The first thing you have to do is to locate your  dll files stored in your system. Generally you can find a lot of dll files while going through your system32 folder in your Windows folder of your Primary Partition. Now after watching so much dll files you will have to locate such files which actually performs a particular type of work which you are going to edit or configure.

 

After having to locate such file you will have to have an editor with the help of which you can open as well as edit such type of files. A popular software for helping us will be the Resource Hcker which we will be using to explain in the following topics. Download this software by clicking on the link. This is an easy to use application software for edditing Windows 32 bit applications.Actually ResourceHacker provides an easy for us to reconfigure the dll components as well the exe application as our needs without much going into the deep programming aspect.

 

How to use Resource Hacker Software

 

Note: Before editing any of your dll files please make a backup of your dll file you are edditing.

 

You can use your ResourceHacker tool for edditing any of your WIN32 dll as well as exe

applications. We can use the resources of the Windows or can even Hack it's resources and can reconfigure our Windows acording to ourself. Letus follow the step by step in regard of this.

 

  • First of all download the ResourceHacker Software and doubleclik to open it. With the Open tab you can open any of your file with extentions .dll, .exe, .ocx, .cpl and .src. But we will concentrate ourself to only .dll and .exe applications.

 

Opening a ResorceHcker

 

 

 

 

Generally you will find a lot of dll as well as exe files in your system32 folder under the Windows folder of your Primary Partition of your Drive. These dll as well exe files have many applications to be performed and can be easily configured by ResourceHacker as well.

 

Let us now first start with Hacking or reconfiguring the Logon screen during startup as we desire.

 

Hacking the Windows Logon Look During Startup.

 

Our aim is to change the general windows startup screen to a new one as shown in the figure below.

  

WindowsLogon             

 

The Screen which you see during startup are available due to an exe file lononui.exe which is being executed during startup. You will find it in the C:\WINDOWS\System32\ path of your Primary Drive. Open it with your ResourceHacker tool and you will see many items as shown in the figure below.

 

 

Now go to UIFILE and then to 1000 and to 1033. Just clicking on 1033 you can see a code written on the right side. Just replace it with the code given here. Click to Download the code. After replacing just Compile the script by clicking on the Complile Script button and save the changes made.

 

 

Now next step is to go to Bitmap and then to 100 and next to 1033. And then select the image on the right hand side and go to Action and Replace Bitmap. This will open a Popup and then click Open file with new bitmap and select the new image and click Replace. Download the BlackBeauty image here.

 

 

And it's all done just Restart your system and see the changed Logon Screen look.

 

Posted by CEOinIRVINE
l


from book:
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking
by Ronald L. Krutz and Russell Dean Vines 
John Wiley & Sons © 2008
Reconnaisance
 active: just evastroping (like sniffing or monitoring)
 passive: probes networks t get OS and available services)

Scanning
 nmap
 Nessues
 nikto/wikto
 Acutenix 
 AppScan

Acquiring Access

denial of service attacks, buffer overflow attacks, and application-based attacks

Maintaining Access

Covering tracks



Posted by CEOinIRVINE
l

Every speciality has his/her own definition for following terminology.

I will try to do my best how I got those.
Maybe I can give you some examples to understand more.
Especially in computer security field, a lot of confusing stuffs are going on.
Make it sure to keep thinking more and more.

Endurance
Passion
Efforts
lead you close to your goal.

I am still pursuing my dream/my final destination.

Let me show you more......


Terminology:

 

 

  1. Confidentiality - Ensures secrecy or privacy of information
  2. Integrity - Gurantees unauthorized modifcation of data
  3. Availability - Keep availability of data when a legitimate user want to access


 

 


Risk : Possibility! (so it should be related to ASSET, economic value, ex.. Server/Hard disk/Router/Profit)
Vulnerability : Weakness!
Threat : An event or activity! (Denial of Service, Malware, Acquisition of high sensitive data and etc.)

All the above is related to the possibility to cause harm/loss to information system/networks/assets/service/any thing else.




Hacking History
1960 MIT John Draper hacked  2600 Hz tone that allowed access to the AT&T long distance network.

1980 hackers began to share information and stolen passwords 
 e.x.) German “Chaos Computer Club.”

1982 teen ager, 414 Gang, launched attacks into the Sloan-Kettering Cancer Hospital’s medical records systems

1986 attacks were launched against U.S. classified computer systems by Germans affiliated with the Chaos Computer Club and working for the KGB
(see the movie, The Cuckoo’s Egg)

1988 Morris Worm : Hugh DOS attack over the world (he was cornel doctoral student)

1990 Kevin Poulson, with some associates, hacked a radio station’s phone system to ensure they won a call-in contest for Porsches and other prizes

1993 First defcon hacking conference in Las Vegas

1995 Kevin Mitnick (hero/notorious hacker) was convicted in 1989 for computer and access device fraud but eluded police and the FBI for more than two years while he was on probation

1995 Russian hacker Vladimir Leven and associates performed electronic transfers of $10 million to a number of international banks
(from CITIBANK!! ^_^)

2000, hackers launched Distributed DoS attacks against Yahoo!, Amazon.com, and ZDNet. Microsoft Corporation’s network was hacked in October 2000 by an attacker who gained access to software under development.





Posted by CEOinIRVINE
l