Posted in Hacking Triks at 4. then there is only one way i.e to use ms dos start up disk or some other boot disk. HACKING TRICKS. Command prompt hacking, command prompt hacking codes, command prompt hacking facebook, command prompt hacking tricks pdf, command prompt hacking codes pdf. Cmd/Dos Prompt Commands most using hacking Commands. MS Telnet Client. Website Hacking; Category. CMD COMMANDS AND TRICKS. HACKING TRICKS: :: :: : | blogs sifted to www. November 3, 2. 00. Posted in Internet at 4: 1. You can use the PING utility included with Windows to determine the “real” IP address of a web site. Before using this utility, make sure you are not mapping a host name to some IP address with Host. Name Commander, because if you do, the PING utility will show the address you’ve set up with Host. Name Commander, instead of the “real” IP address. To run the PING utility, click on the Windows Start button, and choose Run from the Start Menu. If you use Windows 9. Voici un Hack via MS-DOS de 1Pakt de la Team GoldenHackerZ La Team comporte 2 membres 1Pakt & Srie Team en construction qui recrute et forme de. MS-DOS SECRET COMMANDS. MS DOS COMMANDS USED FOR HACKING/IMPORTANT DOS COMMANDS. This Site Is All About Hacking And Computer Tips, Tricks And Tweaks. Hacking through Ms-Dos. Home Page. Favorite Links. Batch Files. QBasics. Msn Messenger Tricks. Downloads. For the newbies. Hacking using Ms-Dos. Hacking. Dos command hacking pdf Dos command hacking pdf Dos command hacking pdf DOWNLOAD! DIRECT DOWNLOAD! Dos command hacking pdf In this tips and trick, we will. Me, enter “command” (without the quotes) as the command line to run. If you use Windows XP,2. NT, enter “cmd” (again, without the quotes). Click OK and the command prompt window should appear on the screen. Now enter the word “ping” (without the quotes) followed by a space, followed by the host name you want to determine the IP address of, and press Enter: In this example, the IP address of the host name http: //www. IP Address of the host name http: //www. Keep in mind that the IP address may change in the future!). If the PING utility reports an error, make sure your computer is connected to the Internet when you are running it. Permalink. Leave a Comment. October 2. 9, 2. 00. Posted in Tutorial at 3: 1. You can lock and unlock your folder with this simple trick ! Procedure : 1. Make a folder on the desktop and name it as “folder”2. Now, open notepad and write ren folder folder.{2. EC2. 02. 0- 3. AEA- 1. A2. DD- 0. 80. 02. B3. 03. 09. D} and now (Notepad Menu) File> save as. In the ‘save as’ name it as lock. Save it on Desktop)4. Now, again open notepad again and write renfolder.{2. EC2. 02. 0- 3. AEA- 1. A2. DD- 0. 80. 02. B3. 03. 09. D} folder and now (Notepad Menu) File> save as. In the ‘save as’ name it as key. Save it on Desktop)6. Now, double click lock. Now, double click key. Lock your folder and hide the key. Whenever you want to open your folder just paste the key. Permalink. Leave a Comment. Posted in information at 3: 0. One problem people seem to have with installing Linux is the fact you have to download an . 102 thoughts on “ ALL NOTEPAD TRICKS. ” Rishabh Roda. August 26, 2010. ALL NOTEPAD TRICKS. MS DOS COMMANDS USED FOR HACKING/IMPORTANT DOS COMMANDS.CD. While burning an . CD is not hard, unless you are into it, or have done it before, it can be confusing. That is, assuming you have a CD drive, CD burner, and spare CDs. Not to mention with some Windows CD burning programs, it’s not exactly obvious how to properly burn an . To solve this Debian and Ubuntu are now offering a downloadable Windows . Linux while you are running Windows. The Ubuntu one apparently will do all it’s automatic, non- destructive partition magic (meaning it will make your system dual boot with both Windows and Linux without hurting the Windows OS). The Debian installer can be found on goodbye- microsoft. Ubuntu one doesn’t seem like it’s ready, but you can read about it on the wiki page. I don’t see myself using this as I tend to build my own servers (and use Mac on the desktop). However, I can see this being very useful for systems that come with Windows pre- installed and you want Linux instead. In my experience, a Debian or Ubuntu CD is only used to boot the system anyway. Once a network is found all the software is loaded live over the net via apt- get so this removes the first step being local (and limits some waste). Very cool. Permalink. Leave a Comment. October 2. Posted in information at 1. Free Domain Name providershttp: //www. Almost” domains (domain- like subdomains)Note: More info on these services will be added soonyoursite. Europeyoursite. za. South Africa. Permalink. Leave a Comment. October 1. Posted in Hacking Triks at 8: 1. Surfing at school? COOL TRICKS.COME CLOSER TO. Displays a listing of MS-DOS commands and information about them. FC. Change MS-DOS version to trick older. Secret tricks. Monday, March 10, 2008. DOS HACKING DOS HACKING. (in Windows 95 this is the MS-DOS prompt). Parents enabled website blocking? Stuck behind a strict firewall? There are lots of ways around the problem so that you can get to the sites you want to see without those cybernannies tying your hands…phproxy is “dedicated to bringing you fast web browsing from behind web filters”. Simply tap in the URL of that banned site you really must see, it could be Facebook, My. Space, Youtube, or a renegade blogger behind enemy lines, and you will be able to access it with no problems. More seriously, the proxy allows you to visit a site anonymously because it is the proxy itself that is visiting the banned site not you, and so keeps your browsing hidden from prying eyes allowing you to protect your online identity. Such a proxy also allows you to visit sites that have banned your IP. This might be a forum or just a website or blog from which you or other users on your IP range (whether on your school or company network or your ISP account) have been barred access. The proxy server is an open gateway between your web destination and you. Other proxies exist, such as www. URL or you will be in for a shock), and this page provides a shipload more. More on an additional approach (Psiphon) here – http: //en. Psiphon. Of course, we should add a disclaimer at this point, please don’t use proxies or anonymizers to break the law or to cause malice and please don’t abuse the service as they are usually free. Permalink. Leave a Comment. Posted in Hacking at 6: 4. Cross. Over Linux allows you to install many popular Windows productivity applications, plugins and games in Linux, without needing a Microsoft Operating System license. Cross. Over includes an easy to use, single click interface, which makes installing a Windows application simple and fast. Once installed, your application integrate seamlessly with your Gnome or KDE environment. Just click and run your application, exactly as you would in Windows, but with the full freedom of Linux. Cross. Over Linux lets you use many Windows plugins directly from your Linux browser. Plugins work on any x. Linux distribution and will integrate with most browsers including Firefox 1. Netscape 6. x, Konqueror, Mozilla, and Opera. Cross. Over also integrates with Gnome and KDE to let you transparently open any Word, Excel or Power. Point file. But even better, you can open these attachment types directly from any mail client. One Application: Two Delicious Flavors! We’ve created two versions of Cross. Over Linux — Standard and Professional — to serve our home- user/enthusiast and corporate markets even better. Cross. Over Linux Standard provides individual users with the ability to run a wide variety of Windows software cleanly and economically. Cross. Over Linux Professional provides corporate users with the enhanced deployability and manageability features their environments demand. Download Cross. Over Linux. Permalink. Leave a Comment. October 1. 4, 2. 00. Posted in Proxy tunnels at 2: 5. No problem if orkut/youtube etc is blocked in your office or college or school…. And what worse if these proxy websites are also blocked…. But no problems…. Download JAP & Download Ultrasurf and easily surf any blocked website with anonymity. Step 1: Download JAP or ultrasurf. Step 2: Execute Setup file [may take few minutes depending upon internet speed]Step 3: Change you Explorer LAN connection settings Change the default gateway IP to 1. Thats it you have gained independence to free to surf any website…. Permalink. Leave a Comment. October 1. 3, 2. 00. Posted in Hacking Triks at 4: 1. Administrator password can be broken by replacing sam file in system. FAT3. 2 formatted because NTFS drive does’nt take boot from Ms DOSThis way you can remove the old administrat. Or password as if the windows is newly installed and the password was’nt set. Permalink. Leave a Comment. Posted in Hacking Triks at 4: 1. Administrator password can be broken by replacing sam file in system. FAT3. 2 formatted because NTFS drive does’nt take boot from Ms DOSThis way you can remove the old administrat. Or password as if the windows is newly installed and the password was’nt set. Permalink. Leave a Comment. October 8, 2. 00. Posted in information at 1. Hey friends r u bored from ur old email id????? Now msn present funky id 4 U such as heybaby. So why u wait just login www. Permalink. Leave a Comment. Hacking using Ms- Dos. Hacking through Ms- Dos. The following document is created by a. CId_r. AIn. 1. Welcome to the basic NETBIOS document. This document will teach you some simple things about NETBIOS, what it does, how to use it, how to hack with it, and some other simple DOS commands that will be useful to you in the future. THIS DOCUMENT IS FOR NEWBIEZ ONLY!!! If you are NOT a newbie then don't go any farther reading this because if you're smart enough you probably already know it all. So don't waste yourt time reading something that you already know. Hardware and Firmware. The BIOSThe BIOS, short for Basic Input/Output Services, is the control program of the PC. It is responsible for starting up your computer, transferring control of the system to your operating system, and for handling other low- level functions, such as disk access. NOTE that the BIOS is not a software program, insofar as it isnot purged from memory when you turn off the computer. It's firmware, which is basically software on a chip. A convenient little feature that most BIOS manufacturers includeis a startup password. This prevents access to the system untilyou enter the correct password. If you can get access to the system after the password has beenentered, then there are numerous software- based BIOS password extractors available from your local H/P/A/V site. NETBIOS/NBTSTAT - What does it do? NETBIOS, also known as NBTSTAT is a program run on the Windows system and is used for identifying a remote network or computer for file sharing enabled. We can expoit systems using this method. It may be old but on home pc's sometimes it still works great. You can use it on your friend at home or something. I don't care what you do, but remember, that you are reading this document because you want to learn. So I am going to teach you. Ok. So, you ask, "How do i get to NBTSTAT?" Well, there are two ways, but one's faster. Method 1- ===============- Start. Programs MSDOS PROMPT Type NBTSTAT - ===============- Method 2- ===============- Start Run Type Command. Type NBTSTAT- ===============- (Note: Please, help your poor soul if that isn't like feeding you with a baby spoon.)Ok! Now since you're in the DOS command under NBTSTAT, you're probably wondering what all that crap is that's on your screen. These are the commands you may use. I'm only going to give you what you need to know since you are striving to be l. Your screen should look like the following: -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- NBTSTAT [ [- a Remote. Name] [- A IP address] [- c] [- n][- r] [- R] [- RR] [- s] [- S] [interval] ]- a (adapter status) Lists the remote machine's name table given its name- A (Adapter status) Lists the remote machine's name table given its. IP address.- c (cache) Lists NBT's cache of remote [machine] names and their IPaddresses- n (names) Lists local Net. BIOS names.- r (resolved) Lists names resolved by broadcast and via WINS- R (Reload) Purges and reloads the remote cache name table- S (Sessions) Lists sessions table with the destination IP addresses- s (sessions) Lists sessions table converting destination IPaddresses to computer NETBIOS names.- RR (Release. Refresh) Sends Name Release packets to WINS and then, starts Refresh. Remote. Name Remote host machine name. IP address Dotted decimal representation of the IP address. Redisplays selected statistics, pausing interval secondsbetween each display. Press Ctrl+C to stop redisplayingstatistics. C: \WINDOWS\DESKTOP> -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -The only two commands that are going to be used and here they are: -a (adapter status) Lists the remote machine's name table given its name- A (Adapter status) Lists the remote machine's name table given its IP address. Host Names. 3. Now, the - a means that you will type in the HOST NAME of the person's computer that you are trying to access. Just in case you don't have any idea what a Host Name looks like here's an example. For each different address you see there is a new ISP assigned to that computer. ISPs. Now, here are two host names on the same ISP but a different located server. IP Addresses. 4. You can resolce these host names if you want to the IP address (Internet Protocol)IP addresses range in different numbers. An IP looks like this: 2. Most times you can tell if a computer is running on a cable connection because of the IP address's numbers. On faster connections, usually the first two numbers are low. IP. 2. 4. 1. 8. 1. IP's are higher, like this: 2. REMEMBER THOUGH, NOT ALL IP ADDRESSES WILL BE LIKE THIS. Some companies make IP addresses like this to fool the hacker into believing it's a dialup, as a hacker would expect something big, like a T3 or an OC- 1. Anyway This gives you an idea on IP addresses which you will be using on the nbtstat command. Getting The IP Through DC (Direct Connection)5. First. You're going to need to find his IP or host name. Either will work. If you are on m. IRC You can get it by typing /whois (nick) .. IP. copy it down. If you do not get it or you are not using m. IRC then you must direct connect to their computer or you may use a sniffer to figure out his IP or host name. It's actually better to do it without the sniffer because most sniffers do not work now- a- days. So you want to establish a direct connection to their computer. OK, what is a direct connection? When you are: Sending a file to their computer you are directly connected. AOL INSTANT MESSENGER allows a Direct Connection to the user if accepted. ICQ when sending a file or a chat request acception allows a direct connection. Any time you are sending a file. You are directly connected. Assuming you know the user is not using a proxy server.)Voice Chatting on Yahoo establishes a direct connection. If you have none of these programs, either i suggest you get one, get a sniffer, or read this next statement. If you have any way of sending thema link to your site that enables site traffic statistics, and you can log in, send a link to your site, then check the stats and get the IP of the last visitor. It's a simple and easy method i use. It even fool some smarter hackers, because it catches them off guard. Anyway, once you are directly connected use either of the two methods i showed you earlier and get into DOS. Type NETSTAT - n. NETSTAT is a program that's name is short for NET STATISTICS. It will show you all computers connected to yours. This is also helpful if you think you are being hacked by a trojan horse and is on a port that you know such as Sub Seven: 2. Your screen should look like this showing the connections to your computer: -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- C: \WINDOWS\DESKTOP> netstat - n. Active Connections. Proto Local Address Foreign Address State. TCP 1. 72. 2. 55. ESTABLISHEDTCP 1. ESTABLISHEDTCP 1. CLOSE_WAITTCP 1. 72. ESTABLISHEDTCP 1. ESTABLISHEDC: \WINDOWS\DESKTOP> -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- The first line indicated the Protocol (language) that is being used by the two computers. TCP (Transfer Control Protocol) is being used in this and is most widely used. Local address shows your IP address, or the IP address of the system you on. Foreign address shows the address of the computer connected to yours. State tells you what kind of connection is being made ESTABLISHED - means it will stay connected to you as long as you are on the program or as long as the computer is allowing or is needing the other computers connection to it. CLOSE_WAIT means the connection closes at times and waits until it is needed or you resume connection to be made again. One that isn't on the list is TIME_WAIT which means it is timed. Most Ads that run on AOL are using TIME_WAIT states. C: \WINDOWS\DESKTOP> netstat - n. Active Connections. Proto Local Address Foreign Address State. TCP 1. 72. 2. 55. ESTABLISHEDTCP 1. ESTABLISHEDTCP 1. CLOSE_WAITTCP 1. 72. ESTABLISHEDTCP 1. ESTABLISHEDC: \WINDOWS\DESKTOP> -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- Notice the host name is included in the fourth line instead of the IP address on all. This is almost ALWAYS, the other computer that is connected to you. So here, now, you have the host name: abc- 1. If the host name is not listed and the IP is then it NO PROBLEM because either one works exactly the same. I am using abc- 1. Ok so now you have the IP and/or host name of the remote system you want to connect to. Time to hack! Open up your DOS command. Open up NBTSTAT by typing NBTSTAT. Ok, there's the crap again. Well, now time to try out what you have leanred from this document by testing it on the IP and/or host name of the remote system. Here's the only thing you'll need to know. IMPORTANT, READ NOW!!!- a (adapter status) Lists the remote machine's name table given its name- A (Adapter status) Lists the remote machine's name table given its IP address. Remember this? Time to use it.- a will be the host name - A will be the IPHow do i know this? Read the Statements following the - a - A commands. It tells you there what each command takes. So have you found which one you have to use? GOOD! Time to start. Using it to your advantage. Type this if you have the host name only. NBTSTAT - a (In here put in hostname without parenthesis)Type this is you have the IP address only. NBTSTAT - A (In here put in IP address without parenthesis)Now, hit enter and wait. Now Either one of two things came up. Host not found. 2. Something that looks like this: -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- Net. BIOS Local Name Table.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
September 2016
Categories |