0% found this document useful (0 votes)
64 views13 pages

Hacking Windows

The document discusses various methods for gaining unauthorized access to Windows operating systems with physical access, including using key combinations to launch programs before login, replacing system files, and using live CDs like BackTrack to access and manipulate files without needing to login. It provides instructions for burning an ISO file to create a BackTrack live CD/DVD and accessing the BIOS if needed.

Uploaded by

Kamila Ramayeva
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views13 pages

Hacking Windows

The document discusses various methods for gaining unauthorized access to Windows operating systems with physical access, including using key combinations to launch programs before login, replacing system files, and using live CDs like BackTrack to access and manipulate files without needing to login. It provides instructions for burning an ISO file to create a BackTrack live CD/DVD and accessing the BIOS if needed.

Uploaded by

Kamila Ramayeva
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

2 Defense against the Black Arts

when.you.have.the.legal.and.written.permission.of.the.person.or.organization.you.are.assisting..In. summary,.hacking.is.a.fun.hobby.that.can.turn.into.a.lucrative.career.as.long.as.you.stay.on.the. good.side.of.the.law.

Physical Access
Many.people.within.the.computer.industry.have.the.opinion.that.security.does.not.count.when. an.attacker.has.physical.access.to.your.computer..I.strongly.disagree.with.that.opinion;.security. always.counts.especially.when.an.attacker.is.able.to.get.physical.access.to.your.box..It.does.not. have.to.be.game.over.just.because.an.attacker.gets.physical.access.to.your.machines..There.are. measures.you.can.take,.such.as.disk.encryption,.to.secure.your.computers.from.physical.attack.. This.chapter.will.discuss.what.measures.can.be.taken.to.secure.a.Microsoft.Windows.operating. system.and.how.vulnerable.these.systems.can.be.when.proper.precautions.are.not.taken. The.majority.of.people.who.approach.a.computer.at.a.Windows.logon.screen.are.halted.in. their.tracks..The.average.individual.figures.that.without.the.username.and.password,.there.is.no. chance.of.getting.into.the.system..A.skilled.hacker.with.physical.access.should.be.able.to.break. into.a.Windows.operating.system.in.less.than.5.minutes..When.a.hacker.sees.this.logon.screen,. they. know. there. are. several. tools. they. can. use. to. easily. get. into. this. system.. This. chapter. will. discuss.several.ways.to.get.into.a.Windows.operating.system.without.having.the.username.or.the. password.

At.the.Windows.logon.screen,.you.are.required.to.press.Control-Alt-Delete.to.logon.to.the. system..If.you.are.at.the.Welcome.screen,.you.just.need.to.click.on.the.users.name.then.type.in.the. password.(if.one.is.required)..Average.users.believe.that.control-alt-delete.is.the.only.key.sequence. that.can.be.used.at.this.screen..Hackers.think.differently;.they.know.that.hitting.shift.five.times. will.invoke.sticky.keys,.and.hitting.the.Windows.key.and.the.U.key.will.invoke.the.utility. manager.

Hacking Windows OS 3

These.key.sequences.work.in.Windows.2000,.XP,.2003,.Vista,.2008,.and.Windows.7..Sethc. .exe.and.Utliman.exe.are.the.files.associated.with.these.Windows.programs.that.can.be.launched. prior. to. logon.. The. Windows. operating. system. can. be. easily. hacked. by. locating. these. files. in. %SYSTEMROOT%\system32.and.replacing.them.with.other.known.good.Windows.files.like. cmd.exe.or.explorer.exe..This.chapter.will.guide.you.on.how.to.use.a.Live.CD.to.perform.these. steps..However,.before.you.embark.on.hacking.Windows.you.will.need.to.know.how.to.burn.an. ISO,.or.disk.image.file.

Live CDs
There.are.a.large.variety.of.Live.CDs.that.can.be.utilized.to.assist.you.in.your.quest.for.Windows. domination..A.Live.CD.is.a.special.utility.that.can.run.an.entire.operating.system.from.the.CD,. and. allow. the. user. to. access. and. manipulate. files. on. the. hard. drive.. The. website. http://www. ..ivecdlist.com.provides.a.good.list.of.many.popular.Live.CDs.and.links.to.download.the.ISO.files. l

4 Defense against the Black Arts

Live.CDs.are.extremely.useful.tools.that.can.be.utilized.by.individuals.with.good.and.bad. intentions..A.Live.CD.will.allow.network.administrators.to.run.Linux.on.their.system.without. installing.it.or.changing.any.of.their.systems.configurations..Law.enforcement.can.use.Live.CDs. like.HELIX.or.KNOPPIX.to.acquire.a.forensically.sound.copy.of.a.hard.drive..Pentesters.can.use. a.distribution.like.BackTrack.to.scan.networks.and.computers..And,.any.Live.CD.with.a.browser. can. be. utilized. by. individuals. who. want. to. surf. the. net. without. leaving. any. artifacts. on. their. harddrive.

Just Burned My First ISO


To.complete.the.exercises.in.this.book,.I.recommend.that.you.download.the.BackTrack.4.DVD.. BackTrack.is.one.of.the.most.popular.Live.CD.distributions.available,.and.it.has.many.of.the. tools.needed.to.perform.the.exercises.in.this.book..The.DVD.was.compiled.by.Mati.Aharoni,. who.provides.several.training.courses.on.how.to.use.the.tools.of.BackTrack..The.training.site.for. BackTrack.is.http://offensive-security.com,.and.the.download.site.for.the.ISO.file.is.http://www .backtrack-linux.org/..Paste.this.link.in.your.browser:.http://www.backtrack-linux.org/. ownloads/.. d Then,.click.the.download.link.to.download.the.BackTrack.4.Beta.DVD..BackTrack.4.Beta.and. BackTrack.3.are.ideal.for.performing.these.exercises.because.they.automount.drives.

Notice.that.there.is.an.MD5.value.to.the.left.of.the.download.link..This.value.will.help.us. ensure.that.the.ISO.file.has.not.been.tampered.with.in.transit..Hash.values.such.as.MD5.will.be. discussed.in.more.detail.in.Chapter.3..Just.to.be.sure.your.file.was.not.tampered.with.during.the. download.process,.download.a.hashing.tool.for.Windows,.like.md5deep..Download.and.install. MD5Win32.msi.from.http://pank.org/ftp/windows/..Navigate.to.the.location.on.your.hard.drive. where.you.downloaded.bt4-beta.iso..Right.click.on.the.ISO.and.select.hash.file..The.hash.of.the. bt4-beta.file.should.match.the.hash.listed.on.the.website..Mathematically,.the.chance.that.these. files.are.different.is.1.in.1128.

Hacking Windows OS 5

Once.you.have.downloaded.the.ISO.file,.you.will.need.some.type.of.burning.software..Nero. Burning.Rom.is.one.of.the.best.burning.suites.available..However,.it.is.not.a.free.product..(Nero. does.offer.a.free.trial.version.if.you.go.to.their.website.at.http://www.nero.com.).There.are.also. many.free.burning.programs.that.work.quite.well..Imgburn.is.a.graphical.user.interface.(GUI). application.that.allows.users.to.burn.or.create.ISO.files..It.can.be.downloaded.from.http://www. .imgburn.com..The.five.steps.for.burning.the.BackTrack.4.ISO.are.as.follows: . 1..Download.the.bt4-beta.iso.file.from.http://www.backtrack-linux.org/downloads/. . 2..Download.and.install.the.ImgBurn.program.from.http://www.imgburn.com/. . 3... pen.the.ImgBurn.program.and.select.Write.image.file.to.disc. O

. 4..Insert.a.blank.DVD.into.your.system. . 5..To.select.the.image.file.source,.click.the.browse.button,.navigate.to.the.location.on.your. hard.drive.where.you.downloaded.the.bt4-beta.ISO.file,.and.click.open..Click.OK..Click. the.Write.image.to.CD.picture.

6 Defense against the Black Arts

When.the.burning.process.in.finished,.the.media.will.automatically.eject.from.your.system..You. can.now.use.the.media.as.a.bootable.Live.CD/DVD.

Before You Start


If.you.are.going.to.use.tools.to.break.into.someones.operating.system,.make.sure.you.have.the.permission.of.the.computers.owner..Accessing.someones.computer.system.without.their.permission. is.an.unlawful.act..Many.people.who.are.labeled.as.hackers.work.in.the.computer.security.field;. turning.something.you.enjoy.doing.for.fun.into.a.full.time.job.is.not.a.bad.idea..Many.of.the.jobs. in.the.information.technology.field.require.a.security.clearance..There.are.several.levels.of.security. clearance;. some. even. require. polygraphs.. Obtaining. a. security. clearance. will. require. some. type. of.background.investigation..One.of.the.categories.that.can.exclude.you.from.receiving.a.security. clearance.is.the.misuse.of.information.technology.systems..This.includes.the.illegal.or.unauthorized. entry.into.an.information.technology.system..So,.use.your.hacker.toolbox.only.to.break.into.systems.that.you.have.been.granted.permission.to.access.or.computers.in.your.home.test.lab. Most.computers.will.boot.to.a.CD.or.DVD.without.making.any.modifications.to.the.BIOS.. If.a.computer.will.not.boot.to.the.BackTrack.DVD,.you.may.need.to.make.modifications.to.your. systems.BIOS..On.most.modern.computers,.if.you.press.the.F8.key.as.soon.as.you.turn.the.computer.on,.you.will.be.provided.with.a.boot.option.menu..From.this.menu,.choose.the.CD/DVD. drive..If.pressing.F8.does.not.provide.you.with.a.boot.option.menu,.or.your.want.to.permanently. change.the.boot.order.of.the.devices.in.your.system,.you.will.need.to.access.the.computers.BIOS.. The.BIOS.setup.screen.is.accessed.when.a.computer.is.first.turned.on.by.hitting.a.key.or.a.series.of. keys.(usually.F1,.F2,.or.Delete)..When.first.turned.on,.the.computer.usually.indicates.what.the.key. sequence.is.to.enter.the.BIOS..If.you.encounter.a.machine.where.you.are.unable.to.get.BIOS.on. a.machine,.do.some.googling.with.the.name.of.the.computer.manufacturer.to.find.the.necessary. sequence.for.the.machine..A.lot.of.valuable.information.can.be.gained.or.discovered.by.using.the. search.engine.Google..For.example,.if.you.were.looking.to.find.out.how.to.enter.the.BIOS.on.a. Dell.Power.Edge,.type.that.into.Google,.without.quotes..Sometimes,.the.answer.can.be.located. more.quickly.by.finding.a.forum.instead.of.going.to.the.manufacturers.website.

In.some.situations,.the.computers.BIOS.is.password.protected..There.are.several.ways.that. hackers,.or.computer.technicians.for.that.matter,.can.reset.the.BIOS.password..Sometimes.there. is.a.small.jumper.on.the.motherboard.located.close.to.the.CMOS.battery,.as.seen.in.Figure.1.2.. If.the.jumper.is.pulled.the.password.will.be.reset..If.a.jumper.is.not.present,.the.CMOS.battery. has.to.be.pulled.from.the.machine..The.amount.of.time.that.the.battery.must.be.removed.from. the.system.can.vary.

Hacking Windows OS 7

Figure 1.2 CMOS jumper on the motherboard to reset the BIOS password.

There.is.a.disadvantage.to.a.hacker.removing.a.jumper.or.taking.the.battery.out.to.get.into. the.BIOS;.if.a.password.has.been.changed,.the.person.who.set.the.password.will.know.that.the. BIOS.has.been.reset..For.example,.a.colleague.of.mine.changed.the.settings.on.his.computer.that. required.users.to.enter.a.BIOS.password.in.order.to.start.the.system..It.seemed.he.did.not.want.his. wife.or.kids.using.his.high-end.system..I.explained.to.him.that.if.the.CMOS.battery.or.jumper. was.removed,.they.would.be.able.to.get.into.his.system..He.agreed.that.methods.exist.to.reset. the.BIOS.password;.however,.if.his.password.was.reset.he.would.know.his.system.was.accessed.. A.more.stealthy.way.for.a.hacker.to.enter.the.BIOS.is.to.use.a.default.or.backdoor.password.. There.are.lists.of.BIOS.passwords.that.can.be.retrieved.from.the.Internet.using.Google..One.of.the. most.effective.ways.to.keep.people.from.resetting.BIOS.passwords.is.to.lock.the.computer.case.. While.most.computer.case.locks.can.be.picked.fairly.easily,.this.technique.can.be.used.as.a.deterrent.to.prevent.someone.from.changing.BIOS.settings.like.boot.order..However,.keep.in.mind. that.even.if.the.case.is.locked,.if.someone.has.a.backdoor.or.default.password,.locking.the.system. will.not.prevent.them.from.accessing.the.system..A.simple.lock.on.the.computer.will.not.thwart. a.determined.attacker. After. opening. the. case. of. some. newer. computers,. you. may. receive. a. Chassis. Intrusion. Detected.message.when.you.put.the.cover.back.on.and.power.on.the.machine..Chassis.intrusion. messages.are.an.annoying.feature.included.in.some.newer.BIOS.versions..In.most.cases,.the.. hassis. c intrusion.cable.is.plugged.into.a.jumper.on.the.motherboard..If.you.unplug.the.cable.from.the. jumper.on.the.motherboard.and.place.a.new.jumper.(you.can.always.find.extras.on.old.motherboards,.cards,.or.hard.drives),.the.alarm.should.not.go.off.any.more..Sometimes,.several.reboots. will.be.necessary. After.entering.the.BIOS,.a.user.can.navigate.around.by.using.the.arrow.keys.(not.by.using. the.mouse)..Manufactures.may.have.opted.for.use.of.the.keyboard.only.in.the.BIOS.screen. to. keep. novice. users. from. changing. important. BIOS. settings.. One. incorrect. BIOS. setting.

8 Defense against the Black Arts

could.result.in.the.computer.not.booting..The.layout.of.the.BIOS.utility.will.vary.depending. on.the.manufacturer..Most.BIOS.screens.have.a.setting.referred.to.as.Boot.Device.Priority,. Boot,.Startup.Sequence,.or.a.similar.type.setting..The.way.to.change.the.boot.order.will.also. vary. depending. on. the. BIOS. manufacturer.. On. the. BIOS. of. some. systems,. hitting. Enter. after.selecting.the.first.boot.device.will.pull.up.a.menu.that.allows.you.to.select.from.a.list. of.choices.that.can.become.the.new.first.boot.device..Other.BIOS.setup.screens.require.users. to.use.the.up.and.down.arrow.until.you.get.all.of.the.devices.in.the.order.you.desire..Ifthe. hacker. is. booting. to. a. CD. or. DVD,. the. DVD. drive. should. be. the. first. device. in. the. boot. order.

On.modern.computers,.the.USB.thumb.drive.is.also.a.boot.choice,.and.this.option.is.quickly. becoming. popular.. Once. the. BIOS. settings. have. been. changed,. the. Save. Changes. and. Exit. selection.needs.to.be.located.from.within.the.BIOS.menu..This.task.can.usually.be.accomplished. by.hitting.the.F10.key.on.most.systems..Once.the.BIOS.has.been.modified.to.boot.to.the.proper. device,.you.can.boot.to.your.BackTrack.DVD.or.other.Live.CD.

Utility Manager
The.Utility.Manager.was.designed.to.help.people.with.disabilities..For.this.next.exercise,.your. victim.computer.should.be.running.any.of.the.following.Microsoft.Windows.operating.systems:.Windows.Vista,.Windows.2008.Server,.or.Windows7..This.attack.can.even.be.launched. against.systems.utilizing.Smart.Card.and.fingerprint.readers..If.the.computer.is.off,.turn.it.on. and.insert.the.BackTrack.DVD.immediately..If.the.. omputer.is.presently.at.the.logon.screen,. c insert.the.DVD.and.click.the.shutdown.button..If.the.shutdown.selection.is.not.available,.you. will.need.to.put.the.DVD.in.the.drive.and.reset.the.computer..If.the.computer.does.not.have. a.reset.button,.just.power.it.off.and.power.it.back.on.again.

Hacking Windows OS 9

Use.the.following.steps.to.break.into.the.Windows.7.operating.system: . 1..Select.BT4.Beta.Console.at.the.Boot.menu.

. 2..At.the.BackTrack.4.Beta.menu,.login.as.root.with.the.password.of.toor..Then.type.startx.to. launch.the.GUI.

. 3..Launch.the.terminal.by.clicking.the.black.icon.to.the.left.of.the.Firefox.icon.

10 Defense against the Black Arts

. 4..View.the.Windows.7.partitions.by.typing.the.command.fdisk.l..Typically,.you.will.see.one. NTFS.partition.for.Windows.Vista.operating.systems.and.two.partitions.for.Windows.7.operating. systems..Even.though.the.device.is.listed.as./dev/sda2,.it.is.mounted.on.the.system.as./mnt/sda2.. . . Note:. For.Vista.and.XP,.it.will.be./dev/sda1.

. Note:. If.the.computer.has.IDE.(older).drives.as.opposed.to.SATA.drives,.Linux.displays. those.disks.as.hda.instead.of.sda..Replace.sda.with.hda.in.Steps.5,.6,.and.10. . 5..Look.for.the.Windows.directory.by.typing.ls./mnt/sda2.

. Note:. If.you.do.not.see.the.Windows.directory,.try.ls./mnt/sda1,.ls./mnt/sda3,.and.so.on,. until.you.see.the.directory..Some.computer.manufactures.add.additional.partitions.for.utilities.and.restoration.purposes. . 6..Change.to.the.Windows.directory.by.typing.cd./mnt/sda2/Windows. . . Note:. Linux.is.case.sensitive,.so.you.need.to.use.the.correct.case. . 7..The.Utilman.exe.file.is.located.in.the.System32.directory..Type.the.ls.command.once.again. to.list.the.contents.of.the.Windows.directory.

Hacking Windows OS 11

. 8..Go.into.the.System32.directory.by.typing.the.command.cd.System32..Keep.in.mind.once. again.that.Linux.is.case.sensitive,.so.you.must.type.the.directory.as.you.see.it.printed.on.the. screen.

9..The.System32.directory.is.the.primary.location.for.most.of.the.Windows.executables..One. of.these.executables,.Utilman.exe,.launches.the.Utility.Manager..Luckily,.this.application. can.be.launched.prior.to.logon..During.this.step.Utilman.exe.is.renamed.to.Utilman.bak. in.case.the.correct.file.needs.to.be.restored..Then.a.new.Utilman.exe.is.created.by.copying. the.cmd.exe.file.and.renaming.it.Utilman.exe..When.the.user.reaches.the.logon.screen.and. they. invoke. the. Utility. Manager,. a. command. prompt. will. launch.. Rename. Utilman.exe. Utilman.bak.by.typing.mv.Utilman.exe.Utilman.bak..Copy.the.cmd.exe.file.by.typing. cpcmd.exe.Utilman.exe.

. 10..Change. back. to. the. root. directory. by. typing. cd. /root.. Next,. unmount. the. partition. by. typing.umount./dev/sda2..Note.that.the.command.to.unmount.is.umount,.not.unmount.. Type.eject,.remove.the.DVD.and.close.the.tray.. . . Note:. Eject. does. not. work. in. VMware.. Type. reboot. to. restart. your. computer. to. your. Windows.7.operating.system.

. 11..To.invoke.the.Utility.Manager,.either.press.the.Windows.key.and.the.letter.U.or.hit.the.blue. Ease.of.Access.button.in.the.bottom.left.hand.corner.of.the.screen..A.command.prompt. should.be.displayed..Notice.that.the.title.of.the.command.prompt.is.C:\Windows\system32\ utilman.exe.

12 Defense against the Black Arts

. 12..When.the.internal.command.set.is.typed,.the.username.displayed.is.SYSTEM..

The.six.integrity.levels.in.Windows.7.and.Vista.are.listed.below.in.order.from.highest.to.lowest: . . . . . . . 1.. 2.. 3.. 4.. 5.. 6.. Installer.(software.installation) System.(system.processes) High.(administrators) Medium.(user) Low.(Internet.Explorer.when.protected.mode.is.enabled) Untrusted.(lowest.level)

Even.though.User.Account.Control.is.enabled.on.the.exploited.machine,.the.second.highest. level.of.privilege.has.been.obtained.(without.clicking.the.allow.button)..Once.a.command.prompt. has.been.obtained,.havoc.can.be.wreaked.on.the.exploited.system..Some.of.the.tasks.that.can.be. accomplished.include . Adding.a.user . Enabling.and.disabling.users

Hacking Windows OS 13

. . . . . . . . . .

Changing.user.passwords Adding.users.to.the.administrators.group Changing.the.registry Starting.and.stopping.services Scheduling.services Copying,.adding,.or.deleting.files.and.folders Modifying.date.and.time.stamps Starting.services.that.allow.users.to.connect.remotely Changing.port.numbers.for.remote.services Disabling.the.firewall

All.of.these.tasks.will.be.discussed.throughout.the.chapters.in.this.book..The.. et.user.comn mand.can.be.utilized.to.create,.activate,.and.delete.users.as.well.as.change.their.passwords..The. net.localgroup.command.can.be.used.to.add.users.to.the.administrators.group..The.following.is. a.list.of.net.commands.used.to.manipulate.user.accounts.on.the.system.from.the.command.line: . net.user.hax0r.Pa$$w0rd./add:.Adds.a.user.account.called.hax0r.with.the.password. of.Pa$$w0rd. . net.localgroup.administrators.hax0r./add:.Adds.the.user.hax0r.to.the.administrators. group..The.name.of.the.group.is.administrators.with.an.s,.not.administrator. . net.user.administrator./active:yes:.Activates.the.administrator.account,.which.is.disabled.by.default.on.Windows.Vista.and.Windows.7..The.administrator.account.is.active. on.Windows.Server.2008. . net.user.administrator.Pa$$w0rd:.Gives.the.administrative.user.account.the.password. of.Pa$$w0rd. . net.user.administrator./comment:.You.are.0wnd:.Gives.the.administrator.account. the.comment.You.are.0wnd. . net.user.guest./active:yes:.Activates.the.guest.account,.which.is.disabled.by.default.on. all.Windows.versions.(except.95,.98,.and.ME,.where.it.does.not.exist). . net.guest.Pa$$w0rd:.Gives.the.guest.user.account.the.password.of.Pa$$w0rd. . net.localgroup.administrators.guest./add:.Adds.the.user.guest.to.the.administrators. group.

14 Defense against the Black Arts

. 13..Most. tasks. that. a. user. completes. using. a. GUI. can. also. be. completed. from. a. command. prompt.. Many. times,. a. hacker. will. not. have. access. to. a. GUI.. In. order. to. be. effective,. the. skilled. hacker. will. need. to. be. able. to. complete. most. tasks. from. a. command. line.. If. the explorer. command. is. invoked. at. the. C:\Windows\system32\utilman.exe. prompt,. the. Windows.Explorer.will.be.displayed..Notice.that.SYSTEM.is.listed.as.the.logged-on.user.

After. opening. the. Windows. Explorer,. by. clicking. on. the. Pearl. (Start). and. right. clicking. on. Computer,.the.Computer.Management.console.can.be.opened..By.clicking.the.Users.folder.under. Local.Users.and.Groups,.the.users.that.were.created.and.managed.at.the.command.line.will.be.displayed..Additional.users.can.also.be.created.and.managed.from.the.Local.Users.and.Groups.console.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy