Thursday, July 11, 2013

The Keylogger

Keyloggers are fun tools to use and are very simple to use. An experienced user may notice these loggers on their computers but most keyloggers will run without anybody knowing, even if they show up on the task manger. Sure keyloggers can be fun pranks for your friends but putting keyloggers on others PCs or public PCs can be illegal. The keylogger is the easiest way to get password and username information, without directly hacking their computer. There are many keyloggers out there and you can download some to see how they work. Keyloggers have a bunch of variations, each used for different purposes. The keylogger is the ultimate tool to steal passwords, pins, and more. Even if you are not a grade A super hacker, keyloggers are a quick to test out what some programs out there can do. Check your task bar, if its not to late.....




hello from 2022

youtube.mp3

I think that it is ethical to download music from youtube depending on what and why you download it. First off, I feel if you already own the music but do not want to copy the files on your cd you should be ethically able to do so, you already own the files. Second, if you are downloading a song/cover/video that you cannot buy by any means I feel that you should be able to do so and should be free to. Finally, if you are slightly 'unethical' I feel that even though in some ways it may be wrong, you should be able to download any youtube video you want if you do not share nor republish it. I would use this service every now and again if one of the above reasons applied. I feel that youtube is public and that youtube.mp3 should not be pulled down. Youtube will also be pirated and because of this there is no reason to waste time taking it down. If the definition of ethical is 'morally correct,' then there really isn't any common definition of what ethical actually means, everyone's morals are different. 

Friday, July 5, 2013

Deleting the Task Manager

Today we really got into malware and hacked a couple of computers in different ways. I started out by adding something on a computer and then using another computer went to a ip webpage that allowed me to view processes, see system stats, and more. In addition I was able to delete or execute almost all programs on the machine. Next I created my own virus can could do several different things, even change into a worm to infect the computer. Today I did a bunch of things that was highly illegal. Well that is, if I do it outside this classroom.

Thursday, July 4, 2013

Cracking and Calculators

I did two interesting things lately. First I used a program called LCP to crack passwords for a certain computer. I was able to crack passwords for the admin along with other different users on the device. The admin took only about three minutes, which means that it is pretty easy to hack, especially if you have a fairly simple password. The next lab I did was very interesting. In this lab I was able to hide files in other files. In this one I hid the calculator app in a notepad document on the desktop. Whenever I opened the notepad file, a bunch of characters were there, the hidden calculator. I then was able to extract the calculator out of the file and put it in the correct spot. That's all for now. More posts coming soon.

Wednesday, July 3, 2013

Zenmap and Nmap

Zenmap and Nmap are similar programs that I used today to attack a windows 2003 PC. They both have very similar processes and procedures for doing this. Nmap mostly deals with TCP, looking for open ports and obtaining information such as port names, (which is helpful to find out what process occurs), port numbers, and a list of the other ports that may be open. This is a useful tool and simple to use. Zenmap will allow you to attack/ obtain different information that you would obtain from Nmap. In Zenmap you can also change the search intensity depending on what you want to find. However, when using these two programs you may want to be sure you're not breaking any laws.