Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Class notes

BIOS Password, Windows Login Password, Changing Windows Visuals, Cleaning Your Tracks, Internet Explorer Users, Cookies, URL Address Bar, Netscape Communicator, Cookies, URL History, The Registry, Baby Sitter Programs.

Rating
-
Sold
-
Pages
31
Uploaded on
02-05-2023
Written in
2022/2023

BIOS Password, Windows Login Password, Changing Windows Visuals, Cleaning Your Tracks, Internet Explorer Users, Cookies, URL Address Bar, Netscape Communicator, Cookies, URL History, The Registry, Baby Sitter Programs.

Institution
Course

Content preview

UNIT – 3

HACKING WINDOWS
BIOS Password, Windows Login Password, Changing Windows Visuals, Cleaning Your
Tracks, Internet Explorer Users, Cookies, URL Address Bar, Netscape Communicator,
Cookies, URL History, The Registry, Baby Sitter Programs.



HACKING WINDOWS

What is Hacking Windows?

Windows Hacking is the process of exploiting a vulnerability in a Windows operating system to
gain access to a computer or network. The attacker uses this knowledge to break into the target
machine, steal sensitive information, and/or modify data on the victim’s computer. The term
“hacking” has been used for many years in different contexts. It is often referred to as “cracking”
when referring to breaking into computers or networks for malicious purposes. However, there
are other terms such as “social engineering”. Windows hacking is a way to gain access to another
person’s computer. It is done by using tools like key loggers and screen recorders, which are
used for spying on someone else’s device. These tools can be installed on the victim’s machine
without their knowledge or consent. Once they are installed, they will allow you to see
everything that happens on the victim’s computer and even take control of it remotely if desired.

Windows Hacking Tools

Windows hacking tools are used to hack Windows-based operating systems. They are mainly
used by hackers and cybercriminals for the purpose of stealing sensitive information from a
computer or network. These tools can be used to steal passwords, credit card details, banking
information, etc. Windows hacking tools are a set of software that can be used to hack into the
Windows operating system. It is also known as “Microsoft hacking tools” or “MSFT hacking
tools”.

The most used windows hacking tools are as follows:

 Nmap
 Nessus
 Nikto
 Kismet
 NetStumbler
 Acunetix
 Netsparker

,  Intruder

Effects on System

The effects of hacking a computer system can be devastating. It is possible for the hacker to gain
access to confidential information, destroy data, and even disrupt normal operations. If you have
been hacked, it is important that you take steps to protect your identity and prevent further
damage from being done by hackers.

Common attacks

Some common attacks on Windows operating system are given below:

 Buffer Overflow Attacks: A buffer overflow attack is a type of security vulnerability
that can be exploited by an attacker to gain unauthorized access to sensitive data on the
target computer. Buffer overflows are caused when a program attempts to allocate more
memory than it was designed for, or if the program does not check the size of its input
before using it. This can happen in many ways and usually occurs as a result of
programming errors or bugs in software.
 DDoS: DDoS attacks are a type of cyber-attack in which hackers use botnets to send
large amounts of traffic toward a website or service. The goal is to overwhelm the target
with an overwhelming amount of data so that it becomes unusable for legitimate users.
This can be done by flooding the target’s network with requests from multiple sources
and then directing them all to one single IP address.

Countermeasures

 Physical security of your computer.
 Software security of your computer (i.e., software to prevent someone from accessing
your computers, such as firewalls and antivirus programs)
 The only countermeasure against Windows hacking in Ethical Hacking is to ensure that
software is secure and robust against various types of attacks.
 Performing Windows hacking in Ethical Hacking will show you whether the software
being tested is robust enough, and if it isn’t, it will teach you how to make the software
more robust.



BIOS PASSWORD

What is BIOS password ?

A BIOS password is authentication information that is sometimes required to log into a
computer's basic input/output system (BIOS) before the machine will boot up.

,BIOS is the program a computer's microprocessor uses to control the computer's initial boot
sequence and hardware initialization. The BIOS password is stored in complementary metal-
oxide semiconductor (CMOS) memory. In some computers, a small battery attached to the
motherboard maintains the memory when the computer is off.

Because it provides an extra layer of security, a BIOS password can help prevent unauthorized
use of a computer. A BIOS password can also be a liability, however, because if the computer
owner forgets his password or a corporate user hands in his machine without disclosing the BIOS
password, the computer will not boot up.

A BIOS password can be reset by contacting the vendor for directions. Resets typically involve
the use of backdoor BIOS passwords. These are passwords created by the BIOS manufacturer
that will work no matter what password the user has set up. User-created passwords can
sometimes be cleared by removing the CMOS battery or by using special BIOS password
cracking software.

Basic BIOS password crack

This is a password hack but it clears the BIOS such that the next time you start the PC, the
CMOS does not ask for any password. Now if you are able to bring the DOS prompt up, then you
will be able to change the BIOS setting to the default. To clear the CMOS do the following:

Get DOS prompt and type:

Code:


DEBUG hit enter
-o 70 2e hit enter
-o 71 ff hit enter
-q hit enter
exit hit enter




Restart the computer. It works on most versions of the AWARD BIOS.

 Accessing information on the hard disk

When you turn on the host machine, enter the CMOS setup menu (usually you have to press F2,
or DEL, or CTRL+ALT+S during the boot sequence) and go to STANDARD CMOS SETUP,
and set the channel to which you have put the hard disk as TYPE=Auto, MODE=AUTO, then
SAVE & EXIT SETUP.

Now you have access to the hard disk.

,  Standard BIOS backdoor passwords

The first, less invasive, attempt to bypass a BIOS password is to try on of these standard
manufacturer's backdoor passwords:

AWARD BIOS

AWARD SW, AWARD_SW, Award SW, AWARD PW, _award, awkward, J64, j256, j262,
j332, j322, 01322222, 589589, 589721, 595595, 598598, HLT, SER, SKY_FOX, aLLy, aLLY,
Condo, CONCAT,

TTPTHA, aPAf, HLT, KDD, ZBAAACA, ZAAADA, ZJAAADC, djonet, %øåñòü ïpîáåëîâ%,
%äåâÿòü ïpîáåëîâ%

AMI BIOS

AMI, A.M.I., AMI SW, AMI_SW, BIOS, PASSWORD, HEWITT RAND, Oder

Other passwords you may try (for AMI/AWARD or other BIOSes)

LKWPETER, lkwpeter, BIOSTAR, biostar, BIOSSTAR, biosstar, ALFAROME, Syxz, Wodj

Note that the key associated to "_" in the US keyboard corresponds to "?" in some European
keyboards (such as Italian and German ones), so -- for example -- you should type AWARD?SW
when using those keyboards. Also remember that passwords are Case Sensitive. The last two
passwords in the AWARD BIOS list are in Russian.

 Flashing BIOS via software

If you have access to the computer when it's turned on, you could try one of those programs that
remove the password from the BIOS, by invalidating its memory. However, it might happen you
don't have one of those programs when you have access to the computer, so you'd better learn
how to do manually what they do. You can reset the BIOS to its default values using the MS-
DOS tool DEBUG (type DEBUG at the command prompt. You'd better do it in pure MS-DOS
mode, not from a MS-DOS shell window in Windows). Once you are in the debug environment
enter the following commands:

AMI/AWARD BIOS

Code:

O 70 17
O 71 17
Q

Written for

Institution
Course

Document information

Uploaded on
May 2, 2023
Number of pages
31
Written in
2022/2023
Type
Class notes
Professor(s)
Keerthiraaj,ap/iot
Contains
All classes

Subjects

$8.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
startech1

Get to know the seller

Seller avatar
startech1 Manakula Vinayagar Institute of Technology
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
3 year
Number of followers
0
Documents
4
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions