Class 2

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

?

What
Haking
? No !

|LAwYER_|
the law
→ ☐ "ate

= →
People who take computers
programming .

Hackery follows law



Who actually the .

→ who uses the ffily .

Judicial system to find loopholes


.

lawyer =

Computer system
IProgrammingbssiblih.es#=PBsIy-bitiee
Hacker =

a
computer
?⃝
② ( Syntax Format
Lang)
Wh#hg ? Codes
=
,
Rule =

Execution
Law =

ISu-encatteehnology-SApplicah.ms#.- crime
to commit
a

⑦ Using computers Graders, criminals)

② committing?¥iies damage
that
( Hackers)
a

computer system itself


.

kiddies)
Script kiddies I script
→ .

→ Intermediate (Reverse Engineers)


→ Elite
③ trackers Item originated in late 90 's )
who uses other 's tools

.

→ Less talented
kiddies
→ 2021 -

Script .

→ People who do
piracy / Movies Software
.
, ,

Games etc. , )
→ Reverse
Engineering _p breaking copy
protection schemes .

hardware
→ Who clone software be .

|
the
¥kers :
watch the movie
"
"
"
Imitation Game
Turing the
"

1939 Alan
about
of
"

Father Modern
"

Computing WWII

He used Maths q Electron#

Machine ( Chipher
to Crack
Enigma .
uses

to transmit secret to German


messages
warships)
⑥ More original hackers :

~iT Model railroad club .

→ Donated used telephone egiipnk



Group of people setup a
Rig .

9 built a
computer like

system that allowed people


to control the
dialing tracks .

→ No modems , software involved .

All just electronics .


⑦ hi-m-E.mg :

just limited computers


to q
→ Not

programming .

→ Electronics .

→ Automobiles
→ Machines Cy Machi names

→ Electrical Appliances
Social
→ Humans (
Engineering )
- ✗ -

Pto →

twin Hack )
)
securityn-ccountsmana-gr.AM
is a database file
→ It

→ 99 ,
98 ,
XP . . . . .
>
,
8
, 8.1
,
10,11€
Windows OS
Exists
only
on


It stores local user passwords .

it also aesthete
Since windows 20A -

remote users .
1 Active Directory )
It won't work with Ms A- cements
→ .
→ It uses
cryptographic measures to prevent
unauthenticated the
system
users
accessing .

→ the user passwords are stored as

the
LM hash D) NTLM hash depends on

version of 0s
q are stored in a

hive called located at


registry SAM

C:/ Windows/
System 321 config / SAM
Disdaimer.ve/oreducationalpur.poseson#
B"# the did
It is the mistake programmer .

ValnÉf :

worst can
what
Because of the
bug ,

be done F) can happen .

E✗Ñѵageing it
happen .

You might also like