Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

WHAT IS SYSTEM HACKING

System hacking Is the process of trying to compromise the target system with
the help of the information we collected from the pre-attack phase like foot
printing and scanning.
PASSWORD CRACKING
In password cracking hackers use different kind of attacks to know the target
password so that they can easily get inside of the account of the target pc.
TYPES OF PASSWORDS
1. Passwords with only letters Ex: admin
2. Passwords with letters and numbers Ex: admin123
3. Passwords with letters and special characters Ex: admin@
4. Passwords with only numbers Ex: 1234 (ATM pins)
5. Passwords with only special characters Ex: @!#$%%^
6. Passwords with numbers and special characters Ex: 1234!@#$
7. Passwords with letters, numbers and special characters Ex: admin@123
METHODS TO CRACK PASSWORD
Key loggers
Phishing
Trojans
Dictionary Attack
Brute force Attack; etc.
DICTIONARY ATTACK
hydra L <Username List> P <Password List> <Target IP> <Port No or
Service Name>

hydra L user.txt P pass.txt <192.168.0.100> <22>


BRUTE FORCE ATTACK
hydra -l Username -V -x 4:4:aA1 <Target IP> <ssh>

hydra -l admin V x 4:4:aA1 192.168.0.100 ssh


KEY LOGGER
A computer program that records every keystroke made by a computer user,
especially in order to gain fraudulent access to passwords and other confidential
information.
METASPLOIT FRAMEWORK
A Penetration testing framework with the collaboration of the open source
community and Rapid7. Penetration testing framework, Metasploit, helps
verify vulnerabilities and manage security assessments.
msfconsole
msfvenom
msfauxiliary
msfupdate
armitage
Source : Internet

You might also like