

The kon-boot is also used for some good activities such as recovering passwords. From a hackers perspective, we can say the hacker may add vulnerabilities in the kerne, Which is Game Over! It can inject itself into the system kernel. Screenshot credit: By Henrypentest – Own work, CC BY-SA 4.0, Īnd just enter the boot cd or the flash drive and starts to work like a bootkit, which means the tool is very much effective. Once identified the kon boot should be readily booted in a live cd or a bootable flash drive. Once the attacker gets inside the organisation/company and now find the target system. In order to perform this attack, the user should be very near to the target, So the attacker can get inside an organisation using social-engineering techniques. So, this tool is still very effective in this era.Īlso Read: How IoT is involved in cyberattacks? How do Kon-boot works?

The tool is getting continuous updates and the vulnerabilities are pathed continuously. The tool can e used by both Windows and Mac users but unfortunately not the Linux based systems. Yes, this tool is very effective only if the user is very near to the target objective. In order to bypass a device, a user should be physically closer to the target. The tool was created and developed by Piotr bania and got its initial release in the year 2008. Kon-boot is a tool that is used to compromise or bypass users password prompt very easily, This tool is only very effective in windows systems. The post is available in the hacking tools menu. I have already written a separate post on how to work with the tool. This post is just an overview of what is tool is and I am not performing any commands here.

In this post, you will learn what is kon-boot and how does it work and Kon-book is mostly used for compromising or recovery of passwords.
