How to crack windows password using kali linux

For cracking any windows password with chntpw follow steps:-

1. Make pen drive bootable with any linux os i recommend you to boot from Kali linux
2. After making bootable pen drive you need to plug the pen drive to the computer
3, Press f12 or f9 according to the computer or laptop for choosing boot option
4. Choose boot from pendrive
5. After few second you will see Linux desktop appear on your screen
6. Goto home folder in that window sidebar will appear
7. See in the sidebar you will see some file system click the file system which have window’s files
8.Goto Windows->system32->config copy SAM SYSTEM and SECURITY files in root directory
9.Open terminal enter command

10. $chntpw SAM SYSTEM SECURITY

11. After it will ask you syskey y/n you have to press n
12. then press 1 for removing password
13. it will clear and rewrite empty password to the copyied files
14. copy files back to the windows folders from wherever you copied

15.Congratulation you cracked your password restart machine remove pendrive
hey you will see your password is cracked.

How to Configure the server in linux

Most server computer code packages square measure put in with a default configuration that leans additional toward security than immediate full use. Here square measure some things to believe after you set out to configure a server.

Using configuration files:

Most UNIX system servers square measure configured victimisation plain text files within the /etc directory (or subdirectories). Often, there’s a primary configuration file; typically, there’s a connected configuration directory within which files ending in .conf will be force into the most
configuration file.

The httpd package (Apache internet server) is associate degree example of a server package that includes a primary configuration fi autoimmune disorder and a directory wherever different configuration files will be born in and be enclosed with the service. the most configuration fi autoimmune disorder in hat and RHEL is /etc/httpd/conf/httpd.conf. The configuration directory is /etc/httpd/conf.d/.

After putting in httpd , you’ll see files within the /etc/httpd/conf.d/ directory that
were placed there by totally different packages: mod_ssl, mod_perl, and so on. this can be the way
that add-on packages to a service will have their configuration data enabled in
the httpd server, while not the package making an attempt to run a script to edit the most
httpd.conf file.

The one draw back to plain-text configuration files is that you just don’t get the sort of
immediate error checking you get after you use graphical administration tools. You either
have to run a take a look at command (if the service includes one) or truly attempt to begin the service to see if there’s any drawback together with your configuration file.
Checking the default configuration:

Most server computer code packages in hat and RHEL square measure put in with token configuration and lean additional toward being secure than all helpful out of the box. Some UNIX system distributions ask you, whereas putting in a computer code package, such things because the directory you would like to install it in or the user account you would like to manage it.

Because revolutions per minute packages square measure designed to be put in unattended, the person putting in the package has no alternative on however it’s put in. The files square measure put in in set locations, specific user accounts square measure enabled to manage it, and after you begin the service, it’d well offer restricted accessibility. you’re expected to configure the computer code once the package is installed to create the server absolutely practical.

Two samples of servers that square measure put in with restricted practicality square measure mail servers (sendmail or affix packages) and DNS servers (bind package). each of those servers
are put in with default configurations and begin aufait revive. However, each conjointly solely
listen for requests on your localhost. So, till you configure those servers, people who
are not logged in to your native server cannot send mail thereto server or use your laptop
as a public DNS server, severally.