It takes only an inch in your pocket to carry a Pen Drive :-) Along this post, we’ll see how Backtrack Distro loaded into a Pen Drive or a Live CD can wreck havoc on a Windows machine in just 10 minutes.
The Backtrack Live CD can be a golden resource in bypassing the preloaded Windows XP, it cuts in a way for the hacker to gain access to your native partitions without caring about the original OS.
To perform the below experiment you need
1. BackTrack ISO. Download here
2. Some ISO Burning Program .Download Magic ISO here
3. A little common sense :-)
Aim of the article is to shed the myth about Windows XP security. Just having a copy of password protected Operating system loaded on your system doesn’t guarantee privacy.
Minute 1
Your computer is open to physical access. For some unethical reason the finds the machine worth attacking.
* The Hacker inserts bootable USB BackTrack Linux Pen Drive / or Live CD in the machine. If the default first boot device is HDD, he goes to BIOS and changes it to USB / CD
Minute 5
After setting the First boot device as USB / CD . He slices in his Backtrack Live OS CD and boots into the Backtrack GUI.
The process followed above tells the machine to skip the operating system loaded onto the HardDisk (in this case we skip MS-WinXP and to boot up BackTrack)
Minute 7
BlackHat Action one
Dump the SAM file
A Windows XP machine usually stores passwords in SAM files stored locally in the X:/WINDOWS/System32/config/system directory. The encrypted file is protected from getting copied/viewed while the user is logged on in Windows XP.
However, by booting the system using a Live CD makes the files wide accessible to the attacker.
Which can be cracked ! by using proper tools :-)
# cd /mnt/hda1/WINDOWS/System32/config
# cp SAM /temp
# cp system /temp
# cd /temp
# bkhive system key
# samdump2 SAM key > /temp/passwords.txt
Black Hat Action Two
Kill that SAM
Owing to the cryptographic limitations, a black hat hacker might not be able to crack the Password (if the length is large). In those cases he might want to remove/disable it !
In most usual cases as far as I’ve tried http://home.eunet.no/pnordahl/ntpasswd/ works great. A cracker just has to burn that .ISO image onto a blank CD and boot the system from it.
By navigating through the text menus and doing as per the onscreen instructions, it
is trivial to reset a chosen user’s password or promote an existing user to Administrator privileges.
In the above image you may see the Password reset option which resets the WinXP password to blank.
Next screenshot shows that the password has been reset to blank.
After using the machine as an administrator, the malicious hacker makes sure to restore back the original SAM file so as clean up the evidence.
# cd /mnt/hda1/WINDOWS/System32/config
# cp SAM /mnt/sda1/
# cp system /mnt/sda1/
Cleaning up the tracks to evade detection
Cracking something might be easy, and so is getting caught.
Usually , a clever black hat takes the backup of original SAM file so that he might restore these files after the attack is finished. Installing a backdoor might be easy , but chances are that the authorized administrator of the compromised system might detect it. In that case its obivious, it will be quickly closed. Popular techniques to ensure successful backdoors include to use an alredy open port. Although, well configured Windows XP keeps logs of users when they access the system and run programs. There are built in programs in Backtrack that assist in log file modification.
WHITE HAT TIP: How to Prevent this happening to you…
* Keep the HardDrives encrypted. Who knows what the attacker might do from your sensitive and personal data
* by disallowing physical access to a system by an attacker. The cardinal rule that physical access equals total access exists for a reason.
* Keep a BIOS Password and Set the HDD as the first bootable device. This’ll prevent cracker from booting your system with a Live CD or USB disk.
* Keep strong passwords. This should mitigate the risk of having the password cracked by Dictionary attacks. Moreover it’ll make the BruteForce attack infeasible.
Hail Open Source
If you like the above post , great :-) Please share .
Subscribe to:
Post Comments (Atom)
Counter
Labels
- About Domain Names (4)
- Android Hacks (2)
- Anti Yahoo booter (1)
- AOL hack (1)
- Broadband Hacking (5)
- Browser Tricks (1)
- Bsnl hack (1)
- Cell Phone Hacking (7)
- Computer hacks (24)
- Cracks/Serials (3)
- DataBase hacking (2)
- Defender (1)
- E-books for Hacking (4)
- Ethical hacking (15)
- Exciting Links.. (14)
- Facebook hack (2)
- FireFox hack (2)
- Free Downloadings (1)
- G-TALK Hacking (3)
- Gmail Hacking (2)
- Google Chrome (1)
- Google Hacking (2)
- Hack Airtel (5)
- Hack Vodafone (2)
- Hacking (62)
- Hotmail hack (3)
- Important Articles (16)
- Important Utility Softwares (35)
- Increase download speed (1)
- Innovations Articles (5)
- Intel Core i 7 (1)
- ip (2)
- ip hack (6)
- iPad (1)
- Key Logger (1)
- Lan Hacking (1)
- LInux (11)
- MegaUpload Hack (4)
- Mobile Hacks (14)
- Msn hacks (4)
- Nero (Linux) (1)
- Networking (6)
- Office (1)
- Operating Sysytems (24)
- Oracle 11g (2)
- Orkut goodies (3)
- Orkut Hacking (8)
- Password Hacking (6)
- phone unlocking (2)
- Programming softwares (3)
- Proxy (1)
- Proxy links (1)
- Rapid share hacks (10)
- Security (5)
- Skype hacking (1)
- Special Antiviruse (1)
- Theme for XP (3)
- Themes for Window 7 (1)
- Trojan (6)
- Usb Secuirty (3)
- Viruse (9)
- Website hacking (7)
- Windows 8 (2)
- Wireless Hacking (7)
- Xp Tweeks (5)
- Yahoo Hack (3)
- Yahoo messnger hack (6)
- You Tube Hack (1)
- Zapak hacking (4)
Followers
Blog Archive
-
▼
2009
(264)
-
▼
June
(61)
- New Airtel Hack for 100% free Sms
- Hack passwords with Cain and Abel
- How to find invisible users on Instant Messengers
- Rapidshare Premium link Generators (Unlimited down...
- Windows Vista Quattuor | 2.46 GBThis OS has been m...
- Windows Vista Black Eternity x86 (Genuine Version)
- 15 Tips to Improve your Linux Experience
- WEP Cracking, FBI Style( In Just 3 Minutes ) !
- Access Data of a Password Protected User in Window...
- How to safely uninstall Linux when Dual boot insta...
- How to convert Firefox into Fasterfox
- Gmail Account Hacking Tool
- Vodafone Hack for Free GPRS
- !!…Premium Accounts…!! { 16 Download Sites }
- DIY: Ripping off Windows XP using Backtrack Linux ...
- How do people boost download speed in LAN internet
- PicaSafe 2.0.207
- Nero (Linux)
- Virtual Plastic Surgery Software v.1.2
- SYMBIAN VIRUSES......
- Tools I Recommend -Must For All hackers
- The Viruse Make
- Latest Orkut hack(100% working)
- Samsung Mobile Service Center CODES
- Samsung D series hack
- Nokia All Codes
- MOTOROLLY CODES
- Mobile Secret Codes
- Mobile Cheat स्तुफ्फ NOKIA
- SAMSUNG SECRET CODES (NEW)
- BSNL hack for Internet
- Reliance Hack For free SMS
- Hack for Make FREE Calls.
- Hack Airtel Live to use Yahoo messenger for फ्री
- Mobile cheat codes fr all phones
- HowTo Use your mobile phone as a remote control fo...
- How to Make your own Linux
- Windows 7 Cheat Sheet
- Free Airtel GPRS using TeaShark Browser
- Connecting two buildings to one broadband service ...
- Build your own executable crypter
- Batch File To Disable Firewall-Windows Xp Sp2
- Tools to Automate rapid share Downloading
- Netcat Tips and Tricks
- Simple Batch Viruse explained
- How to create a backdoor using netcat
- Basics ARP Poison routing
- How does worm works
- WHAT IS CLICKJACKING
- Hack Airtel: Free Airtel Internet GPRS
- Airtel Hack for Broadband Internet- increase your ...
- Team Viewer
- Linux Mint 7 Gloria
- Why Is PCLinuxOS 2007 Better Than Ubuntu ?
- Invisible OS Boot Option - Hacking Grub
- Hacking an email
- How To Defend An Input Validation Attack
- For the Linux Novice
- Build your own network at home
- Autorun Viruse Killer!
- Make your USB drive free from virus
-
▼
June
(61)
Subscribe Via Email &Sms
Also Subscribe Via Sms Just click here to follow via
SMS
0 comments:
Post a Comment