0% found this document useful (0 votes)
45 views

Seminar On Hacking

This document summarizes a seminar on hacking that covered the following topics: - Definitions of hacking, different types of hackers (white hat, black hat, gray hat) and passwords - Methods of hacking Windows passwords and how to create backdoors - SQL injection attacks - References and resources for further information on hacking - An invitation for questions about the content of the seminar
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
45 views

Seminar On Hacking

This document summarizes a seminar on hacking that covered the following topics: - Definitions of hacking, different types of hackers (white hat, black hat, gray hat) and passwords - Methods of hacking Windows passwords and how to create backdoors - SQL injection attacks - References and resources for further information on hacking - An invitation for questions about the content of the seminar
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Seminar On

Hacking
By : Attar Ubed S.
SRES COE Kopargaon

Guide : Prof : Hitesh Mohatra. M . Tech, From :

INDEX
What

is Hacking? Types of Hacker. Types of Password. (for Operating System) Windows Password Hacking. Back Door Attack. Sql Injection. Reference. Any Query?

Ethical Hacking :
Legal or Illegal ?

Types of Hacker :
As

Per Work

White Hat Hacker. Black Hat Hacker. Gray Hat Hacker.

As

Per Knowledge

Scripteds. Admins. Coaders.

As Per Work :
White Hat Hacker. Work for Good Purpose. Black Hat Hacker. Work for Bad Purpose. Gray Hat Hacker. Combination Of Both White as well as Black Hat Hacker.

Types of Password :
(for Operating System)
Login

Password. Bios Password. Boot Password. Syskey Password. Biometric Password.

Windows Password Hacking :

By Using Following Command we Remove The Password Without Knowing Previous Password.

net user <User Name> *

controlluserpasswords2

Back Door Attack :


Creation of Back Door :
Copy Sethc File . Location of Sethc.exe File Is : C:\windows\system32\sethc.exe Copy Cmd File & Paste at any Location For Rename. Rename It As Sethc. Again Paste it On Previous Location.

Sql Injection.
E.g.

Username : 1 or 1 = 1

Password : 1 or 1 = 1

Reference :
Hacker Gavrav

Pawar. www.cybercure.in www.google.in

Any Query
???

Thanking
You!!!

You might also like