Video On How To Hack A PC
Title
-----------------
Video On How To Hack A PC
Hacking Video - Education Or Marketing Tool?
-----------------
I sat in my office for about thirty minutes trying to decide if
I was going to write this article. I finally came to the
conclusion that I would since this information is already freely
available on the Internet, and in fact, was posted as part of a
government article.
(http://www.demosondemand.com/clients/fiberlink/002/page/in This
video dex_new.asp), part of a sales and marketing strategy (Or,
maybe just public awareness and education) to sell a product
called Fiberlink Extend360, literally walks you through the
steps you need to take to hack a PC on a wireless network. Not
only is it demonstrated in video, it is fully narrated.
Connecting To The Target PC
-----------------
The video shows you what tools to use to scan a wireless
network, determine the user accounts, determine if account
lockout is on or off, how to attach to the PC using the null
session attachment, and how to use a compiled exploit tool to
gain command access to the target PC.
Shutting Down Anti-Virus Software
-----------------
At this point, they go on to explain how to shut down the target
PC's anti-virus software, all along referencing their product
(although to be fair they also mention patches and other basic
security measures), and how if you had it, this attack would not
be possible. They then create a folder on the compromised PC and
share it.
Then, they connect to the shared folder from the source machine
an go on to explain how to get all the user ID's and passwords.
They use pwdump to dump the entire SAM (where the user accounts
and hashed passwords are stored). They also show you how to copy
off a CISCO VPN configuration file and explain how to use it.
Cracking Account Passwords
-----------------
They then show you how to crack one of the user passwords using
a tool I have written about previously, called CAIN. Next, they
install a Trojan (subeven) on the system that will allow them to
perform key logging, and since the anti-virus software is
disabled, it won't be noticed. They install the Trojan and
connect to the machine. They then make sure to tell you that the
Trojan will alert them when the target machine comes online so
they can go back and hack it some more. However, if you were
using their product, this would not be possible.
Capturing Data Using A Sniffer
-----------------
After the Video on how to hack into a wireless PC, another one
of the companies CISSP's shows you everything you need to know
about finding usernames, passwords, PIN's, and other information
by analyzing a set of sniffer output.
Conclusion
-----------------
I must say that this video instruction on how to hack a PC is
very well done. The video and narration is visually and audibly
perfect and the detail and steps to hack the computer are
accurate. They do explain that most of these hacking procedures
can be thwarted by measures other than using their product /
solution. However, the presentation is clearly a sales and
marketing tool.
I'm not sure if making a video presentation on how to hack a PC
is the right or wrong thing to do. I myself write articles that
provide similar, if less detailed information. One could say
that this is just another way of promoting public awareness.
It's true, hacking into a PC or network can be just this simple.
However, making a video on how simple it is might be taking it a
little to far (Maybe this should be a question on the CISSP
exam). I'll leave it up to you to decide.
You may reprint or publish this article free of charge as long
as the bylines are included.
Original URL (The Web version of the article)
---------------------
http://www.defendingthenet.com/newsletters/VideoOnHowToHackAPC.ht
m