Tired of trying breaking into that Linux box which pesks you with its password screen ? Well,your day is saved when Kon Boot comes to rescue . Apart from the stupid logo,Kon-Boot is an fantastic prototype software which can change contents of a Linux kernel and Windows kernel while booting.It will you to log into a Linux system as “root” user without even typing the correct password or to elevate privileges from current user to root. For Windows systems it allows to enter any password protected profile without any knowledge of the password.Entire Kon-Boot was written in pure x86 assembly in TASM 4.0.
 
 
Kon boot was mainly created for Ubuntu,but now it supports more Linux distributions. Kon Boot can crack an array of Windows and Linux operating systems ranging from Windows XP to even Windows 7,which makes it one of the first tools to break Windows 7 passwords.On the Linux from it supports Gentoo,Ubuntu,Debian and Fedora flavors.
Here is how you can Hack Linux Passwords using Kon-Boot-
- Boot with Kon-boot CD or Floppy
- When Linux is fully booted go to the console mode
- Type 'kon-usr' as login, if it works you should be now in the system
- Remember to restore the system when you are leaving, you can do this by typing 'kon-fix' as login again.
Here is a Sample Console output of what it will look like -
Ubuntu 8.04 torpeda tty1
torpeda login: kon-usr
# id
uid=0(root) gid=0(root)
# whoami
root
Here is how you can Hack Windows Passwords using Kon-Boot-
No special usage instructions are required for Windows users, just boot from Kon-Boot CD/Floppy, select your profile and put any password you want. You lost your password? Now it doesn't matter at all :P
You can Download Kon-Boot from here -
Floppy Image – FD0-konboot-v1.1-2in1.zip     
CD ISO Image – CD-konboot-v1.1-2in1.zip
Keep Learning..
[ PS:Finally my workshop at SVIET is over and I am a bit free as of now..]
POSTED BY XERO.ALL RIGHTS RESERVED.
 
 
 
  of up to 144Kbps,uninterrupted high speed great connectivity,4 times speeds more than dialup and many more..
 of up to 144Kbps,uninterrupted high speed great connectivity,4 times speeds more than dialup and many more..   
  
  applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user’s specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.Enthusiastics can experiment with its opotions and pwn many of the servers around,or can test their skills to secure their servers..but remember,SQL map is a tool,its might help you to find and
 applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user’s specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.Enthusiastics can experiment with its opotions and pwn many of the servers around,or can test their skills to secure their servers..but remember,SQL map is a tool,its might help you to find and