International Research Association of Computer Science and Technology (IRACST)
"Security has become one of the most important goals in this era. Well there is no game in the rule of hacking. In this paper, the authors will describe the various methods used for bypassing authentication credentials. They will also provide list of some software's for windows environment (freeware which cannot be guaranteed) for educational purpose only to get authentication credentials. The paper mainly focus on the SQL injection attacks, use of key-loggers to bypass authentication credentials and hacking in windows environment by bypassing SAM databases and way to prevent these types of attack."