IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. III (Nov – Dec. 2015), PP 71-73
www.iosrjournals.org
DOI: 10.9790/0661-17637173 www.iosrjournals.org 71 | Page
Secure System Password (SSP) Application for NT Editor
Hacking Tool
T.Sethupathy, P.Veni, S. Selwin Joseph, C. Sathya
1,2,3
Final Year/Dept of CSE SNS College of Technology Coimbatore-35
4
Assistant Professor/CSE SNS College of Technology Coimbatore-35
Abstract: In windows, the password will be stored in SAM registry by default. This SAM registry hides the
windows password when the system is in ON state. The password in SAM registry will be cleared or changed by
using NT Editor Tool. So that data can be accessed by any user. Security for the windows will be done by the
proposed system as an application. If the user wants to install new OS then the data in the hard disk will be
encrypted for prevention of unauthorized access. The application will be start monitoring to avoid password re-
modification or clearing the password. Features in this application is, if the user hacks the application
password, SSP does not allow the users to access USB, Ethernet and CD/DVD drive. Application will stop the
access of the driver ports, until it is re-installed or the password is set right.
Keywords: Hacking, NT Editor Tool, SAM Register, Data encryption.
I. Introduction:
Hacking is the act of manipulating computers to get them to do exactly what you want [1]. A hacker is
the person who does the hacking. A hacker is generally defined as someone who is very good with computers
and programming [2]. However, in popular culture, a hacker is considered someone who attempts to break into
computer systems.
The Security Account Manager (SAM) is a database file[3] inOperating System that stores
users' passwords. It can be used to authenticate local and remote users. The Security Account Manager (SAM) is
a database[4] present on servers running Windows Server 2003 that stores user accounts and security
descriptors for users on the local computer.
Offline NT Password & Registry Editor[5] is a free Linux-based utility, which as the name suggests,
works offline. The code creates its own boot environment. Once you burn the ISO image to a CD-ROM, you'll
have a tool at your disposal for resetting Windows NT, 2000, XP and Vista account passwords. You won’t even
have to know any of the current account user names or passwords on the system to make it work.
The Data encryption is the act of changing electronic information into an unreadable state by using
algorithms or ciphers. The cryptosystem which is most used throughout the world for protecting information is
the Data Encryption [6] Standard (DES) which was announced by the National Bureau of Standard (NBS). The
DES must be stronger than the other cryptosystems in its security.
II. System Analysis:
3.1 Existing system:
In windows, the password will be stored in SAM registry by default which is placed in windows
program files. This SAM registry hides the password from other user and admin too. This secures the password
of windows but only after the operating system turns ON.
But the password in the SAM registry gets clear or can be changed by using NT Editor Tool. This will
be called as NT Editor hacking mechanism. This tool will be activated before an operating system turns ON.
Using this NT Editor tool the password can be easily modified or cleared. From this the other user can easily
enter into the system, access it and retrieve data. To avoid the NT Editor hacking, SSP application has been
proposed to secure the windows password.
3.2 Proposed System
Step 1: Security Check-Installation of New OS will encrypt the data found in the hard disk.
Step 2:SSP Application starts from installation process. In the installation process, the user has a circle provided
by the application to select (Fig 3.2.1) the position for drawing patterns. In this circle the user has to mark (Fig
3.2.2) the points around it to draw patterns. All the points in the circle may or may not be covered for creating
patterns. Same pattern has to be given twice (Fig 3.2.3) for confirmation and the verification will be done after
the system has been restarted. This security pattern decreases the probability to crack the password by the
hacker.
Secure System Password (SSP) Application for NT Editor Hacking Tool
DOI: 10.9790/0661-17637173 www.iosrjournals.org 72 | Page
3.3 Working Process:
3.3.1 Security Check starts when the user tries to install New OS. This will encrypt the data
found in the hard disk.
3.3.2 SSP application should be placed before the operating system is being started by the
BIOS.
3.3.3 SSP application contains the lock patterns as well as some additional functions for
security issues.
3.3.4 In this application, if the password for this lock is modified or cleared then the
applicationwill cancel the access permission for USB and CD or DVD drive.So that the
user cannot mount the tool to clear the password which is stored in SAM registry.
3.3.5 Two tier security is provided for data protection and various hacking technologies.
3.4 Work Flow Diagram:
After installation, for each and every time while power on the system or laptop the process goes on like
this flow.
Secure System Password (SSP) Application for NT Editor Hacking Tool
DOI: 10.9790/0661-17637173 www.iosrjournals.org 73 | Page
3.4.1Process Diagram:
References:
[1]. http://wiki.cas.mcmaster.ca/index.php/Operating_Systems_Security
[2]. http://searchsecurity.techtarget.com/definition/hacker
[3]. https://en.wikipedia.org/wiki/Security_Account_Manager#cite_note-1
[4]. https://technet.microsoft.com/en-us/library/cc756748(v=ws.10).aspx
[5]. http://www.techrepublic.com/blog/windows-and-office/reset-lost-windows-passwords-with-offline-registry-editor/
[6]. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=563518

More Related Content

PDF
Operating systems security 2007 vulnerability report
PPTX
System security by Amin Pathan
PPTX
Security & protection in operating system
PPTX
Operating system security
PPTX
Operating System Security
PPTX
Os security issues
PPTX
Operating system security
Operating systems security 2007 vulnerability report
System security by Amin Pathan
Security & protection in operating system
Operating system security
Operating System Security
Os security issues
Operating system security

What's hot (20)

PDF
Mengenal Fitur Keamanan Dasar pada Windows 7
PPT
Operating system vulnerability and control
PDF
Object Oriented Secure Modeling using SELinux Trusted Operating System
PPT
Windows Vista and Trust Worthy Computing
DOCX
9.system analysis
PPT
Windows Security in Operating System
PPT
Lecture 4
PPTX
Operating system security
PPTX
COMPUTER SECURITY AND OPERATING SYSTEM
PPT
OS Security 2009
PDF
Certificate_2
PDF
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...
PPT
Design for security in operating system
PDF
PPT_Compiled
PPTX
Security and protection
PDF
OPERATING SYSTEM SECURITY
PPTX
Program Threats
PDF
International Journal of Engineering Research and Development
PPTX
Security in Windows operating system
PPSX
Desktop and server securityse
Mengenal Fitur Keamanan Dasar pada Windows 7
Operating system vulnerability and control
Object Oriented Secure Modeling using SELinux Trusted Operating System
Windows Vista and Trust Worthy Computing
9.system analysis
Windows Security in Operating System
Lecture 4
Operating system security
COMPUTER SECURITY AND OPERATING SYSTEM
OS Security 2009
Certificate_2
Chained Enforceable Re-authentication Barrier Ensures Really Unbreakable Secu...
Design for security in operating system
PPT_Compiled
Security and protection
OPERATING SYSTEM SECURITY
Program Threats
International Journal of Engineering Research and Development
Security in Windows operating system
Desktop and server securityse

Viewers also liked (20)

PPT
4 reglas de oro negociar
DOCX
How to update_the_firmware_of_tronfy_tvb_x2_local_update
PPT
A Deeper Study Into Cell Parts, Processes and Substances
PDF
Neil Bron Jalac- CV1 (2)
PPTX
Diferencia entre delitos informaticos y delitos computacionales
PPTX
WolfPack Raumluftqualität Messung | TVOC PID Monitor
PDF
Neil Bron Jalac- CV1 (2)
PPTX
Hardware veronica
PPT
Orientación profesional
PPTX
Plan de empresa rcerviñoforjan
PPT
10-4 Anexo I - rd 39-97
PPTX
Presentación sobre plagio 1077473647
PPT
5-1 Modificaciones sustanciales contrato
PDF
Beeldcom les5
PPTX
Vacuum tube
PPTX
Aprendizaje
PPT
1-7 Fuentes del derecho laboral
PPTX
Adiponectin
PPTX
Air polluction for environmental studies
PDF
Thesis section: Role of Oxidative Stress in the pathogenesis of neurodegenera...
4 reglas de oro negociar
How to update_the_firmware_of_tronfy_tvb_x2_local_update
A Deeper Study Into Cell Parts, Processes and Substances
Neil Bron Jalac- CV1 (2)
Diferencia entre delitos informaticos y delitos computacionales
WolfPack Raumluftqualität Messung | TVOC PID Monitor
Neil Bron Jalac- CV1 (2)
Hardware veronica
Orientación profesional
Plan de empresa rcerviñoforjan
10-4 Anexo I - rd 39-97
Presentación sobre plagio 1077473647
5-1 Modificaciones sustanciales contrato
Beeldcom les5
Vacuum tube
Aprendizaje
1-7 Fuentes del derecho laboral
Adiponectin
Air polluction for environmental studies
Thesis section: Role of Oxidative Stress in the pathogenesis of neurodegenera...

Similar to Secure System Password (SSP) Application for NT Editor Hacking Tool (20)

PPTX
Cyber security and ethical hacking 9
PPT
Module 8 System Hacking
PDF
CREST CCT Lab Prep Notes
DOCX
Password hacking
PDF
8 passwordsecurity
DOCX
Password Cracking
PDF
Password Security
PPT
password.ppt
DOCX
18IF004_CNS.docx
PPTX
Password cracking and brute force
PPT
Ch07 Access Control Fundamentals
PPTX
HARDENING OF WINDOWS 10 OS.pptx
PDF
Vulnerabilities in login authentication methods and password storage in Windo...
PPT
Network administration cod Lecture 4.ppt
DOCX
CHAPTER 7 Authentication and Authorization On
PPT
Class Presentation
PPT
Presentation2f_for_passwords_MS_Class.ppt
PPSX
Usable Security: When Security Meets Usability
PPTX
Primer on password security
PPTX
password cracking and Key logger
Cyber security and ethical hacking 9
Module 8 System Hacking
CREST CCT Lab Prep Notes
Password hacking
8 passwordsecurity
Password Cracking
Password Security
password.ppt
18IF004_CNS.docx
Password cracking and brute force
Ch07 Access Control Fundamentals
HARDENING OF WINDOWS 10 OS.pptx
Vulnerabilities in login authentication methods and password storage in Windo...
Network administration cod Lecture 4.ppt
CHAPTER 7 Authentication and Authorization On
Class Presentation
Presentation2f_for_passwords_MS_Class.ppt
Usable Security: When Security Meets Usability
Primer on password security
password cracking and Key logger

More from iosrjce (20)

PDF
An Examination of Effectuation Dimension as Financing Practice of Small and M...
PDF
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
PDF
Childhood Factors that influence success in later life
PDF
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
PDF
Customer’s Acceptance of Internet Banking in Dubai
PDF
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
PDF
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
PDF
Student`S Approach towards Social Network Sites
PDF
Broadcast Management in Nigeria: The systems approach as an imperative
PDF
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
PDF
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
PDF
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
PDF
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
PDF
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
PDF
Media Innovations and its Impact on Brand awareness & Consideration
PDF
Customer experience in supermarkets and hypermarkets – A comparative study
PDF
Social Media and Small Businesses: A Combinational Strategic Approach under t...
PDF
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
PDF
Implementation of Quality Management principles at Zimbabwe Open University (...
PDF
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...
An Examination of Effectuation Dimension as Financing Practice of Small and M...
Does Goods and Services Tax (GST) Leads to Indian Economic Development?
Childhood Factors that influence success in later life
Emotional Intelligence and Work Performance Relationship: A Study on Sales Pe...
Customer’s Acceptance of Internet Banking in Dubai
A Study of Employee Satisfaction relating to Job Security & Working Hours amo...
Consumer Perspectives on Brand Preference: A Choice Based Model Approach
Student`S Approach towards Social Network Sites
Broadcast Management in Nigeria: The systems approach as an imperative
A Study on Retailer’s Perception on Soya Products with Special Reference to T...
A Study Factors Influence on Organisation Citizenship Behaviour in Corporate ...
Consumers’ Behaviour on Sony Xperia: A Case Study on Bangladesh
Design of a Balanced Scorecard on Nonprofit Organizations (Study on Yayasan P...
Public Sector Reforms and Outsourcing Services in Nigeria: An Empirical Evalu...
Media Innovations and its Impact on Brand awareness & Consideration
Customer experience in supermarkets and hypermarkets – A comparative study
Social Media and Small Businesses: A Combinational Strategic Approach under t...
Secretarial Performance and the Gender Question (A Study of Selected Tertiary...
Implementation of Quality Management principles at Zimbabwe Open University (...
Organizational Conflicts Management In Selected Organizaions In Lagos State, ...

Recently uploaded (20)

PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PPTX
communication and presentation skills 01
PDF
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
PPTX
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
PPTX
introduction to high performance computing
PDF
Improvement effect of pyrolyzed agro-food biochar on the properties of.pdf
PDF
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
PPTX
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PPTX
"Array and Linked List in Data Structures with Types, Operations, Implementat...
PDF
Design Guidelines and solutions for Plastics parts
PDF
Exploratory_Data_Analysis_Fundamentals.pdf
PDF
Abrasive, erosive and cavitation wear.pdf
PDF
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
PDF
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
PDF
Visual Aids for Exploratory Data Analysis.pdf
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
communication and presentation skills 01
Accra-Kumasi Expressway - Prefeasibility Report Volume 1 of 7.11.2018.pdf
ASME PCC-02 TRAINING -DESKTOP-NLE5HNP.pptx
introduction to high performance computing
Improvement effect of pyrolyzed agro-food biochar on the properties of.pdf
Influence of Green Infrastructure on Residents’ Endorsement of the New Ecolog...
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
"Array and Linked List in Data Structures with Types, Operations, Implementat...
Design Guidelines and solutions for Plastics parts
Exploratory_Data_Analysis_Fundamentals.pdf
Abrasive, erosive and cavitation wear.pdf
Artificial Superintelligence (ASI) Alliance Vision Paper.pdf
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
Visual Aids for Exploratory Data Analysis.pdf

Secure System Password (SSP) Application for NT Editor Hacking Tool

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. III (Nov – Dec. 2015), PP 71-73 www.iosrjournals.org DOI: 10.9790/0661-17637173 www.iosrjournals.org 71 | Page Secure System Password (SSP) Application for NT Editor Hacking Tool T.Sethupathy, P.Veni, S. Selwin Joseph, C. Sathya 1,2,3 Final Year/Dept of CSE SNS College of Technology Coimbatore-35 4 Assistant Professor/CSE SNS College of Technology Coimbatore-35 Abstract: In windows, the password will be stored in SAM registry by default. This SAM registry hides the windows password when the system is in ON state. The password in SAM registry will be cleared or changed by using NT Editor Tool. So that data can be accessed by any user. Security for the windows will be done by the proposed system as an application. If the user wants to install new OS then the data in the hard disk will be encrypted for prevention of unauthorized access. The application will be start monitoring to avoid password re- modification or clearing the password. Features in this application is, if the user hacks the application password, SSP does not allow the users to access USB, Ethernet and CD/DVD drive. Application will stop the access of the driver ports, until it is re-installed or the password is set right. Keywords: Hacking, NT Editor Tool, SAM Register, Data encryption. I. Introduction: Hacking is the act of manipulating computers to get them to do exactly what you want [1]. A hacker is the person who does the hacking. A hacker is generally defined as someone who is very good with computers and programming [2]. However, in popular culture, a hacker is considered someone who attempts to break into computer systems. The Security Account Manager (SAM) is a database file[3] inOperating System that stores users' passwords. It can be used to authenticate local and remote users. The Security Account Manager (SAM) is a database[4] present on servers running Windows Server 2003 that stores user accounts and security descriptors for users on the local computer. Offline NT Password & Registry Editor[5] is a free Linux-based utility, which as the name suggests, works offline. The code creates its own boot environment. Once you burn the ISO image to a CD-ROM, you'll have a tool at your disposal for resetting Windows NT, 2000, XP and Vista account passwords. You won’t even have to know any of the current account user names or passwords on the system to make it work. The Data encryption is the act of changing electronic information into an unreadable state by using algorithms or ciphers. The cryptosystem which is most used throughout the world for protecting information is the Data Encryption [6] Standard (DES) which was announced by the National Bureau of Standard (NBS). The DES must be stronger than the other cryptosystems in its security. II. System Analysis: 3.1 Existing system: In windows, the password will be stored in SAM registry by default which is placed in windows program files. This SAM registry hides the password from other user and admin too. This secures the password of windows but only after the operating system turns ON. But the password in the SAM registry gets clear or can be changed by using NT Editor Tool. This will be called as NT Editor hacking mechanism. This tool will be activated before an operating system turns ON. Using this NT Editor tool the password can be easily modified or cleared. From this the other user can easily enter into the system, access it and retrieve data. To avoid the NT Editor hacking, SSP application has been proposed to secure the windows password. 3.2 Proposed System Step 1: Security Check-Installation of New OS will encrypt the data found in the hard disk. Step 2:SSP Application starts from installation process. In the installation process, the user has a circle provided by the application to select (Fig 3.2.1) the position for drawing patterns. In this circle the user has to mark (Fig 3.2.2) the points around it to draw patterns. All the points in the circle may or may not be covered for creating patterns. Same pattern has to be given twice (Fig 3.2.3) for confirmation and the verification will be done after the system has been restarted. This security pattern decreases the probability to crack the password by the hacker.
  • 2. Secure System Password (SSP) Application for NT Editor Hacking Tool DOI: 10.9790/0661-17637173 www.iosrjournals.org 72 | Page 3.3 Working Process: 3.3.1 Security Check starts when the user tries to install New OS. This will encrypt the data found in the hard disk. 3.3.2 SSP application should be placed before the operating system is being started by the BIOS. 3.3.3 SSP application contains the lock patterns as well as some additional functions for security issues. 3.3.4 In this application, if the password for this lock is modified or cleared then the applicationwill cancel the access permission for USB and CD or DVD drive.So that the user cannot mount the tool to clear the password which is stored in SAM registry. 3.3.5 Two tier security is provided for data protection and various hacking technologies. 3.4 Work Flow Diagram: After installation, for each and every time while power on the system or laptop the process goes on like this flow.
  • 3. Secure System Password (SSP) Application for NT Editor Hacking Tool DOI: 10.9790/0661-17637173 www.iosrjournals.org 73 | Page 3.4.1Process Diagram: References: [1]. http://wiki.cas.mcmaster.ca/index.php/Operating_Systems_Security [2]. http://searchsecurity.techtarget.com/definition/hacker [3]. https://en.wikipedia.org/wiki/Security_Account_Manager#cite_note-1 [4]. https://technet.microsoft.com/en-us/library/cc756748(v=ws.10).aspx [5]. http://www.techrepublic.com/blog/windows-and-office/reset-lost-windows-passwords-with-offline-registry-editor/ [6]. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&arnumber=563518