Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment and resources, and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks).
Physical security we talked in this tutorial is part from Information Security where according to Wikipedia:
Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (electronic, physical, etc…)
Remember: do this in your own lab/computer, make sure you're not harm the others.
Requirements:
1. Kon Boot
2. USB stick (the Kon Boot file size is about 5-6MB so you can calculate by yourselves)
Step by Step Hacking Tutorials Log in Windows Without Password with Kon Boot:
1. First, we will make the bootable Kon Boot by using the default kon-boot installer that already provided when we buy this program, but if we use the free version.
Choose the USB we want to use to install kon-boot from the "available USB drives" drop down list and click "Install to USB stick" when finished.
The installation process will take approximately 1 minute.
note: Make sure you choose the correct USB, because the installation process will erase all data on your USB device.
2. The Kon-boot USB now ready, we need to configure the BIOS settings to change the boot order to boot from USB. You can view our previous tutorial about changing BIOS boot order in step 5.
3. This is the preview when we successfully boot from Kon-boot USB.
4. After the Kon-boot initialization screen, it will normally boot the Windows. When we press the SHIFT key 5 times (sticky keys), we can see the command prompt pooped out with system role.
4.
After the Kon-boot initialization screen, it will normally boot the
Windows. When we press the SHIFT key 5 times (sticky keys), we can see
the command prompt pooped out with system role. - See more at:
http://www.hacking-tutorial.com/hacking-tutorial/hacking-tutorials-log-in-windows-without-password-with-kon-boot/#sthash.4zrZ2Grl.dpuf
5. We can enter Windows without a password, just click the arrow and we already inside the system.
5.
We can enter Windows without a password, just click the arrow and we
already inside the system. - See more at:
http://www.hacking-tutorial.com/hacking-tutorial/hacking-tutorials-log-in-windows-without-password-with-kon-boot/#sthash.4zrZ2Grl.dpuf
Conclusions:
1. Create a password for our computer BIOS.
- See more at: http://www.hacking-tutorial.com/hacking-tutorial/hacking-tutorials-log-in-windows-without-password-with-kon-boot/#sthash.4zrZ2Grl.dpuf
1. Create a password for our computer BIOS.
- See more at: http://www.hacking-tutorial.com/hacking-tutorial/hacking-tutorials-log-in-windows-without-password-with-kon-boot/#sthash.4zrZ2Grl.dpuf
Conclusions:
1. Create a password for our computer BIOS.
2. Lock our computer physically to prevent someone open the computer case and reset the BIOS password
Share It if you Found useful
0 comments:
Post a Comment