0% found this document useful (0 votes)
37 views

Notes by Ayush Singh Iimt Meerut

This document discusses window hacking and security. It explains that hashes are encrypted data that convert a password into a mixture of numbers and letters in a one-way process. The SAM (Security Accounts Manager) stores Windows passwords offline in hashed form. Konboot software can be used to create a bootable USB drive that allows accessing a computer without knowing the correct password by overriding the hashed password during boot.

Uploaded by

28ayushsingh01
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views

Notes by Ayush Singh Iimt Meerut

This document discusses window hacking and security. It explains that hashes are encrypted data that convert a password into a mixture of numbers and letters in a one-way process. The SAM (Security Accounts Manager) stores Windows passwords offline in hashed form. Konboot software can be used to create a bootable USB drive that allows accessing a computer without knowing the correct password by overriding the hashed password during boot.

Uploaded by

28ayushsingh01
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Window hacking & security

 Hacking comes first, security next.

Q. what is Hashes?
=> This is actually encrypted data, it basically converts
our password in mixture of (0 to 9 and a to f) .
Hashing is one way process it can’t convert back to
clear text.

Simple text (ayush)  Hashes(7ef5b1)

SAM (security accounts manager)  store windows


passwords(offline passwords of window store here).

PATH: c:\windows\system32\config

 It just use after window boot & that time we can’t


perform any other task due to window security.
 It can’t open, copied, renamed, deleted from
computer.
 It can’t accessible.
 It store our window password in the form of hashes
that’s why it can’t be accessible.
 When we type our password on lock screen then on
that time password converts into hashes and SAM
uncle matches that hashes to that stored hashes in
computer file , if hashes are matched then window get
opened if not then window shows you incorrect
password.

PASSWORD SET METHOD USING CMD

When pc opened:>

START CMD OPEN COMMAND net user


“AYUSH” *

When pc is locked:>

 Make bootable pendrive by using konboot software.


 Plug your pendrive in your pc .
 Open konboot folder in your pc & select konboot usb.
 Select usb install.bat  run as administration and selsct
your usb after it install you are ready to go , plug out
your pendrive from pc.
 USB plug on your friends pc whom you want to hack.
 After USB plug  power on  and press repeatly f12 for
boot menu  in boot menu choose USB and wait for
magic..
 All goes normally but when you type any password 
window get opened.
 It works like when you enter anything in password box
then on that time konboot make your typed password
hashes and hide that real password hashes set by your
friend and its shows your hashes on that place and
when window matches that password hashes then it
matched and window get open and you can access
anything from your friend computer .
 After your work get done just shutdown your friend pc
and plug out that pendrive.
 When your friend start his/her laptop then it boot from
hard drive automatically & his / her password will work
on their pc.
 This is because when we plug USB then konboot starts
working and by this we would able to hide hashes but
when we boot it from hard drive only SAM uncle works.

You might also like