get expected results from Google. But in reality it includes using each and every tool that is provided by Google as hacking weapon. Did I forget to mention Google Hacking is part of Reconnaissance, that means if you have skipped previous posts then it will be harder for you to understand power of Google Hacking. In this section I 'll show you using some of its applications...

Trojan

In this post we will learn how to create Remote Administration Tool(RAT). But before we proceed let's discus some basic terminologies. Trojan: Trojan horse or Trojan is a malware that appears to perform a desirable function for the user prior to run or install but instead facilitates unauthorized access of the user's computer system. It is harmful software/code that appears legitimate....

Computer VIRUS i.e Vital Information Resource Under Seize are considered as very first form of computer threats. Computer VIRUS usually replicate themselves, damage your files and are also able to distribute themselves on network. Virus is usually a executable file. It may be different or same for different Operating system. Most of the times virus disguise themselves as system files so that they...

How to create Privacy Monitor using Old LCD Monitor?

An Electrical Engineer "dimovi" from CutYourWay.com hacked old monitor and create a new Privacy Montior that will show Blank white screen for others except you, because you are wearing "magic" glasses!. Requirements: Old LCD Monitor  single use 3D glasses from the movie theater (old sunglasses are just fine) paint thinner (or some other solvent such as toluene,...

How to run the NTO SQL Invader in Ubuntu/Backtrack or any other Linux?

We recently published a news about NTO SQL Invader tool in our Hacking News network ,a new SQL Injection vulnerability scanner and exploiting tool.  You can download the tool from here:http://go.ntobjectives.com/l/8672/2011-12-01/DRMNIn order to get the application , you have to enter your email address. They will send the link to theapplication.I got only NTOSQLInvader_Setup.exe file. I think you know that ".exe" files works only in Windows.(You can also run the .exe files in Linux using Wine Application).So i installed the application the in Windows xp. When i launched the application , GUI is familiar one for me. Yes, it is written in Java. If it is written in java, then there will be .jar file inside the .exe file. So i extract...

powered by Blogger | WordPress by Newwpthemes | Converted by BloggerTheme