Popular Post

Showing posts with label windows. Show all posts

By : Unknown
The other day was a big day for Microsoft users, what with the deadline for Windows XP finally arriving. Then there was the update for Windows 8.1, which was released on the same day. However, Microsoft has stopped the Windows 8.1 update for businesses relying on Windows Server Update Services (WSUS) due to a bug in the software.
Windows 8.1 update
From the WSUS Product Team Blog:

There is a known issue which causes some PCs updated with the Windows 8.1 Update (KB 2919355) to stop scanning against Windows Server Update Services 3.0 Service Pack 2 (WSUS 3.0 SP2 or WSUS 3.2) servers which are configured to use SSL and have not enabled TLS 1.2.
Basically, this means that the bug might not allow updated devices to recognize future updates. It is also important to note, however, that this issue does not affect all users. The blog announcement further specifies that “only users who have enabled HTTPS and have not enabled TLS 1.2 on their WSUS 3.2 servers and who are also using these WSUS 3.2 servers to manage PCs running the Windows 8.1 Update KB 2919355 are affected by this issue“.
In case you have already made the updates, and you are one of the affected users, Microsoft provides a workaround:

If you are using WSUS 3.2 on Windows Server 2008 R2, you may perform either of the following steps to restore the scan functionality if you have deployed the Windows 8.1 Update KB2919355.
  • Enable TLS 1.2 (follow the instructions under More Information > SCHANNEL\Protocols subkey), or
  • Disable HTTPS on WSUS
If you are using WSUS 3.2 on an operating system other than Windows Server 2008 R2, you may perform the following step to restore the scan functionality.
  • Disable HTTPS on WSUS
Microsoft is working on a solution, as can be expected, and when this is released, users are advised to re-enable HTTPS on WSUS.
So, if you’re a business, and you have NOT updated Windows 8.1, it is highly suggested that you postpone doing so until Microsoft releases a new update that will resolve the issue.
Tag : , ,

cracking window password

By : Unknown

Hack from the Windows 7 CD

 

  1. Boot the system from the Windows 7 CD.

  2. Click on Next.

  3. Choose “Repair your computer”.

  4. Click Next in the System Recovery window.

  5. Choose the Command Prompt option below.

  6. In the command prompt window, copy the Seth file to C drive. Enter this command: “C:\windows\system32\Seth.exe c:” (without quotation marks).

  7. Replace the Seth.exe file with cmd.exe file with following command, and type “yes” to replace the file: "c:\windows\system32\cmd.exe c:\windows\syetem32\Seth.exe" (without quotation marks).

  8. Type "exit” to restart the Windows setup.

  9. Press the shift key 5 times, rapidly, when you're in the username screen. In the Sticky Keys window, click Yes.

  10. In the command prompt window type the “net user,” “user name” and “password”. For example: net user administrator 123
Tag : ,

Windows 8.1 get the update

By : Unknown

Using Windows 8.1? It's time to get the update

On Tuesday, Microsoft will make Windows 8.1 Update available. To continue to get patches, 8.1 users need to move to it soon.
windows-8-1.png
Microsoft
As of Tuesday, all Windows 8.1 users will be able to move to Windows 8.1 Update.
Microsoft will be making the update -- formerly known by those of us who've been tracking it for a while now as "Update 1" and/or "Spring Update" -- available via Windows Update.
The update, designed primarily to make Windows 8 more palatable for mouse/keyboard users, will be designated as an "Important" security update when it's rolled out. It's actually very important, as Microsoft is going to require all Windows 8.1 users to have Windows 8.1 Update installed if they plan to continue to download any security or feature updates to the operating system.
Microsoft's Premier Field Engineering blog, in an April 7 post outlining the update, makes this plain:
"Failure to install this (Windows 8.1) Update will prevent Windows Update from patching your system with any future updates starting with Updates released in May 2014 (get busy!)"
A Microsoft Springboard Series blog post from April 2 also emphasizes that Windows 8.1 users need to move to Update to continue getting patches.
Tag : ,

How To Hack & Access Same LAN Computers ?

By : Unknown
How To Hack & Access Same LAN Computers ?
If you are working in Office / Colleges and want to hack your friends & college mate PC then here is a trick.

First Step press win+ R

Go to Run> Type Cmd

now type command net view

It will be look as below


C:\>net view

Server Name            Remark
-----------------------------------------------
\\xyz
\\abc



Here you can get all the names of all the computers machine names which connect with your LAN.

Now you got the name.  Lets start hacking into the systems.

After you get server name now type tracert command for knowing IP of the victim machine.

Example: C:\> tracert xyz

Here you get the IP address of the XYZ computer machine.

Now go to windows start button and type Remote Desktop Connection
 


After click on Remote Desktop Connection you get below image..
 


Now type the IP address or computer name of victim machine.

Click on Connect <-|
It will also ask administrator password which is common as usual you known about.

After few second Victim machine shown in your Computer..
Now you can access that machine to open website, files, Software's, etc

Enjoy the trick..

and if you don't know password you should try cain and abel and wait.....
Tag : , ,

window password cracking window 7,8,xp

By : Unknown
Ophcrack is a Windows password cracker based on a time-memory trade-off using rainbow tables. This is a new variant of Hellman's original trade-off, with better performance. It recovers 99.9% of alphanumeric passwords in seconds.

This is a type of offline cracking, Just grab .iso of ophcrack from here. Burn it and enjoy using.
1.  Opchrack can crack passwords for Windows 7, Windows Vista, and Windows XP.
2. Ophcrack can recover 99.9% of passwords from Windows XP, usually in a matter of seconds. Any  14-character or smaller password that uses any combination of numbers, small letters, and capital letters should be crackable.
3.  Ophcrack can recover 99% of passwords from Windows 7 or Windows Vista. A dictionary attack is used in Windows 7 and Vista.
4.  The Ophcrack LiveCD option allows for completely automatic password recovery.
5.  LiveCD method requires no installation in Windows, making it a safe alternative to many other password recovery tools.
6.  No Windows passwords need to be known to use the Ophcrack LiveCD to crack your Windows passwords.
Download

window password cracking including window 7,8 xp,8.1

By : Unknown



window password cracking including window 7,8 xp,8.1

Today, i am going to show you many aspects of the Windows Password Storage path, Method of Encryption, and breaking into Windows by cracking the admin password. We need this often for many reasons:
1) Sometime we have forgotten our old password and Hint isn't helping out.
2) We want to break into someone computer to get the information.
3) Just want to take revenge from someone.
4) Stealing computer data.

Lets, take a deep dive in Cracking Windows password and also where these are stored and in which format.

SAM file and Password Hashes~Place where these passwords are stored in Hashes:
Password Hashes - When you type your password into a Windows NT, 2000, or XP login Windows Seven, Vista etc Windows encrypts your password using a specific encryption scheme that turns your password into something that looks like this:
                    7524248b4d2c9a9eadd3b435c51404eddc5

This is a password Hash. This is what is actually being checked against when you type your password in. It encrypts what you typed and bounces it against what is stored in the Registry and/or SAM File. 
You can break this hash password from
SAM File - Holds the user names and password hashes for every account on the local machine, or domain if it is a domain controller.

Location of SAM/Hashes:
You can find what you're looking for in several locations on a given machine.
It can be found on the hard drive in the folder %systemroot%system32config (i-e C:\windows\system32\config). However this folder is locked to all accounts including Administrator while the machine is running. The only account that can access the SAM file during operation is the "System" account.

The second location of the SAM or corresponding hashes can be found in the registry. It can be found under HKEY_LOCAL_MACHINESAM. This is also locked to all users, including Administrator, while the machine is in use.(GO to Run and Type Regedit and Hit enter, Now scroll to HKEY_LOCAL_MACHINESAM, However you may not access to it.)

So the two (Some other also) locations of the SAMHashes are:
- %systemroot%system32config
- In the registry under HKEY_LOCAL_MACHINESAM

Cracking or Breaking Into Admin Account:
How to get Hashes form SAM file?
Well, Below are the methods to do so:
1) Well, the easiest way to do this is to boot your target machine to an alternate OS like
NTFSDOS or Linux and just copy the SAM from the %systemroot%system32config  folder.
It's quick, it's easy, and it's effective. You can get a copy of NTFSDOS from Sysinternals(http://www.sysinternals.com) The regular version of NTFSDOS is freeware, which is always nice, but only allows for Read-Only access. This should be fine for what you want to do, however, if you're the kind of person that just has to have total control and has some money to burn. NTFSDOS Pro, which is also by Sysinternals has read/write access but it'll cost you $299.

2) You can also get password hashes by using pwdump2 (Google It to get software ~ Search at openwall.com). pwdump uses .DLL injection in order to use the system account to view and get the password hashes stored in the registry. It then obtains the hashes from the registry and stores them in a handy little text file that you can then  paste them into a password cracking utility like l0phtcrack or John the ripper (Linux Based works well) also cain and abel can be used. 

3) Import Hashes directly from l0phtcrack, and let them open to you by cracking.


Obtained Hashes? Now crack them:
Well, as i have said that these can't be reversed but somehow automated famous cracking softwares can be used to achieve the target. Yes, it is possible, All we have to do is to have a bit patience. The software will use a lot of strings and will compare these hashes also, Inshort it will decode them.
1) John the Ripper - John the Ripper is to many, the old standby password cracker. It is command line which makes it nice if you're doing some scripting, and best of all it's free and in open source. The only real thing that JtR is lacking is the ability to launch Brute Force attacks against your password file. But look at it this way, even though it is only a dictionary cracker, that will probably be all you need. I would say that in my experience I can find about 85-90% of the passwords in a given file by using just a dictionary attack.

2)
L0phtCrack - Probably the most wildly popular password cracker out there. L0phtCrack is sold by the folks at @Stake. And with a pricetag of $249 for a single user license it sure seems like every one owns it. This is probably the nicest password cracker you will ever see. With the ability to import hashes directly from the registry pwdump and dictionary, hybrid, and brute-force capabilities. No password should last long. Well, I shouldn't say "no password". But almost all will fall to L0phtCrack given enough time.

Making Your Own Password in Windows:
Injecting Password Hashes into the SAM:
Easiest ways to gain Administrator privileges on a machine, is by injecting your own password hashes into the SAM file. In order to do this you will need physical access to the machine and a brain larger than a peanut. Using a utility called "
chntpw" by Petter Nordhal-Hagen you can inject whatever password you wish into the SAM file of any NT, 2000, or XP machine thereby giving you total control, just burn the .iso on a disk and use it. I would give a tip like backing up the SAM file first by using an alternate OS.Make a USB disk of linux or Windows Live dsik can also work. Go in, inject the password of your choosing. Login using your new password. Do what you need to do. Then restore the original SAM so that no one will know that i was hacked




another method is (this method works on all windows including window 8.1,8,,7)
boot linux from usb  and rename sethc.exe found in c:\windows\system32\sethc.exe with cmd.exe and renaming cmd.exe with sethc.exe
now restart system with windows and click on ease of access
now command prompt should open with administrative 
now type 
net user "user name" "password" 
both without quotes
you can boot linux from usb with unetbootin
and you need iso for linux can be found easily

To make your pc talk?

By : Unknown

To make your pc talk?


Open a text file in notepad and write:

Dim msg, sapi
msg=InputBox("Enter your text","Talk it")
Set sapi=CreateObject("sapi.spvoice")
sapi.Speak msg

Save the file with a (*.vbs) extension, it will create a VBScript File.
It will prompt you for a text when u open the file, input the text and press ok."

u will hear now what u typed..

this works in xp, vista, win7 also.,win8
Tag : , ,

Locking Drives:

By : Unknown
>Locking Drives:
We don’t usually prefer to lock our drives, but sometimes it becomes nesscary. Say for instance you might have stored your office documents in D:\ and you don’t want your kids to access it, in such case this technique can be useful for you. Please don’t try this tweak with your root drive (usually C:\ is the root drive) since root drives are not intended to be locked because they are mandatory for the system and application programs.
  • Start & Run and type Regedit to open Registry editor
  • Browse HKEY_CURRENT_USER\Software\Microsoft\Windows\Curre ntVersion\Policies\Explorer
  • Create a new DWORD value NoViewOnDrive and set its value as
2^ (Alpha Number of Drive Letter-1) where Alpha number are simple counting of alphabets from A to Z as 1 - 26
For example: to lock C:\, Alpha number of C is 3 so 2^ (3-1) = 4 (decimal value)
  • To lock more drives, calculate the value of each drive and then set sum of those numbers as value
  • To unlock your drive just delete the key from the registry.
Tag : , ,

To Remove Recyle Bin From Your Desktop

By : Unknown
To Remove Recyle Bin From Your Desktop
Open Regedit by going to START - RUN and type Regedit and hit enter. Then you should navigate to following entry in registry HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ Desktop\NameSpace\{645FF040-5081-101B-9F08-00AA002F954E} and delete it. This action should remove recycle bin from your desktop.
Tag : , ,
Top | Home | About | Write For Us | Contact | Privacy Policy | Term Of Use | Sitemap
Copyright © 2014 kuch.in All Rights Reserved. Designed by Ashacks Team