Jump to content

ToxicBlood

Members
  • Posts

    31
  • Joined

  • Last visited

Everything posted by ToxicBlood

  1. trojan-ul asta este nefunctionabil ... sursa nu a fost terminata nici acuma desi sa compilat exe-ul ...
  2. • Pmaker (Patch Maker) • Process (Process Explorer) • Regmon (Reg Editor) • CodeFusion • Hash • Cr@kdownloader • RSA Tool • EVA Cleaner • Filemon • PE Identifaction • Black OS (XP Activator) • MEW 11 • FSG • Softice • Serials 2K • ResHacker • W32dasm • UnPatcher Link : http://www.mediafire.com/?0hdhnjh4dgv Passwd : toxicblood
  3. @nemessis poti uploada undeva google_adsense.php ,css3.js.... ptr. ca link-uld at in tut tau >> http://rstzone.net/xssrefere.zip << nu merge ..
  4. Antivirus Version letzte aktualisierung Ergebnis AhnLab-V3 2007.10.19.0 2007.10.18 - AntiVir 7.6.0.27 2007.10.19 - Authentium 4.93.8 2007.10.19 - Avast 4.7.1051.0 2007.10.19 - AVG 7.5.0.488 2007.10.19 - BitDefender 7.2 2007.10.20 - CAT-QuickHeal 9.00 2007.10.19 - ClamAV 0.91.2 2007.10.17 - DrWeb 4.44.0.09170 2007.10.19 - eSafe 7.0.15.0 2007.10.15 - eTrust-Vet 31.2.5225 2007.10.20 - Ewido 4.0 2007.10.19 - FileAdvisor 1 2007.10.20 - Fortinet 3.11.0.0 2007.10.19 - F-Prot 4.3.2.48 2007.10.19 - F-Secure 6.70.13030.0 2007.10.19 - Ikarus T3.1.1.12 2007.10.20 - Kaspersky 7.0.0.125 2007.10.20 - McAfee 5145 2007.10.19 - Microsoft None 2007.10.20 - NOD32v2 2604 2007.10.19 - Norman 5.80.02 2007.10.19 - Panda 9.0.0.4 2007.10.19 - Prevx1 V2 2007.10.20 - Rising 19.45.50.00 2007.10.20 - Sophos 4.22.0 2007.10.19 - Sunbelt 2.2.907.0 2007.10.18 - TheHacker 6.2.9.100 2007.10.19 - VBA32 3.12.2.4 2007.10.19 - VirusBuster 4.3.26:9 2007.10.19 - Webwasher-Gateway 6.6.1 2007.10.19 - weitere Informationen File size: 51231 bytes MD5: b4d02eedd0caf8c2f2326ab83ce268f7 SHA1: 67380941cee0e0b28a3f1859e831a7dff1f20e9c Link : http://rapidshare.com/files/63930130/wh_cryp_by_cybe.rar
  5. Hackerii au deblocat din nou telefonul iPhone Hackerii au raspuns astfel unui update lansat de Apple care dezactiva telefoanele modificate. iPhone Development Project a dezvoltat o metoda de instalare a aplicatiilor third-party si de folosire a altor retele GSM decat AT&T, anunta The Unofficial Apple Weblog. Actualizarea softului iPhone la versiunea 1.1.1 dezactiva telefoanele modificate si oprea functionarea aplicatiilor third-party, conform avertismentelor Apple care au precedat lansarea sa. Hackerii au descoperit deja o metoda de a corecta modificarile operate de acest update. Ultima metoda hacking permite utilizatorilor care au instalat deja upgrade-ul de firmware 1.1.1 sa revina la varianta anterioara, sa deblocheze dispozitivul si apoi sa actualizeze din nou la 1.1.1, functiile telefonului mobil ramanand operationale. Este de asteptat ca Apple sa lanseze noi upgrade-uri firmware care sa blocheze dispozitivul, din cauza operatorilor de telefonie mobila care au convenit sa cedeze portiuni semnificative din veniturile lor provenind de la utilizatorii iPhone, in schimbul drepturilor exclusive in anumite tari. De asemenea, specialistii se asteapta ca Apple sa vanda aplicatii autorizate dezvoltate de partenerii sai apropiati, care vor primi acces la kiturile de dezvoltare software. iPhone Alley prezinta metoda de deblocare la adresa http://www.iphonealley.com , dar avertizeaza ca nu este recomandata utilizatorilor neexperimentati, fiind necesara folosirea interfetei in linie de comanda a iPhone. Cei care si-au blocat telefoanele dupa upgrade-ul la versiunea firmware 1.1.1 si le pot repune in functiune cu aplicatia iPhone SimFree disponibila la adresa: http://www.iphonesimfree.com/cgi-bin/iphonesimfree/engine.pl?page=home . Aceasta foloseste o vulnerabilitate TIFF buffer overflow din Safari pentru a rula cod pe dispozitiv, vulnerabilitate care va fi probabil corectata de Apple la urmatoarele update-uri. Sursa : gecadnet
  6. Link : http://www.cos-cug.org/presentations.html
  7. Perfect Keylogger 1.6.2 Keylogger King Pro 3.3 KeyLogger 3.0 Perfect Keylogger Lite 1.15 Sys Keylog 1.0 SC-Keylog Pro 3.1 Stealth Keylogger 3.1 KidLogger 1.4 Ardamax Keylogger 2.41 Link : http://rapidshare.com/files/63415870/pack.rar
  8. le gasesti aici http://ircd.bircd.org/download.html P.S: apropo nu ai postat unde trebuia !
  9. vezi ca trebuie sa postezi si site-ul oficial cum ar fi la acesta www.winamp.com ..
  10. O adresa a unui FTP ce contine sute de programe : Link : ftp://ftp.freenet.de/pub/filepilot/windows/
  11. Link 1 : http://rapidshare.com/files/62997220/Pussy_Crypter_v2.rar Link 2 : http://www.mediafire.com/?eivywxb04e0
  12. * VisualRoute 2007 : Link : http://rapidshare.com/files/47062221/vr2007.rar Analyze Internet connections and get reports of network performance and connection quality, see the path of the connection and where any slowdowns or lost data occurs.
  13. * Retina Sasser : Link : http://rapidshare.com/files/47059070/RetinaSasser.rar
  14. * Messenger Scan : Link : http://rapidshare.com/files/47058752/messengerscan.zip
  15. MS-DOS Hacking : By KeyDet89 keydet89@yahoo.com ****************************************************** In this Guide you will learn how to: * Use telnet from Windows * Download web pages via telnet * Get finger information via telnet * Telnet from the DOS command-line * Use netcat * Break into Windows Computers from the Internet Protecting Yourself What can they do The command-line approach The GUI approach Final Words ************************************************************ How to Use Telnet on a Windows Computer Telnet is great little program for doing a couple of interesting things. In fact, if you want to call yourself a hacker, you absolutely MUST be able to telnet! In this lesson you will find out a few of the cool things a hacker can do with telnet. If you are using Win95, you can find telnet in the c:\windows directory, and on NT, in the c:\winnt\system32 directory. There isn't a lot of online help concerning the usage of the program, so my goal is to provide some information for new users. First off, telnet isn't so much an application as it is a protocol. Telnet is protocol that runs over TCP/IP, and was used for connecting to remote computers. It provides a login interface, and you can run command-line programs by typing the commands on your keyboard, and the programs use the resources of the remote machine. The results are displayed in the terminal window on your machine, but the memory and CPU cycles consumed by the program are located on the remote machine. Therefore, telnet functions as a terminal emulation program, emulating a terminal on the remote machine. Now, telnet runs on your Win95 box as a GUI application...that is to say that you can type "telnet" at the command prompt (in Windows 95 this is the MS-DOS prompt), and assuming that your PATH is set correctly, a window titled "telnet" will open. This differs from your ftp program in that all commands are entered in the DOS window. Let's begin by opening telnet. Simply open a DOS window by clicking "start", then "programs", then "MS-DOS", and at the command prompt, type: c:\telnet The window for telnet will open, and you can browse the features of the program from the menu bar. *************************************************** NEWBIE NOTE: In this text file, I am referring only to the telnet program that ships with Win95/NT. If you type "telnet" at the command prompt and you don't get the telnet window, make sure that the program is on your hard drive using the Start -> Find -> Files or Folders command. Also make sure that your path statement includes the Windows directory. There are many other programs available that provide similar functionality, with a lot of other bells and whistles, from any number of software sites. ************************************************* To learn a bit more about telnet, choose Help -> Contents, or Help -> Search for help on... from the menu bar. Read through the files in order to find more detailed explanations of things you may wish to do. For example, in this explanation, I will primarily be covering how to use the application and what it can be used for, but now how to customize the colors for the application. Now, if you choose Connect -> Remote System, you will be presented with a dialog window that will ask you for the remote host, the port and the terminal type. **************************************************** NEWBIE NOTE: For most purposes, you can leave the terminal type on VT100. **************************************************** In the Connect dialog box, you can enter in the host to which you wish to connect, and there is a list box of several ports you can connect to: daytime: May give you the current time on the server. echo: May echo back whatever you type in, and will tell you that the computer you have connected to is alive nd running on the Internet. qotd: May provide you with a quote of the day. chargen: May display a continuous stream of characters, useful for spotting network problems, but may crash your telnet program. telnet: May present you with a login screen. These will only work if the server to which you are trying to connect is running these services. However, you are not limited to just those ports...you can type in any port number you wish. (For more on fun ports, see the GTMHH, "Port Surf's Up.") You will only successfully connect to the port if the service in question is available. What occurs after you connect depends upon the protocol for that particular service. When you are using telnet to connect to the telnet service on a server, you will (in most cases) be presented with a banner and a login prompt. [Note from Carolyn Meinel: Many people have written saying their telnet program fails to connect no matter what host they try to reach. Here's a way to fix your problem. First -- make sure you are already connected to the Internet. If your telnet program still cannot connect to anything, here's how to fix your problem. Click "start" then "settings" then "control panel." Then click "Internet" then "connection." This screen will have two boxes that may or may not be checked. The top one says "connect to the Internet as needed." If that box is checked, uncheck it -- but only uncheck it if you already have been having problems connecting. The bottom box says "connect through a proxy server." If that box is checked, you probably are on a local area network and your systems administrator doesn't allow you to use telnet.] ********************************************* NEWBIE NOTE: It's not a good idea to connect to a host on which you don't have a valid account. In your attempts to guess a username and password, all you will do is fill the log files on that host. From there, you can very easily be traced, and your online service provider will probably cancel your account. ********************************************** Now, you can also use telnet to connect to other ports, such as ftp (21), smtp (25), pop3 (110), and even http (80). When you connect to ftp, smtp, and pop3, you will be presented with a banner, or a line of text that displays some information about the service. This will give you a clue as to the operating system running on the host computer, or it may come right out and tell you what the operating system is...for instance, AIX, Linux, Solaris, or NT. If you successfully connect to port 80, you will see a blank screen. This indicates, again, that you have successfully completed the TCP negotiation and you have a connection. Now, what you do from there is up to you. You can simply disconnect with the knowledge that, yes, there is a service running on port 80, or you can use your knowledge of the HTTP protocol to retrieve the HTML source for web pages on the server. How to Download Web Pages Via Telnet To retrieve a web page for a server using telnet, you need to connect to that server on port 80, generally. Some servers may use a different port number, such as 8080, but most web servers run on port 80. The first thing you need to do is click on Terminal -> Preferences and make sure that there is a check in the Local Echo box. Then, since most web pages will generally take up more than a single screen, enable logging by clicking Terminal -> Start Logging... and select a location and filename. Keep in mind that as long as logging is on, and the same file is being logged to, all new information will be appended to the file, rather than overwriting the original file. This is useful if you want to record several sessions, and edit out the extraneous information using Notepad. Now, connect the remote host, and if your connection is successful, type in: GET / HTTP/1.0 and hit enter twice. ************************************************** NEWBIE NOTE: Make sure that you hit enter twice...this is part of the HTTP protocol. The single / after GET tells the server to return the default index file, which is generally "index.html". However, you can enter other filenames, as well. ************************************************* You should have seen a bunch of text scroll by on the screen. Now you can open the log file in Notepad, and you will see the HTML code for the page, just as though you had chosen the View Source option from your web browser. You will also get some additional information...the headers for the file will contain some information about the server. For example: HTTP/1.0 200 Document follows Date: Thu, 04 Jun 1998 14:46:46 GMT Server: NCSA/1.5.2 Last-modified: Thu, 19 Feb 1998 17:44:13 GMT Content-type: text/html Content-length: 3196 One particularly interesting piece of information is the server name. This refers to the web server software that is running and serving web pages. You may see other names in this field, such as versions of Microsoft IIS, Purveyor, WebSite, etc. This will give you a clue as to the underlying operating system running on the server. ************************************************* SYSADMIN NOTE: This technique, used in conjunction with a database of exploits on web servers, can be particularly annoying. Make sure you keep up on exploits and the appropriate security patches from your web server and operating system vendors. ************************************************* ************************************************* NEWBIE NOTE: This technique of gathering web pages is perfectly legal. You aren't attempting to compromise the target system, you are simply doing by hand what your web browser does for you automatically. Of course, this technique will not load images and Java applets for you. ************************************************ Getting Finger Information Via Telnet By now, you've probably heard or read a lot about finger. It doesn't seem like a very useful service, and many sysadmins disable the service because it provides information on a particular user, information an evil hacker can take advantage of. Win95 doesn't ship with a finger client, but NT does. You can download finger clients for Win95 from any number of software sites. But why do that when you have a readily available client in telnet? The finger daemon or server runs on port 79, so connect to a remote host on that port. If the service is running, you will be presented with a blank screen. **************************************************** NEWBIE NOTE: NT doesn't ship with a finger daemon (A daemon is a program on the remote computer which waits for people like you to connect to it), so generally speaking, and server that you find running finger will be a Unix box. I say "generally" because there are third-party finger daemons available and someone may want to run one on their NT computer. **************************************************** The blank screen indicates that the finger daemon is waiting for input. If you have a particular user that you are interested in, type in the username and hit enter. A response will be provided, and the daemon will disconnect the client. If you don't know a particular username, you can start by simply hitting enter. In some cases, you may get a response such as "No one logged on." Or you may get information of all currently logged on users. It all depends on whether or not the sysadmin has chosen to enable certain features of the daemon. You can also try other names, such as "root", "daemon", "ftp", "bin", etc. Another neat trick to try out is something that I have seen referred to as "finger forwarding". To try this out, you need two hosts that run finger. Connect to the first host, host1.com, and enter the username that you are interested in. Then go to the second host, and enter: user@host1.com You should see the same information! Again, this all depends upon the configuration of the finger daemon. Using Telnet from the Command Line Now, if you want to show your friends that you a "real man" because "real men don't need no stinkin' GUIs", well just open up a DOS window and type: c:\>telnet <host> <port> and the program will automatically attempt to connect to the host on the designated port for you. Using Netcat Let me start by giving a mighty big thanks to Weld Pond from L0pht for producing the netcat program for Windows NT. To get a copy of this program, which comes with source code, simply go to: http://www.l0pht.com/~weld NOTE: The first character of "l0pht: is the letter "l". The second character is a zero, not an "o". I know that the program is supposed to run on NT, but I have seen it run on Win95. It's a great little program that can be used to do some of the same things as telnet. However, there are advantages to using netcat...for one, it's a command-line program, and it can be included in a batch file. In fact, you can automate multiple calls to netcat in a batch file, saving the results to a text file. ************************************************** NEWBIE NOTE: For more information on batch files, see previous versions of the Guide To (mostly) Harmless Hacking, Getting Serious with Windows series ...one of them dealt with basic batch file programming. ************************************************** Before using netcat, take a look at the readme.txt file provided in the zipped archive you downloaded. It goes over the instructions on how to download web pages using netcat, similar to what I described earlier using telnet. There are two ways to go about getting finger information using netcat. The first is in interactive mode. Simply type: c:\>nc <host> 79 If the daemon is running, you won't get a command prompt back. If this is the case, type in the username and hit enter. Or use the automatic mode by first creating a text file containing the username of interest. For example, I typed: c:\>edit root and entered the username "root", without the quotes. Then from the command prompt, type: c:\>nc <host> 79 < root and the response will appear on your screen. You can save the output to a file by adding the appropriate redirection operator to the end of the file: c:\>nc <host> 79 < root > nc.log to create the file nc.log, or: c:\>nc <host> 79 < root >> nc.log to append the response to the end of nc.log. NOTE: Make sure that you use spaces between the redirection operators. How to Break into a Windows 95 machine Connected to the Internet Disclaimer The intent of this file is NOT to provide a step-by-step guide to accessing a Win95 computer while it is connected to the Internet. The intent is show you how to protect yourself. There are no special tools needed to access a remote Win95 machine...everything you need is right there on your Win95 system! Two methods will be described...the command-line approach and the GUI approach. Protecting Yourself First, the method of protecting yourself needs to be made perfectly clear. DON'T SHARE FILES!! I can't stress that enough. If you are a home user, and you are connecting a Win95 computer to the Internet via some dial-up method, disable sharing. If you must share, use a strong password...8 characters minimum, a mix of upper and lower case letters and numbers, change the password every now and again. If you need to transmit the password to someone, do so over the phone or by written letter. To disable sharing, click on My Computer -> Control Panel -> Network -> File and Print Sharing. In the dialog box that appears, uncheck both boxes. It's that easy. What Can They Do? What can someone do? Well, lots of stuff, but it largely depends on what shares are available. If someone is able to share a printer from your machine, they can send you annoying letters and messages. This consumes time, your printer ink/toner, and your paper. If they are able to share a disk share, what they can do largely depends upon what's in that share. The share appears as another directory on the attacker's machine, so any programs they run will be consuming their own resources...memory, cpu cycles, etc. But if the attacker has read and write access to those disk shares, then you're in trouble. If you take work home, your files may be vulnerable. Initialization and configuration files can be searched for passwords. Files can be modified and deleted. A particularly nasty thing to do is adding a line to your autoexec.bat file so that the next time your computer is booted, the hard drive is formatted without any prompting from the user. Bad ju-ju, indeed. ** The command-line approach ** Okay, now for the part that should probably be titled "How they do it". All that is needed is the IP address of the remote machine. Now open up a DOS window, and at the command prompt, type: c:\>nbtstat -A [ip_addr] If the remote machine is connected to the Internet and the ports used for sharing are not blocked, you should see something like: NetBIOS Remote Machine Name Table Name Type Status --------------------------------------------- NAME <00> UNIQUE Registered DOMAIN <00> GROUP Registered NAME <03> UNIQUE Registered USERNAME <03> UNIQUE Registered MAC Address = 00-00-00-00-00-00 This machine name table shows the machine and domain names, a logged-on username, and the address of the Ethernet adapter (the information has been obfuscated for instructional purposes). **Note: This machine, if unpatched and not protected with a firewall or packet-filter router, may be vulnerable to a range of denial of service attacks, which seem to be fairly popular, largely because they require no skill or knowledge to perpetrate. The key piece of information that you are looking for is in the Type column. A machine that has sharing enabled will have a hex code of "<20>". **Note: With the right tools, it is fairly simple for a sysadmin to write a batch file that combs a subnet or her entire network, looking for client machines with sharing enabled. This batch file can then be run at specific times...every day at 2:00 am, only on Friday evenings or weekends, etc. If you find a machine with sharing enabled, the next thing to do is type the following command: c:\>net view \\[ip_addr] Now, your response may be varied. You may find that there are no shares on the list, or that there are several shares available. Choose which share you would like to connect to, and type the command: c:\>net use g: \\[ip_addr]\[share_name] You will likely get a response that the command was completed successfully. If that is the case, type: c:\>cd g: or which ever device name you decided to use. You can now view what exists on that share using the dir commands, etc. Now, you may be presented with a password prompt when you ssue the above command. If that is the case, typical "hacker" (I shudder at that term) methods may be used. ** The GUI approach ** After issuing the nbtstat command, you can opt for the GUI approach to accessing the shares on that machine. To do so, make sure that you leave the DOS window open, or minimized...don't close it. Now, use Notepad to open this file: c:\windows\lmhosts.sam Read over the file, and then open create another file in Notepad, called simply "Lmhosts", without an extension. The file should contain the IP address of the host, the NetBIOS name of the host (from the nbtstat command), and #PRE, separated by tabs. Once you have added this information, save it, and minimize the window. In the DOS command window, type: c:\>nbtstat -R This command reloads the cache from the Lmhosts file you just created. Now, click on Start -> Find -> Computer, and type in the NetBIOS name of the computer...the same one you added to the lmhosts file. If your attempt to connect to the machine is successful, you should be presented with a window containing the available shares. You may be presented with a password prompt window, but again, typical "hacker" (again, that term grates on me like fingernails on a chalk board, but today, it seems that it's all folks understand) techniques may be used to break the password. ************************************************ Note from Carolyn Meinel: Want to try this stuff without winding up in jail or getting expelled from school? Get a friend to give you permission to try to break in. First, you will need his or her IP address. Usually this will be different every time your friend logs on. You friend can learn his or her IP address by going to the DOS prompt while online and giving the command "netstat -r". Something like this should show up: C:\WINDOWS>netstat -r Route Table Active Routes: Network Address Netmask Gateway Address Interface Metric 0.0.0.0 0.0.0.0 198.999.176.84 198.999.176.84 1 127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1 198.999.176.0 255.255.255.0 198.999.176.84 198.999.176.84 1 198.999.176.84 255.255.255.255 127.0.0.1 127.0.0.1 1 198.999.176.255 255.255.255.255 198.999.176.84 198.999.176.84 1 224.0.0.0 224.0.0.0 198.999.176.84 198.999.176.84 1 255.255.255.255 255.255.255.255 198.999.176.84 0.0.0.0 1 Your friend's IP address should be under "Gateway Address." Ignore the 127.0.0.1 as this will show up for everyone and simply means "locahost" or "my own computer." If in doubt, break the Internet connection and then get online again. The number that changes is the IP address of your friend's computer. *************************************************** ************************************************** Evil Genius tip: Here is something really scary. In your shell account give the "netstat" command. If your ISP allows you to use it, you might be able to get the dynamically assigned IP addresses of people from all over the world -- everyone who is browsing a Web site hosted by your ISP, everyone using ftp, spammers you might catch red-handed in the act of forging email on your ISP, guys up at 2AM playing on multiuser dungeons, IRC users, in fact you will see everyone who is connected to your ISP! **************************************************** *************************************************** YOU CAN GO TO JAIL WARNING: If you find a Windows 95 box on the Internet with file sharing enabled and no password protection, you can still get in big trouble for exploiting it. It's just like finding a house whose owner forgot to lock the door -- you still are in trouble if someone catches you inside. Tell temptation to take a hike! ************************************************ Final Words Please remember that this Guide is for instructional purposes only and is meant to educate the sysadmin and user alike. If someone uses this information to gain access to a system which they have no permission or business messing with, I (keydet) cannot be responsible for the outcome. If you are intending to try this information out, do so with the consent and permission of a friend.
  16. Unrevealed Windows Tips and Secrets : Welcome to another Hacking Truths Manual. This time I have a collection of Tips and Tricks which no body normally knows, the secrets which Microsoft is afraid to tell the people, the information which you will seldom find all gathered up and arranged in a single file. To fully reap this Manual you need to have a basic understanding of the Windows Registry, as almost all the Tricks and Tips involve this file. ---------------------------- Important Note: Before you read on, you need to keep one thing in mind. Whenever you make changes to the Windows Registry you need to Refresh it before the changes take place. Simply press F5 to refresh the registry and enable the changes. If this does not work Restart your system ---------------------------- Exiting Windows the Cool and Quick Way Normally it takes a hell lot of time just Shutting down Windows, you have to move your mouse to the Start Button, click on it, move it again over Shut Down, click, then move it over the necessary option and click, then move the cursor over the OK button and once again (you guessed it) click.This whole process can be shortened by creating shortcuts on the Desktop which will shut down Windows at the click of a button. Start by creating a new shortcut( right click and select New> Shortcut). Then in the command line box, type (without the quotes.) 'C:\windows\rundll.exe user.exe,exitwindowsexec' This Shortcut on clicking will restart Windows immediately without any Warning. To create a Shortcut to Restarting Windows, type the following in the Command Line box: 'c:\windows\rundll.exe user.exe,exitwindows' This Shortcut on clicking will shut down Windows immediately without any Warning. Ban Shutdowns : A trick to Play on Lamers This is a neat trick you can play on that lamer that has a huge ego, in this section I teach you, how to disable the Shut Down option in the Shut Down Dialog Box. This trick involves editing the registry, so please make backups. Launch regedit.exe and go to : HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer In the right pane look for the NoClose Key. If it is not already there then create it by right clicking in the right pane and selecting New > String Value.(Name it NoCloseKey ) Now once you see the NoCloseKey in the right pane, right click on it and select Modify. Then Type 1 in the Value Data Box. Doing the above on a Win98 system disables the Shut Down option in the Shut Down Dialog Box. But on a Win95 machine if the value of NoCloseKey is set to 1 then click on the Start > Shut Down button displays the following error message: This operation has been cancelled due to restrictions in effect on this computer. Please contact your system administrator. You can enable the shut down option by changing the value of NoCloseKey to 0 or simply deleting the particular entry i.e. deleting NoCloseKey. Instead of performing the above difficult to remember process, simply save the following with an extension of .reg and add it's contents to the registry by double clicking on it. REGEDIT4 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] "NoClose"="1" Disabling Display of Drives in My Computer This is yet another trick you can play on your geek friend. To disable the display of local or networked drives when you click My Computer go to : HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer Now in the right pane create a new DWORD item and name it NoDrives. Now modify it's value and set it to 3FFFFFF (Hexadecimal) Now press F5 to refresh. When you click on My Computer, no drives will be shown. To enable display of drives in My Computer, simply delete this DWORD item. It's .reg file is as follows: REGEDIT4 [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer] "NoDrives"=dword:03ffffff Take Over the Screen Saver To activate and deactivate the screen saver whenever you want, goto the following registry key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\ScreenSavers Now add a new string value and name it Mouse Corners. Edit this new value to -Y-N. Press F5 to refresh the registry. Voila! Now you can activate your screensaver by simply placing the mouse cursor at the top right corner of the screen and if you take the mouse to the bottom left corner of the screen, the screensaver will deactivate. Pop a banner each time Windows Boots To pop a banner which can contain any message you want to display just before a user is going to log on, go to the key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WinLogon Now create a new string Value in the right pane named LegalNoticeCaption and enter the value that you want to see in the Menu Bar. Now create yet another new string value and name it: LegalNoticeText. Modify it and insert the message you want to display each time Windows boots. This can be effectively used to display the company's private policy each time the user logs on to his NT box. It's .reg file would be: REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Winlogon] "LegalNoticeCaption"="Caption here." Delete the Tips of the Day to save 5KB Windows 95 had these tips of the day which appeared on a system running a newly installed Windows OS. These tips of the day are stored in the Windows Registry and consume 5K of space. For those of you who are really concerned about how much free space your hard disk has, I have the perfect trick. To save 5K go to the following key in Regedit: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Tips Now simply delete these tricks by selecting and pressing the DEL key. Change the Default Locations To change the default drive or path where Windows will look for it's installation files, go to the key: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Setup\SourcePath Now you can edit as you wish. Secure your Desktop Icons and Settings You can save your desktop settings and secure it from your nerdy friend by playing with the registry. Simply launch the Registry Editor go to: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer In the right pane create a new DWORD Value named NoSaveSettings and modify it's value to 1. Refresh and restart for the settings to get saved. CLSID Folders Explained Don't you just hate those stubborn stupid icons that refuse to leave the desktop, like the Network Neighborhood icon. I am sure you want to know how you can delete them. You may say, that is really simple, simply right click on the concerned icon and select Delete. Well not exactly, you see when you right click on these special folders( see entire list below)neither the rename nor the delete option does not appear. To delete these folders, there are two methods, the first one is using the System Policy Editor(Poledit in the Windows installation CD)and the second is using the Registry. Before we go on, you need to understand what CLSID values are. These folders, like the Control Panel, Inbox, The Microsoft Network, Dial Up Networking etc are system folders. Each system folder has a unique CLSID key or the Class ID which is a 16-byte value which identifies an individual object that points to a corresponding key in the registry. To delete these system Folders from the desktop simply go to the following registry key: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Desktop\Namespace To delete an icon simply delete the 16 byte CLSID value within "NameSpace". The following are the CLSID values of the most commonly used icons: My Briefcase: Desktop: Control Panel: Dial-Up-Networking: Fonts: Inbox : My Computer : Network Neighborhood: Printers : Recycle Bin : The Microsoft Network: History: Winzip : For example, to delete the Recycle Bin, first note down it's CLSID value, which is: 645FF040-5081-101B-9F08-00AA002F954E. Now go to the Namespace key in the registry and delete the corresponding key. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\explorer\Desktop\NameSpace\ Similarly to delete the History folder, delete the following key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\explorer\Desktop\NameSpace\ Sometimes, you may need to play a trick on your brother or friend, well this one teaches you how to hide all icons from the Desktop. Go to the following registry key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer In the right pane create a new DWORD value by the name: NoDesktop and set its value to: 1. Reboot and you will find no icons on the desktop. Till now you simply learnt how to delete the special system folders by deleting a registry key, but the hack would have been better if there was a way of adding the DELETE and RENAME option to the right click context menus of these special folders. You can actually change the right click context menu of any system folder and add any of the following options: RENAME, DELETE, CUT, COPY, PASTE and lots more. This hack too requires you to know the CLSID value of the system folder whose menu you want to customize. In this section, I have taken up Recycle Bin as the folder whose context menu I am going to edit. Firstly launch the registry editor and open the following registry key: HKEY_CLASSES_ROOT\CLSID\\ShellFolder. In Case you want to edit some other folder like say the FONTS folder, then you will open the following key: HKEY_CLASSES_ROOT\CLSID\\ShellFolder. In the right pane there will be a DWORD value names attributes. Now consider the following options: To add the Rename option to the menu, change the value of Attributes to 50 01 00 20 To add the Delete option to the menu, change the value of Attributes to 60 01 00 20 3. To add both the Rename & Delete options to the menu, change the value of Attributes to 70,01,00,20 4. Add Copy to the menu, change Attributes to 41 01 00 20 5. Add Cut to the menu, change Attributes to 42 01 00 20 6. Add Copy & Cut to the menu, change Attributes to 43 01 00 20 7. Add Paste to the menu, change Attributes to 44 01 00 20 8. Add Copy & Paste to the menu, change Attributes to 45 01 00 20 9. Add Cut & Paste to the menu, change Attributes to 46 01 00 20 10.Add all Cut, Copy & Paste to the menu, change Attributes to 47 01 00 20 We want to add only the Rename option to the right click context menu of the Recycle Bin, so change the value of attributes to: 50 01 00 20. Press F5 to refresh and then after rebooting you will find that when you right click on the Recycle Bin a RENAME option pops up too. To reset the default Windows options change the value of Attributes back to 40 01 00 20 The Registry File which one can create for the above process would be something like the below: REGEDIT4 [HKEY_CLASSES_ROOT\CLSID\\Shell-Folder] "Attributes"=hex:50,01,00,20 To access say the Modem Properties in the Control Panel Folder, the normal procedure is: Click on Start, Click on Settings> Control Panel and then wait for the Control Panel window to pop up and then ultimately click on the Modems icon. Wouldn't it be lovely if you could shorten the process to: Click on Start> Control Panel>Modems. Yes you can add the Control Panel and also all other Special System Folders directly to the first level Start Menu. Firstly collect the CLSID value of the folder you want to add to the start menu. I want to add Control Panel hence the CLSID value is: 21EC2020-3AEA-1069-A2DD-08002B30309D Now right click on the Start Button and select Open. Now create a new folder and name it: Control Panel. NOTE: Do not forget the period after the 'l' in Panel. Similarly all system folders can be added to the Start Menu.(accept My Briefcase, I think) Deleting System Options from the Start menu You can actually remove the Find and Run options from the start menu by performing a simple registry hack. Again like always Launch the registry editor and scroll down to the below key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer Right-click on the right pane and select New, DWORD Value. Name it NoFind.(To remove the RUN option name it NoRun). Double-click the newly create DWORD to edit it's value and enter 1 as its value. This will disable the FIND option of the Start Menu and will also disable the default Shortcut key(F3 for Find.) To restore the Run or find command modify the value of the DWORD to 0 or simply Delete the DWORD value. Fed Up of the boring Old Yellow Folder Icons?[Drive Icons Included] NOTE: This trick hasn't been tried on Win98. You can easily change the boring yellow folder icons to your own personalized icons. Simply create a text file and copy the following lines into it: [.ShellClassInfo] ICONFILE=Drive:\Path\Icon_name.extension Save this text file by the name, desktop.ini in the folder, whose icon you want to change. Now to prevent this file from getting deleted change it's attributes to Hidden and Read Only by using the ATTRIB command. To change the icon of a drive, create a text file containing the following lines: [Autorun] ICON=Drive:\Path\Icon_name.extension Save this file in the root of the drive whose icon you want to change and name it autorun.inf For Example, if you want to change the icon of a floppy, SAVE THE icon in a:\icon_name.ico One can also create a kewl icon for the Hard Disk and create a text file [autorun.inf] and store it in "c:\". Securing NT By default, NT 4.0 displays the last person who logged onto the system. This can be considered to be a security threat, especially in the case of those who choose their password to be same as their Username. To disable this bug which actually is a feature, go to the following key in the registry editor: HKEY_LOCAL_MACHINE\Software\Microsoft\WindowsNT\CurrentVersion\Winlogon Click and select the ReportBookOK item and create a new string value called DontDisplayLastUserName. Modify it and set it's value to 1. As a system administrator, you can ensure that the passwords chosen by the users are not too lame or too easy to guess. NT has this lovely utility called the User Manager which allows the administrator to set the age limit of the password which forces the users to change the password after a certain number of days. You can also set the minimum length of passwords and prevent users to use passwords which already have been used earlier and also enable account lockouts which will deactivate an account after a specified number of failed login attempts. When you log on to Win NT, you should disable Password Caching, this ensures Single NT Domain login and also prevents secondary Windows Logon screen. Simply copy the following lines to a plain text ASCII editor like: Notepad and save it with an extension, .reg ----------------DISABLE.reg----------------- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Network] "DisablePwdCaching"=dword:00000001 ----------------DISABLE.reg----------------- To Enable Password Caching use the following .reg file: --------------Enable.reg----------------- REGEDIT4 [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Network] "DisablePwdCaching"=dword:00000000 --------------Enable.reg----------------- Cleaning Recent Docs Menu and the RUN MRU The Recent Docs menu can be easily disabled by editing the Registry. To do this go to the following Key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer Now in the right pane, create a new DWORD value by the name: NoRecentDocsMenu and set it's value to 1. Restart Explorer to save the changes. You can also clear the RUN MRU history. All the listings are stored in the key: HKEY_USERS\.Default\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU You can delete individual listings or the entire listing. To delete History of Find listings go to: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Doc Find Spec MRU and delete. Customizing the Right Click Context Menu of the Start Menu When you right click on the start menu, only 3 options pop up: Open, Explore, and Find. You can add your own programs to this pop up menu( which comes up when we right click on it.) Open Regedit and go to the following registry key: HKEY_CLASSES_ROOT\Directory\Shell Right click on the shell and create a new Sub Key (You can create a new SubKey by right clicking on the Shell Key and selecting New > Key.). Type in the name of the application you want to add to the start menu. I want to add Notepad to the Start Menu and hence I name this new sub key, Notepad. Now right click on the new registry key that you just created and create yet another new key named Command. Enter the full path of the application, in this case Notepad in the default value of Command in the right pane. So I Modify the value of the default string value and enter the full pathname of Notepad: c:\wndows\notepad.exe. Now press F5 to refresh. Now if you right click on the Start Button you will find a new addition to the Pop Up Menu called Notepad. Clicking on it will launch Notepad. We can not only add but also remove the existing options in this pop up box. To delete the Find option, go to the following registry key: HKEY_CLASSES_ROOT\Directory\Shell\Find Delete Find. DO NOT delete Open else you will not be able to open any folders in the Start Menu like Programs, Accessories etc. BMP Thumbnail As Icon You can actually change the default BMP icon to a thumbnail version of the actual BMP file. To do this simply go to HKCU\Paint.Picture\Default. In the right pane change the value of default to %1. Please note however that this will slow down the display rate in explorer if there are too many BMP thumbnails to display. You can use other icons too, simply enter the pathname.To restore back to the normal change the vale of default back to: C:\Progra~1\Access~1\MSPAINT.EXE,1. Customizing The Shortcut Arrow All shortcuts have a tiny black arrow attached to it's icon to distinguish from normal files. This arrow can sometimes be pretty annoying and as a Hacker should know how to change each and everything, here goes another trick. Launch the Registry Editor and go to: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\explorer\Shell Icons. Now, on the right pane is a list of icons ( we found out that on some systems, Windows 98 especially, the right pane is blank. Don't worry, just add the value as required ). Find the value 29. If it isn't there, just add it. The value of this string should be C:\Windows\system\shell32.dll, 29 ( which means the 30th icon in shell32.dll - the first one begins with 0 ). Now, we need blank icon to do this. Just create one with white as the whole icon. Go here to learn how to create an icon. Once done just change the value to C:\xxx.ico, 0 where "xxx" is the full path of the icon file and "0" is the icon in it. Now for some fun. If the blank icon is a bit boring, change it again. You will find that under shell32.dll there is a gear icon, a shared folder ( the hand ) and much more. Experiment for yourself! Use Perl to Get List or Services Running on your NT box Use the following Perl Script to get a list of Services running on your NT system --------------script.pl----------------- #!c:\per\bin\perl.exe use Win32::Service; my ($key, %service, %status, $part); Win32::Service::GetServices(' ',\%services); foreach $key (sort keys %services) { print "Print Name\t: $key, $services\n"; Win32::Service::GetStatus( ' ',$services; \%status); foreach $part (keys %status) { print "\t$part : $status\n" if($part eq "CurrentState"); } } -------------script.pl------------------- Internet Explorer Tricks and Tips Resizable Full Screen Toolbar The Full Screen option increases the viewable area and makes surfing more enjoyable but sometimes we need the Toolbar but also need to have extra viewing area. Now this hack teaches you how to change the size of the Internet Explorer toolbar. This registry hack is a bit complicated as it involves Binary values, so to make it simple, I have included the following registry file which will enable the resizable option of the Internet Explorer toolbar which was present in the beta version of IE. REGEDIT4 [HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Toolbar] "Theater"=hex:0c,00,00,00,4c,00,00,00,74,00,00,00,18,00,00,00,1b,00,00,00,5c,\ 00,00,00,01,00,00,00,e0,00,00,00,a0,0f,00,00,05,00,00,00,22,00,00,00,26,00,\ 00,00,02,00,00,00,21,00,00,00,a0,0f,00,00,04,00,00,00,01,00,00,00,a0,0f,00,\ 00,03,00,00,00,08,00,00,00,00,00,00,00 ******************* HACKING TRUTH: Internet Explorer 5 displays the friendly version of HTTP errors like NOT FOUND etc . They are aimed at making things easier for newbies. If you would rather prefer to see the proper error pages for the web server you're using, go to Tools, Internet Options and select the Advanced tab. Then scroll down and uncheck the Show friendly http errors box. ******************* Making the Internet Explorer & the Explorer Toolbars Fancy The Internet Explorer toolbar looks pretty simple. Want to make it fancy and kewl? Why not add a background image to it. To do this kewl hack launch the Windows Registry Editor and go to the following key: HKEY_CURRENT_USER\SOFTWARE\Microsoft\ Internet Explorer\Toolbar\. Now in the right pane create a new String Value and name it BackBitmap and modify it's value to the path of the Bitmap you want to dress it up with by rightclicking on it and choosing Modify. When you reboot the Internet Explorer and the Windows Explorer toolbars will have a new look. Change Internet Explorer's Caption Don't like the caption of Internet Explorer caption? Want to change it? Open the registry editor and go to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main. In the right pane create a new String Value names Window Title (Note the space between Window and Title). Right click on this newly created String Value and select Modify. Type in the new caption you want to be displayed. Restart for the settings to take place. Now let's move on to some Outlook Express Tricks. Colorful Background Don't like the boring background colors of Outlook Express? To change it launch the Windows Registry Editor and scroll down to the HKEY_CURRENT_USER\Software\Microsoft\Internet Mail And News key. On the left pane, click on ColorCycle or select Edit and Modify in the menu. Now change the value to 1. Close and restart. Now, launch Outlook Express and whenever you open up a New Message, hold down ctrl-shift and tap the z key to scroll to change the background color. Repeat the keystroke to cycle through the colors. Internet Explorer 5 Hidden Features Microsoft Internet Explorer 5 has several hidden features which can be controlled using the Windows Registry. Open your registry and scroll down to the following key: HKEY_CURRENT_USER\Software\Policies\Microsoft\Internet Explorer\Restrictions Create a new DWORD value named See complete list of values of x below) and modify it's value to 1 to enable it and to 0 to disable it. NoBrowserClose : Disable the option of closing Internet Explorer. NoBrowserContextMenu : Disable right-click context menu. NoBrowserOptions : Disable the Tools / Internet Options menu. NoBrowserSaveAs : Disable the ability to Save As. NoFavorites : Disable the Favorites. NoFileNew : Disable the File / New command. NoFileOpen : Disable the File / Open command. NoFindFiles : Disable the Find Files command. NoSelectDownloadDir : Disable the option of selecting a download directory. NoTheaterMode : Disable the Full Screen view option. Hacking Secrets Almost all system administrators make certain changes and make the system restricted. System Administrators can hide the RUN option, the FIND command, the entire Control Panel, drives in My Computer like D: A: etc. They can even restrict activities of a hacker my disabling or hiding, even the tiniest options or tools. Most commonly these restrictions are imposed locally and are controlled by the Windows Registry. But sometimes the smart system administrators control the activities of the hacker by imposing restrictions remotely through the main server. Poledit or Policy Editor is a small kewl tool which is being commonly used by system administrators to alter the settings of a system. This utility is not installed by default by Windows. You need to install in manually from the Windows 98 Installation Kit from the Resource Kit folder. user.dat file that we saw earlier. The Policy Editor tool imposes restrictions on the user's system by editing the user.dat file which in turn means that it edits the Windows Registry to change the settings. It can be used to control or restrict access to each and every folder and option you could ever think of. It has the power to even restrict access to individual folders, files, the Control Panel, MS DOS, the drives available etc. Sometimes this software does make life really hard for a Hacker. So how can we remove the restrictions imposed by the Policy Editor? Well read ahead to learn more. You see the Policy Editor is not the only way to restrict a user's activities. As we already know that the Policy Editor edits the Windows Registry(user.dat) file to impose such restrictions. So this in turn would mean that we can directly make changes to the Windows Registry using a .reg file or directly to remove or add restrictions. Launch Regedit and go to the following Registry Key: HKEY_CURRENT_USER/Software/Microsoft/CurrentVersion/Policies Under this key, there will definitely be a key named explorer. Now under this explorer key we can create new DWORD values and modify it's value to 1 in order to impose the restriction. If you want to remove the Restriction, then you can simply delete the respective DWORD values or instead change their values to 0. The following is a list of DWORD values that can be created under the Explorer Key-: NoDeletePrinter: Disables Deletion of already installed Printers NoAddPrinter: Disables Addition of new Printers NoRun : Disables or hides the Run Command NoSetFolders: Removes Folders from the Settings option on Start Menu (Control Panel, Printers, Taskbar) NoSetTaskbar: Removes Taskbar system folder from the Settings option on Start Menu NoFind: Removes the Find Tool (Start >Find) NoDrives: Hides and does not display any Drives in My Computer NoNetHood: Hides or removes the Network Neighborhood icon from the desktop NoDesktop: Hides all items including, file, folders and system folders from the Desktop NoClose: Disables Shutdown and prevents the user from normally shutting down Windows. NoSaveSettings: Means to say, 'Don't save settings on exit' DisableRegistryTools: Disable Registry Editing Tools (If you disable this option, the Windows Registry Editor(regedit.exe) too will not work.) NoRecentDocsHistory: Removes Recent Document system folder from the Start Menu (IE 4 and above) ClearRecentDocsOnExit: Clears the Recent Documents system folder on Exit. Nolnternetlcon: Removes the Internet (system folder) icon from the Desktop Under the same key: HKEY_CURRENT_USER/Software/Microsoft/CurrentVersion/Policies you can create new subkeys other than the already existing Explorer key. Now create a new key and name it System. Under this new key, system we can create the following new DWORD values(1 for enabling the particular option and 0 for disabling the particular option): NODispCPL: Hides Control Panel NoDispBackgroundPage: Hides Background page. NoDispScrsavPage: Hides Screen Saver Page NoDispAppearancePage: Hides Appearance Page NoDispSettingsPage: Hides Settings Page NoSecCPL: Disables Password Control Panel NoPwdPage: Hides Password Change Page NoAdminPaqe: Hides Remote Administration Page NoProfilePage: Hides User Profiles Page NoDevMgrPage: Hides Device Manager Page NoConfigPage: Hides Hardware Profiles Page NoFileSysPage: Hides File System Button NoVirtMemPage: Hides Virtual Memory Button Similarly, if we create a new subkey named Network, we can add the following DWORD values under it(1 for enabling the particular option and 0 for disabling the particular option): NoNetSetupSecurityPage: Hides Network Security Page NoNelSetup: Hides or disables the Network option in the Control Panel NoNetSetupIDPage: Hides the Identification Page NoNetSetupSecurityPage: Hides the Access Control Page NoFileSharingControl: Disables File Sharing Controls NoPrintSharing: Disables Print Sharing Controls Similarly, if we create a new subkey named WinOldApp, we can add the following DWORD values under it(1 for enabling the particular option and 0 for disabling the particular option): Disabled: Disable MS-DOS Prompt NoRealMode: Disable Single-Mode MS-DOS. So you see if you have access to the Windows Registry, then you can easily create new DWORD values and set heir value to 1 for enabling the particular option and 0 for disabling the particular option. But Sometimes, access to the Windows Registry is blocked. So what do you do? Go to the Windows Directory and delete either user.dat or system.dat (These 2 files constitute the Windows Registry.) and reboot. As soon as Windows logs in, it will display a Warning Message informing you about an error in the Windows Registry. Simply ignore this Warning Message and Press CTRL+DEL+ALT to get out of this warning message.(Do not press OK) You will find that all restrictions have been removed. The most kind of restriction found quite commonly is the Specific Folder Restriction, in which users are not allowed access to specific folders, the most common being the Windows folder, or sometimes even access to My Computer is blocked. In effect, you simply cannot seem to access the important kewl files which are needed by you to do remove restrictions. What do you? Well use the RUN command. (START >RUN). But unfortunately a system administrator who is intelligent enough to block access to specific folder, would definitely have blocked access to the RUN command. Again we are stuck. Windows is supposed to be the most User Friendly Operating System on earth. (At least Microsoft Says so.) It gives the User an option to do the same thing in various ways. You see the RUN command is only the most convenient option of launching applications, but not the only way. In Windows you can create shortcuts to almost anything from a file, folder to a Web URL. So say your system administrator has blocked access to the c:\windows\system folder and you need to access it. What do you do? Simply create a Shortcut to it. To do this right click anywhere on the desktop and select New > Shortcut. A new window titled Create Shortcut pops up. Type in the path of the restricted folder you wish to access, in this case c:\windows\system. Click Next, Enter the friendly name of the Shortcut and then click Finish. Now you can access the restricted folder by simply double clicking on the shortcut icon. Well that shows how protected and secure *ahem Windows *ahem is. **************** HACKING TRUTH: Sometimes when you try to delete a file or a folder, Windows displays an error message saying that the file is protected. This simply means that the file is write protected, or in other words the R option is +. Get it? Anyway, you can stop Windows from displaying this error message and straightaway delete this file by changing its attributes to Non Read Only. This can be done by Right Clicking on the file, selecting Properties and then unselecting the Read Only Option. *************** There is yet another way of accessing restricted folders. Use see, DOS has a lovely command known as START. Its general syntax is: START application_path It does do what it seems to do, start applications. So in you have access to DOS then you can type in the START command to get access to the restricted folder. Now mostly access to DOS too would be blocked. So again you can use the shortcut trick to launch, c:\command.com or c:\windows\command.com. (Command.com is the file which launches MS DOS). Accessing Restricted Drives. The problem with most system administrators is that they think that the users or Hackers too are stupid. Almost all system administrators use the Registry Trick (Explained Earlier) to hide all drives in My Computer. So in order to unhide or display all drives, simply delete that particular key.(Refer to beginning of Untold Secrets Section.) Some systems have the floppy disk disabled through the BIOS. On those systems if the BIOS is protected, you may need to crack the BIOS password. (For that Refer to the Windows Hacking Chapter). Sometimes making drives readable (Removing R +) and then creating Shortcuts to them also helps us to get access to them. Further Changing your Operating System's Looks by editing .htt files If you have installed Windows Desktop Update and have the view as Web Page option enabled, you can customise the way the folder looks by selecting View > Customise this folder. Here you can change the background and other things about that particular folder. Well that is pretty lame, right? We hackers already know things as lame as that. Read on for some kewl stuff. Well, you could also change the default that is stored in a Hidden HTML Template file (I think so..) which is nothing but a HTML document with a .htt extension. This .htt file is found at: %systemroot%\web\folder.htt. The %systemroot% stands for the drive in which Windows is Installed, which is normally C: You can edit these .htt files almost just like you edit normal .HTM or .HTML files. Simply open them in an ASCII editor like Notepad. The following is a list of .htt files on your system which control various folders and which can be edited to customise the way various folders look. controlp.htt Control Panel printers.htt Printers mycomp.htt My Computer safemode.htt Safe Mode All these files are found in the web folder in %systemfolder%. The folder.htt file has a line: 'Here's a good place to add a few lines of your own" which is the place where you can add your own A HREF links. These links would then appear in the folder whose folder.htt file you edited. All this might sound really easy and simple, but you see these .htt files do not contain normal HTML code, instead they contain a mixture of HTML and web bots. Hence they can be difficult for newbies to understand. Well that's it for now, more tricks later, till then goodbye. Ankit Fadia ankit@bol.net.in Get the Archive of Manuals [EVERYTHING YOU DREAMT OFF] written by Ankit Fadia At his mailing list. To get the manuals in your Inbox join his mailing list by sending an email to: programmingforhackers-subscribe@egroups.com Written by: Ankit Fadia
  17. Xplizer : Link : http://rapidshare.com/files/39600004/xplizer.exe Size : 252 KB About TooL : Xplizer is a security configuration hardening tool. It is mostly based on registry keys modification. Xplizer is designed for use by any computer user, from newbie to professional it supplys quick and effective security configuration. Xplizer was designed to be the first software you run right after WindowsXp installation, Because it closes DCOM,445,139(Disables Netbios),5000,1900UDP. After Xplizer was used a remote port scan of the computer will show nothing! - a ghost. REQUIREMENTS 1. 64 MB of memory 2. 1 MB of free disk space 3. Microsoft WindowsXp Operating System Features Xplizer includes the following features: - Disable DCOM - Disable Remote Desktop - Disable Port 445 - Disable *.Chm Execution - Denies all Chm exploits. - Disable SSDP(UPNP) TCP Port 5000,UDP 1900 - Disable File Sharing - Disable Auto Share Server - Disable Messenger(PopUps) - Disable Null Session - Force Guest upon connection to any share - Disable Sam Enumeration - Dont Display Last UserName - Local Security - Disable Zip Files As Folders - Disable Multiple TSSessions Xplizer Compatibility Information - Xplizer was built on WindowsXp Professional and is also designed for SP1 - Xplizer Works on SP2 too, But considered BETA on that platform.
  18. CPorts : Link : http://rapidshare.com/files/39601976/cports.exe Description : CurrPorts allows you to view a list of ports that are currently in use, and the application that is.
  19. IECookiesView : Link : http://www.netdrive.ws/down.php?uid=25e6c36b124e6edd0e249ca5b243e93974ed80b0 Description : IECookiesView is a small utility that displays the details of all cookies that Internet Explorer stores on your computer.
  20. Port Listener XP : Link : http://www.netdrive.ws/down.php?uid=06f18093d7b10173f814ec2cf415d051629a3c64 Description : Open up fake ports, confusing a hacker and giving you time to report them into their ISP.
×
×
  • Create New...