Saturday, December 10, 2011

Some ways to Hack a Computer..............!!!!!!!!!!!

1. Phishing


This is a method where you have to bring the user to a webpage created by you which appears to be the same as the interface of the legitimate one and get him/her to enter the credentials. Then the redirect page will land somewhere else and you will get the password in your mail box as defined inside the php script.


2. Keylogger


Consider a situation; everything you type in the system is mailed to the hacker! Wouldn’t it be easy to track your password from that? Keyloggers perform similar functionalities. So you have to be cautious while typing anything. Now a day, remote keyloggers are also used. So before downloading any executable file keep an eye on the downloadable element. Also lookout for your open ports… someone might be looking into it. Periodically check “netstat” from command prompt.


3. BruteForcing


This is quite a long and most tiring task. This method is very useful if you know that the victim is using his password among a few known possibilities that you are aware of. If you don’t know much and the possibilities are more, then you shouldn’t go for it.


4. Secret Question


According to a survey done by security companies, it is found that people generally complain for hacking as per their secret question answers. This is indeed a much easier method. In some cases, there are only fixed secret questions, so it becomes much easier for the hackers. So, don’t use simple answers, don’t reveal it to anyone and I would suggest you to use own secret questions with answers.


5. Social Engineering


This is one of the oldest tricks to hack. Try to convince the user that you are a legitimate person from the system or central server and needs your password for the continuation of the service or some maintenance or you need to reset your password to some combination like ‘abc12345’. This won’t work now since most of the users are now aware about the Scam. But this Social Engineering concept is must for you to convince the victim for many reasons. It may work in some case.


6. Fake Messengers


This is a form of phishing in the application format. Sometimes, there are some fake applications which tend the user to enter the login info in the software and check your mail. But unknowingly, your login credentials are being sent to the ftp server destination of the hacker.


7. Viruses And Worms


Viruses and worms are self-replicating programs or code fragments that attach themselves to other programs (viruses) or machines (worms). Both viruses and worms attempt to shut down networks by flooding them with massive amounts of bogus traffic, usually through e-mail. So install a good working antivirus and antispam program which is capable of handling the potential threats.


8. Back Doors


Hackers can gain access to a network by exploiting back doors administrative shortcuts, configuration errors, easily deciphered passwords, and unsecured dial-ups. With the aid of computerized searchers (bots), hackers can probably find any weakness in the network. So you have to strengthen your security to avoid unauthorized access.


9. Trojan Horses


Trojan horses, which are attached to other programs, are the leading cause of all break-ins. When a user downloads and activates a Trojan horse, the software can take the full control over the system and you can remotely control the whole system. Isn’t it great! They are also referred as RATs (Remote Administration tools). Always periodically watch out your open terminals by checking ‘netstat’.


10. Denial Of Service


DoS attacks give hackers a way to bring down a network without gaining internal access. DoS attacks work by flooding the access routers with bogus traffic (which can be e-mail or Transmission Control Protocol, TCP, packets).


11. Distributed DoSs


Distributed DoSs (DDoSs) are coordinated DoS attacks from multiple sources. A DDoS is more difficult to block because it uses multiple, changing, source IP addresses. So better to use upgraded and advanced servers like grid server etc.


12. Sniffing


Sniffing refers to the act of intercepting TCP packets. This interception can happen through simple monitoring or something more wicked. So it’s better to secure the working network. Also make sure that, none of your users is giving your TCP packets to outer network knowingly or unknowingly. Knowing IP address only also can do a lot as there is a powerful penetration tool to do the damage (BACKTRACK OS + METASPLOIT).


13. Spoofing


Spoofing is the act of sending an illegitimate packet with an expected acknowledgment (ACK), which a hacker can guess, predict, or obtain by snooping.


14. SQL Injection


SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. It uses normal SQL commands to get into database with elevated privileges. Some security precautions need to be taken to handle this attack.


15. Cookie Stealer


Each time you access into an online account, the sites identify your system and you by your cookies. If somebody gets the cookie saved by the sites, then he can easily decode it and can get the password! This is generally possible in open networks. So while using open networks always use https as it makes you enter into secure mode without leaving the cookie to the network.


16. DNS Poisoning Or PHARMING


Phishing is a tough job. Isn’t it? Convincing someone to enter their password at your page require a lot mind work. What if you don’t have to convince the person? What if they are directed automatically to your site without having a clue? DNS poising or Pharming does the same for you.

Sunday, September 25, 2011

D-Dos Attack...................

What is "DDoS"?

Denial of Service attacks(or Distributed Denial of Service attacks[DDoS]) is a form of organized attacks with the goal of taking down a server by overloading it. Often with useless information(packets) being sent to the server in massive amounts.

Keep in mind that  performing DDoS attacks is indeed a federal crime in the US.
It is also an international offence and will be punished according to the local laws of the individual's country.

But enough talk. I will now show you a quick example of a DoS attack of sorts you can do on your local computer.

Sample
Keep in mind that this is NOT a real DoS attack, but rather an example to visualize how a DoS works.

We will take down YOUR computer.

Step 1
Open up notepad, mousepad, or your favored equivalent.

Step 2
Type in this simple batch command
Code:
:a
start
goto a

Step 3
Save as "dossample.bat" making sure you select "All files" from the "File Type" dialog.

Step 4
Run that sucker, but save your work first, as this will crash even the best computers in a matter of minutes, even seconds.


What did you learn from this?
Observe how the file rapidly replicates itself, opening a new CMD right after it opens another.
An infinite loop has been created that has filled the RAM with useless and massive amounts of CMDs(or Terminals for you Unix folk)

DDoS attacks work much the same way, except instead of replicating an infinite number of CMDs, they send information(packets) to the server over and over and over again until the server crashes.

What information you may ask?
Anything. Your login name, your 'online' status, a new comment, the number of views on a video, your new high score. Absolutely any information that could be resent a massive amount of times to the same server.

Next we will be discussing the simplest form of DDoS.

DDoS by Ping Flood

Please note that I will be pinging my Localhost. You should too.

Perhaps one of the simplest ways to DoS is by using the 'ping' command built into most operating systems, including all windows distributions, and Linux.

Step 1
Start up your server. Mine is apache, but that is beside the point, the server type does not matter. If it has an IP address, it can be pinged.

Step 2
Type in the ping command
Code:
ping -t -a -l 65500 localhost

Step 3
Press enter and watch it ping the localhost over and over until
your server crashes, or you get tired of waiting for it to crash.

Since most modern servers can take the stress of the ping flood, you will need to get all your friends to help you ping to bring your server down. Or even slow it down.

Command Explained
ping - tells the computer to ping a server
-t - It will continue to ping the server until the command is closed, or stopped.
-a - Resolves the adress to host names.
-l - Size.

By default the ping will send 32bytes of data to the server, so you must change this to a bigger number. The maximum is 65,500bytes, so that is what we used.

If you send a server any number higher than 65,500bytes it will instantly crash. This is called "Ping of Death".
Like any other thing with the suffix "of Death" it is very dangerous, rare, and hard to accomplish indeed.

DDoS by Reloading
Something as simple as reloading a page can take down a server if done enough times.

Step 1
Make a page that lets you submit forms. Method='GET' is better than method='POST' for this, but both will work.
(If you do not understand step 1, just find a page that lets you sumbit information, like a new comment or upload a picture)

Step 2
Fill out the forms and submit

Step 3
Reload the page
If the page uses the POST method your browser will display a dialog asking if you are sure you want to resend the information, or something to that effect. Simply click "Continue" or "OK".(see now why GET is better?)

Step 4
Keep reloading until server is down.

Their are many addons and tools that allow you to autoreload a page. It is a matter of googleing for them. They are widely available and free.

I have just created a program that allows you to Auto-refresh a page using IE. If you are interested please download from:
Host: Darksunlight | Size: 9kb | Format: .zip ultra compressed | Platform: Windows

This method is very primitive as you can see, but it is probably the best way to DDoS.

Saturday, September 3, 2011

Hacking Tricks ..............!: Branding Windows Xp with your Name and Details.

Hacking Tricks ..............!: Branding Windows Xp with your Name and Details.: Branding Windows with your name. open notepad dump the following lines into it and save it with the name OEMINFO.INI in the c:\windows\s...

Branding Windows Xp with your Name and Details.



Branding Windows with your name.

open notepad dump the following lines into it and save it with the name OEMINFO.INI in the c:\windows\system32 directory:


[General]
Manufacturer=Your Name Here
Model=Your Model Here
[Support Information]
Line1=Your Name Here
Line2=Your Address Here
Line3=Your Email Address Here
Save the file, then make a right click on my computer select properties, in the general tab a button will be highlighted (support information) make a click on it, you will be able to see the changes.
Now if you want to display some more information then simply increase the line in the file.
ex: Line4=Your Working Hours Here

Hacking Tricks ..............!: Bypass Windows Login Password

Hacking Tricks ..............!: Bypass Windows Login Password: Hack into a computer running Windows XP without changing the password and find out all and any passwords on the machine (including admin a...

Bypass Windows Login Password



Hack into a computer running Windows XP without changing the password and find out all and any passwords on the machine (including admin accounts). You do not need access to any accounts to do this.

Steps to Hack into a Windows XP Computer without changing password:

1. Get physical access to the machine. Remember that it must have a CD or DVD drive.

2. Download DreamPackPL from Official website or from Rapidshare.

3. Unzip the downloaded dreampackpl_iso.zip and you'll get dreampackpl.ISO.

4. Use any burning program that can burn ISO images.

5. After you have the disk, boot from the CD or DVD drive. You will see Windows 2000 Setup and it will load some files.

6. Press "R" to install DreamPackPL.

7. Press "C" to install DreamPackPL by using the recovery console.

8. Select the Windows installation that is currently on the computer (Normally is "1" if you only have one Windows installed)

9. Backup your original sfcfiles.dll by typing:
"ren C:\Windows\System32\sfcfiles.dll sfcfiles.lld" (without quotes)

10. Copy the hacked file from CD to system32 folder. Type:
"copy D:\i386\pinball.ex_ C:\Windows\System32\sfcfiles.dll" (without quotes and assuming your CD drive is D:)

11. Type "exit", take out disk and reboot.

12. In the password field, type "dreamon" (without quotes) and DreamPack menu will appear.

13. Click the top graphic on the DreamPack menu and you will get a menu popup.

14. Go to commands and enable the options and enable the god command.

15. Type "god" in the password field to get in Windows.
You can also go to Passwords and select "Logon with wrong password and hash". This option allows you to login with ANY password.
Note: You will have to uninstall Antivirus sofware,Otherwise it will detect DreamPack as a hack tool and will not allow you to run it.

Wednesday, August 17, 2011

How to use multiple operating systems in one computer

 Rakesh Vaghela

How to use multiple operating systems in one computer


Hi friends ! Hope you are chilling ..... But i am getting bored with my job and without you everything looks like useless_ _ _ Don't worry doing emotional atyachar only. Have nothing to write but worried about my website traffic and adsense earning so going to write i mean to say copy most worst article of this website. Well most of you have heard about VMware but duffers(LOL) i have used it so i have more knowledge. Its very usefull for students, developers and testers to create virtual environment for multiple operating systems. But some suckers(LOL) don't know how to use it and why use it.
How to use it- not going to tell you step by step but after installing it you can create a machine with any operating system but not MAC . To use multiple operating system at one time you need to create ISO images of these operating systems. After then you can create team and use all system in one computer at one time.
Why use it- Several reasons for this

  1. No need to use more then one PC or Laptop
  2. Can run old softwares on latest operating systems
  3. Support both windows and linux operating systems
  4. Consumes less memory and RAM
  5. Can create a Network like LAN
  6. Can create a Network with different operating systems
  7. Easy to remove or install an operating system
  8. Good for testing softwares and operating system
  9. Hacking practicals without doing any harm to original operating system
  10. Can mount ISO files so no need to use CD or DVD's

What is VMware workstation-VMware Workstation is a virtual machine software suite for x86 and x86-64 computers from VMware, a division of EMC Corporation which allows users to set up multiple x86 and x86-64 virtual computers and to use one or more of these virtual machines simultaneously with the hosting operating system. Each virtual machine instance can execute its own guest operating system, including Windows, Linux, BSD variants, and others. In simple terms, VMware Workstation allows one physical machine to run multiple operating systems simultaneously. Other VMware products help manage or migrate VMware virtual machines across multiple host machines. Workstation is sold by VMware; VMware Player is a similar program with fewer features supplied free of charge.
VMware Workstation supports bridging to existing host network adapters, CD-ROM devices, hard disk drives, and USBdevices (including USB Isochronous devices such as webcams, microphones etc), and provides the ability to simulate some hardware. For example, it can mount an ISO file as a CD-ROM, and .vmdk files as hard disks, and can configure its network adapter driver to use network address translation (NAT) through the host machine rather than bridging through it (which would require an IP address for each guest machine on the host network).
VMware Workstation allows the testing of live CDs without first recording them onto physical discs or rebooting the computer. Multiple successive snapshots of an operating system running under VMware Workstation can be taken, and the virtual machine can be restarted in the state it was in when any snapshot was saved. This is useful for software developers and testers, for environments at risk from virus infection, and for demonstrating software.
VMware Workstation includes the ability to designate multiple virtual machines as a team which administrators can then power on and off, suspend, and resume as a single object, making it particularly useful for testing client-server environments. Information Source

Now you want to use it for study purpose but don't have a key then this site will help you http://www.keygenguru.com/

Monday, August 15, 2011

Easy Way to Download Youtube video

How to Download YouTube Videos: Easiest Way

Download YouTube VideosYouTube is undoubtedly the most preferred website to share and watch favorite videos. Most users prefer to watch the videos online, while a few others like me, would like to download them so that, they can be saved and retained. Well, if you are one among those few who would like to download the videos from YouTube, then here is a way to do that.
In fact, there are many ways to download videos from YouTube, but here in this post, I would like to share with you one of the easiest way to do that. This can be done as follows:
1. Download and install the latest version of Internet Download Manager.
Internet Download Manager is a great add-on for your web browser which increases the download speed by 5 times. It also helps you to pause/resume and schedule your downloads. It has got a great interface and is user friendly. It works with most of the browsers including IE, Firefox, Chrome, Safari and Opera.
2. After you complete the installation, just open your browser and start searching for your favorite video on YouTube. You will see the download button on top of the video using which you can download it instantly.
Download YouTube Videos

Wednesday, August 10, 2011

BIOS / CMOS Password Reset

BIOS PASSWORD RESET 


Go to Command Prompt


Follow the below stepsss......


debug hit <enter>

-o 70 2e hit <enter>

-o 71 ff hit <enter>


-q hit <enter>


exit <enter>



restart your computer and u can enter in BIOS without password

Monday, July 25, 2011

windows game cheat

Game Secrets
Solitaire: Instant Win
  1. Press Alt + Shift + 2 to instantly win
Solitaire: Draw only 1 card (instead of 3)
  1. Hold down Ctrl + Alt + Shift then click on unopen cards to draw.
FreeCell: Instant Win
  1. Hold down Ctrl + Shift + F10 while playing, then click Abort.
  2. Now move one card.
FreeCell: Hidden Game Modes
  1. Go to "Game" menu choose "Select Game"
  2. Here you can choose from game mode 1 to 1,000,000. But -1 and -2 will also work (hidden modes)
Hearts: Show All Card
    Warning! this requires a modification on your registry. Be sure you follow the steps carefully. Damage your registry might damage your Windows.
  1. Open the "Registry Editor" by: "Start" >> "Run" then type "regedit" and press Enter
  2. Expand to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Applets\Hearts
  3. Right-click on the right panel and create a new String value with the name "ZB"
  4. Double-click to open this key "ZB" to edit its value. Then enter "42" and close the Registry Editor.
  5. Start Hearts and Press Ctrl + Alt + Shift + F12 to show all the cards
Minesweeper: Stop The Timer
  1. When you start to play a new game, the timer is ticking...
  2. Press Windows Key + D to show desktop.
  3. Now come back to the game by selecting it from the taskbar. The timer is stopped.
Pinball
  1. Unlimited Balls: Type bmax at a new game to get unlimited balls (no notification).
  2. Extra Balls: Type 1max at a new game to get extra balls.
  3. Gravity Well: Type gmax at a new game to activate Gravity Well.
  4. Promotion: Type rmax at a new game or while playing to get instant promotion and raising rank.
  5. Extra points with partial shots: Partially shot the ball just to pass the yellow light bars. There are 6 bars. With the first bar, you'll get 15,000 points, 2nd: 30,000,...
  6. Extra points with partial shots: Partially shot the ball just to pass the yellow light bars. There are 6 bars. With the first bar, you'll get 15,000 points, 2nd: 30,000,...
  7. Test Mode: Type hidden test with a new ball or new game. Now you can use your mouse to drag and move the ball where you want.


Wednesday, July 20, 2011

Facebook Security Tips..............................@

World wide web is now expending, Internet has successfully turn the whole world into a village and for doing this social networks played and playing an important role, in the era of social networks there is a facebook,  Facebook has a large number of user's and it is on hit list of attacker's and scam-er. 
While you are using facebook or any social networking website there is a need to protect your information by using effective privacy techniques. 
This article will talk about some security issues and their countermeasure on facebook or it can be applicable on other social networking websites.
 
 
Strong Passwords

You must care about your passwords, make sure you have a strong password that contain capital letters,small letters,numbers and special characters. Use different password for different online accounts, your password must not related to some of your information, do not use such a words that are easily available on dictionary. To learn more about dictionary attack click here.

Secure Browsing 
It is good practice to keep yourself up to date means make sure that you are using update OS and browser to avoid browser exploitation attack, use secure connection (HTTPS) where possible to avoid sniffing.

Computer Security  
It is very important to stay secure on web, make sure your computer does not contain any sort of keyloggers, RAT (remote administration tool) and istealer or some other things like this. Use a smart antivirus and firewall solution to remain secure, if you think that your computer got affected by some malware and than follow the procedure to fight with.

Personal Information 
Avoid to put so much information about yourself on facebook profile, a hacker might be use these information to hack your password by using reverse engineering technique, or an attacker might create a dictionary by using your information to launch a password based attack.

Profile Privacy Setting
It is recommended to make your profile as a privacy master profile, hide your information from those people to whom you never trust and from those people who are new to you, disable each and everything from those who have not added into your profile as a friend, because there is chance that someone watching your activities.

Application Setting
Each facebook application has a default setting and when you allow any application to use, it means that you have signed an agreement and the developer of this application may watch all of your activities and can get your password, can update your status and more, so avoid applications as much as possible. To learn more about application spamming click here.

 Account Security 
It is good practice to add different email address for your single profile and must connect your mobile phone with your profile, in case if you lost your account than you have an ability to prove as a owner of this account, lean more security to protect your account.

More Tips
  • You must not share your password to any one.
  • Disable your browser from saving your password.
  • Avoid to sign in your account when you are in public place.
  • If you are using wireless LAN(WLAN) than must think about firesheep.
     
 
 
 
 
 

Sunday, May 1, 2011

EMAIL HACKING :HACKING MYSPACE, HOTMAIL, MSN, YAHOO ACCOUNT PASSWORD USING VICSPY KEYLOGGER


Hello Friends here is tutorial about hacking Myspace , Hotmail, MSN, Yahoo accounts with easy as 1 2 3 . 
Introducing a New and very effective keylogger namely Vicspy keylogger - the keylogger tht I found extremely Good and user-friendly for hacking hotmail, yahoo account passwords. I have provided link for software download... So Enjoy and Let's Begin the Tutorial .



1. Download Vickspy Keylogger for hacking Hotmail, Yahoo, msn account password.

2. Extract the Rar to obtain Vicspy keylogger.

3. Simply run peditor.exe to get keylogger interface and create a keylogger for hacking hotmail, yahoo and msn account password. No need to install software on computer.

4. Now, in Servers , fill in the FTP server which you wanna use to receive logs from keylogger.

Fill in ftp server as:

where:
# user: your username at ftp server.
# pass: your password.
# logs: create a new folder named "logs" at your ftp server. You will receive hotmail, yahoo and msn hacked passwords in this folder.
# ftp.example.com : your ftp server address. (eg: ftp.drivehq.com for drivehq ftp server)

After you have completed filling ftp server, hit on "Check" just adjacent to it to check whether you have entered ftp server correctly and whether server is available.

5. In Control, check "Melt" to make keylogger evaporate after installation on victim computer.

6. Additional Options included in Vicspy keylogger are that you can
- Change keylogger file icon
- Bind keylogger with another file to make it undetectable by victim.

7. Now, simply choode the path where you want keylogger to be saved and hit on "Create" to create keylogger file at preferred destination.

8. Now, send this file to your victim and make him to install this binded keylogged file on his computer (Social engineering). You can crypt this keylogger file and then use Fake error message generator to make our keylogger undetectable by antivirus.

Once the victim install keylogger on his computer, you will start receiving all typed passwords on his computer in your FTP server account (in logs folder). Thus, our target of hacking hotmail, yahoo, msn account password accomplished.

That's ALL About Vicspy Keylogger for hacking hotmail, Yahoo and msn account password. Vicspy keylogger can also be used for hacking myspace, gmail, orkut and other email account passwords.

Monday, March 7, 2011

Rapidshare Hack


1) Rapidshare Hack (For Firefox Users) :-
The hot new Firefox plug-in takes browser customization to a whole new level by
letting users filter site content or change page behaviors.
The glory of open-source software is that it allows anyone with the inclination and the
scripting knowledge to get under the hood and hot-rod their computing environment.
But most of the time, that advantage is available only to people with the programming
skills to make the changes they want.
That's where Greasemonkey, a free plug-in for Firefox, comes in -- it simplifies hacking
the browser.
Released at the end 2004, Greasemonkey is the latest in a growing arsenal of Firefox
customization tools.
It changes how Web pages look and act by altering the rendering process.
http://greasemonkey.mozdev.org/
1) Install the Greasemonkey extension>>
http://downloads.mozdev.org/greasemonkey/greasemonkey_0.2.6.xpi
2) Restart Firefox
3) Go to http://rapidshare.de/files/1034529/rapidshare.user.js.html
4) Right click on rapidshare.user.js and choose "Install User Script".
5) Run FireFox.
6) From 'File' Menu click on Open File then browse to whereever you saved the
'greasemonkey.xpi' plug-in.
Open it, wait a couple seconds for the install button becomes active.
7) Click on it to install this plug-in then CLOSE FIREFOX.
8) Run FireFox again.
From the File Menu click on Open File then browse to whereever you saved the
'rapidshare.user.js'.
9) Open it.
10) Click the Tools Menu then click on Install User Script then click OK.
11) Close FireFox.
The script will let you enjoy "no wait" and multiple file downloads......!

Saturday, March 5, 2011

The Magic of DOS

Part I: The Magic of DOS

In this guide you will learn how to telnet <beginninea.shtml>, forge email, <beginnineb.shtml> use
nslookup <beginninec.shtml> and netcat <beginnined.shtml> with Windows XP.
So you have the newest, glitziest, "Fisher Price" version of Windows: XP. How can you use XP in a way that sets you apart from the boring millions of ordinary users?
****************
Luser Alert: Anyone who thinks this GTMHH will reveal how to blow up people's TV sets and steal Sandra Bullock's email is going to find out that I won't tell them how.
****************
The key to doing amazing things with XP is as simple as D O S. Yes, that's right, DOS as in MS-DOS, as in MicroSoft Disk Operating System. Windows XP (as well as NT and 2000) comes with two versions of DOS. Command.com is an old DOS version. Various versions of command.com come with Windows 95, 98, SE, ME, Window 3, and DOS only operating systems.
The other DOS, which comes only with the XP, 2000 and NT operating systems, is cmd.exe. Usually cmd.exe is better than command.com because it is easier to use, has more commands, and in some ways resembles the bash shell in Linux and other Unix-type operating systems. For example, you can repeat a command by using the up arrow until you back up to the desired command. Unlike bash, however, your DOS command history is erased whenever you shut down cmd.exe. The reason XP has both versions of DOS is that sometimes a program that won?t run right in cmd.exe will work in command.com
****************
Flame Alert: Some readers are throwing fits because I dared to compare DOS to bash. I can compare cmd.exe to bash if I want to. Nanny nanny nah nah.
****************
DOS is your number one Windows gateway to the Internet, and the open sesame to local area networks. From DOS, without needing to download a single hacker program, you can do amazingly sophisticated explorations and even break into poorly defended computers.
****************
You can go to jail warning: Breaking into computers is against the law if you do not have permission to do so from the owner of that computer. For example, if your friend gives you permission to break into her Hotmail account, that won't protect you because Microsoft owns Hotmail and they will never give you permission.
****************
****************
You can get expelled warning: Some kids have been kicked out of school just for bringing up a DOS prompt on a computer. Be sure to get a teacher's WRITTEN permission before demonstrating that you can hack on a school computer.
****************
So how do you turn on DOS?
Click All Programs -> Accessories -> Command Prompt
That runs cmd.exe. You should see a black screen with white text on it, saying something like this:
Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.
C:\>
Your first step is to find out what commands you can run in DOS. If you type "help" at the DOS prompt, it gives you a long list of commands. However, this list leaves out all the commands hackers love to use. Here are some of those left out hacker commands.
TCP/IP commands:
telnet
netstat
nslookup
tracert
ping
ftp
NetBIOS commands (just some examples):
nbtstat
net use
net view
net localgroup
TCP/IP stands for transmission control protocol/Internet protocol. As you can guess by the name, TCP/IP is the protocol under which the Internet runs. along with user datagram protocol (UDP). So when you are connected to the Internet, you can try these commands against other Internet computers. Most local area networks also use TCP/IP.
NetBIOS (Net Basic Input/Output System) protocol is another way to communicate between computers. This is often used by Windows computers, and by Unix/Linux type computers running Samba. You can often use NetBIOS commands over the Internet (being carried inside of, so to speak, TCP/IP). In many cases, however, NetBIOS commands will be blocked by firewalls. Also, not many Internet computers run NetBIOS because it is so easy to break in using them. We will cover NetBIOS commands in the next Guide to XP Hacking.

Now you can see 2 batch files loc and key.press loc and the folder movies will change to control panel andyou will get back our original folder.
Note:- it is safe as in case if you loose the key file you can create it again but the folder name must be correct.

Thursday, March 3, 2011

folder lock

Suppose you want to lock the folder  movies in d: which has the path D:/movies
In the same drive create a text file and type
ren movies movies.{21EC2020-3AEA-1069-A2DD-08002B30309D}
Now save this text file as loc.bat
Create another text file and type it
Ren movies.{21EC2020-3AEA-1069-A2DD-08002B30309D} movies
Now save this text fie as key.bat