Showing posts with label WINDOWS TRICK. Show all posts
Showing posts with label WINDOWS TRICK. Show all posts

Monday, 8 July 2013

How to fix Memory Card formatting problem ?


The solution of this problem is to format the Memory Card again with FATfile system through computer because your mobile cant read it any more so you cannot format it from your Mobile.

To format your Memory Card with FAT (FAT16) file system :
  • Plug-in your Memory Card into your computer.
  • Wait till computer detects the Memory Card.
  • Now note down the Drive Letter of your Memory Card
Note: In this tutorial we will assume that drive letter of your Memory Card is I: but you should replace it with actual drive letter of your memory card.

  • Now run Command Prompt by Typing CMD and hitting Enter in Start>>Run or by typing CMD and hitting Enter key after pressing WinKEY+R.Windows 7 and Vista users should type CMD in Start’s Search Box when Command Prompt appear, right click on it and run as administrator.
  • Once Command Prompt launches, Type I: /fs:FAT and hit enter.
Please note that in above tutorial we assumed that I: is drive letter of memory card but this could not be same in your case so make sure to replace I: with actual drive letter of your Memory Card.
Also Please note that if you format anything your data will be erased.

Sunday, 12 August 2012

Web Jacking Attack Method



The Web Jacking Attack Vector is another phishing technique that can be used in social engineering engagements.Attackers that are using this method are creating a fake website and when the victim opens the link a page appears with the message that the website has moved and they need to click another link.If the victim clicks the link that looks real he will redirected to a fake page.

The social engineering toolkit has already import this kind of attack.So we are going to use the SET in order to implement this method.We are opening SET and we select the option 2 which is the Website Attack Vectors.

We will see a list with the available web attack methods.The attack that we are going to use is of course the Web Jacking Attack so we select option number 6.


In the next menu we have 3 options:

  •     Web Templates
  •     Site Cloner
  •     Custom Import
We will select the site cloner in order to clone the website of our interest.Remember that this type of attack works with the credential harvester method so we need to choose a website that it has username and password fields in order the attack to have success.For this scenario as you can see in the image below we have select to clone Facebook because of its popularity.

Now it is time to send our the link with our IP address to the victim.Lets see what the victim will see if he opens the link.

As you can see a message will appear informing the user that the website has moved to a new location.The link on the message seems valid so any unsuspicious users will click on the link.At that time a new page will load into the victim’s browser which it will be fake and is running on our web server.

If the victim enters his credentials into the fake Facebook page that looks like the real one then we will be able to capture his username and password.The next image is showing that:

- - - - - - - - - - - - - - - - - - - - - - - - - - - -  VIDEO - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 



Thursday, 26 July 2012

How to use Credential Harvester Attack Method over Internet


The Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the human element. SET was designed to be released with the http://www.social-engineer.org launch and has quickly became a standard tool in a penetration testers arsenal. SET was written by David Kennedy (ReL1K) and with a lot of help from the community it has incorporated attacks never before seen in an exploitation toolset. The attacks built into the toolkit are designed to be targeted and focused attacks against a person or organization used during a penetration test.

Tools : SET TOOL KIT

OS : Backtrack 5

The credential harvester attack method is used when you don’t want to specifically get a shell but perform phishing attacks in order to obtain username and passwords from the system. In this attack vector, a website will be cloned, and when the victim enters in their user credentials, the usernames and passwords will be posted back to your machine and the victim will be redirected back to the legitimate site.

TUTORIAL VIDEO :



Wednesday, 2 November 2011

How to Use Windows 7 Without Activation


Most of you might be aware of the fact that it is possible to use Windows 7 and Vista for 120 days without activation. This is actually possible using the slmgr -rearm command which will extend the grace period from 30 days to 120 days. However in this post I will show you a small trick using which it is possible to use Windows 7 without activation for approximately an year! Here is a way to do that.
1. Goto “Start Menu -> All Programs -> Accessories” . Right click on “Command Prompt” and select “Run as Administrator“. If you are not the administrator then you are prompted to enter the password, or else you can proceed to step-2.
2. Now type the following command and hit enter

slmgr -rearm
3. You will be prompted to restart the computer. Once restarted the trial period will be once again reset to 30 days. You can use the above command for up to 3 times by which you can extend the trial period to 120 days without activation.
4. Now comes the actual trick by which you can extend the trial period for another 240 days. Open Registry Editor (type regedit in “Run” and hit Enter) and navigate to the following location

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform

5. In right-side pane, change value of SkipRearm to 1. 6. Now you will be able to use the slmgr -rearm command for another 8 times so that you can skip activation process for another 240 days. So you will get 120 + 240 = 360 days of free Windows 7 usage.
120 days using “slmgr -rearm” command before registry edit +                                                                                                                                                               
240 days using “slmgr -rearm” command after registry edit
 =      360 Days

How To Make Your Own Radio station



Love to listen to internet radio ? Have a great collection of music ? Wanna be a DJ ? or just wanna make others experience your great collection of music ? lets get it going..and get ready to rap,roll and obviously broadcast…
Here is what you need -
Firstly,your internet speed has to be at least 64 kbps or above (which means Dial-up users, who will be having a lot of latency, will not be able to setup) . Secondly,you going to have to have a domain, an updated one with the current IP active.
Download the Shoutcast files and install them in any order.
Now navigate to
START > PROGRAM FILES > SHOUTcast DNAS > EDIT SHOUTCAST DNS CONFIG.
Configuring Shoutcast -
  • Go Down and where it says Password : change (set it something you can remember..duh.)
  • The Portbase : change it to whatever port you want it
  • Maxusers : (lets be realistic here, dnt put in 10000, like NXS's radio station) your bandwidth has to be extremely good, if your cable, 50 user max is ok, ADSL should stay below 10 users, and T1 connections should do whatever tickles your fantasy.
EDIT > SAVE
  • Now Open winamp and right click it or press ctrl + P
RIGHT CLICK > OPTIONS > PREFRENCES > DSP EFFECT > and choose the NULLSOFT SHOUTCAST.
  • Now Go to OUTPUT, and then click on Connection.
  • Through the ADDRESS, type your address which you have done through www.no-ip.com, PORT NUMBER, whatever u did in the EDIT.txt, and your password.
  • Then go to Encoder, and choose your quality of your music.
  • Now Go back to
OUTPUT > OUTPUT CONFIG > YELLOW PAGES
This is your advertisement information. Write whatever you like there.
Now Connect. To check that your Radio on-line go to http://(your address that you added in the preference).
Cheers,you have successfully created your own radio station,tell others about it to tune into it and enjoy…

Repair windows registry by Registry First Aid Platinum 8.0.1



Registry First Aid Platinum 8.0.1 | 6.5 MB
Registry First Aid scans and corrects registry errors. Your WindowsВ® registry will be always clean and correct. Registry First Aid scans registry for orphan file/folder references, invalid font references, obsolete Start Menu items, invalid fonts, shared DLLs, application paths and more…

 Registry First Aid finds these files or folders on your drives that may have been moved from their initial locations, and then corrects your registry entries to match the located files or folders.

In addition, if your registry has links to files of deleted applications, Registry First Aid will find these invalid entries and remove them from your registry. With Registry First Aid, your Windows registry will be always clean and correct, helping your programs load faster and speeding up your computer.




Not all software un-installations do a complete job leaving behind numerous nagging file references in the Windows registry pointing to files that no longer exist. In time, you can end up with hundreds of these files that may slow down your computer and cause software to lock up, requiring a hard reboot of your computer.
Also, if you’ve moved your programs from one drive to another, you can break the file links that a program needs. Registry First Aid will find these files and folders that you’ve moved on your hard drive and help you correct the registry entries that point to them.
Features:
Here are just some of the great features of Registry First Aid:
• Easy to use step by step Wizard type interface.
• Registry First Aid scans registry for orphan file/folder references.
• Quickly finds these files or folders on your drives (if they’re moved from initial locations).
• Corrects registry entries to the located objects.
• If your registry still retains links to files of deleted applications, Registry First Aid will find these invalid entries and help you to easily remove them.

With this powerful tool, your Windows registry will be always clean and correct!
• How to use Reg1Aid: Do all of the above and more using these 5 simple steps.
• Scan the registry for invalid or bad entries.
• Scan the hard drive(s) for the missing files.
• Select the fix for your invalid registry entries.
• Save a backup file of your registry.
• Fix the registry!

New in version 8.0.1
- fixed bug: under some Windows 32-bit XP SP3 RFA found several thousands false errors under Invalid File Associations and ActiveX/COM categories and was unable to “fix” them;
+ now all windows have the same position and sizes, except for settings dialog (this behavior can be changed by adding EqualFormBounds=0 string into RFA.ini); if a registry string value has incorrect size stored in the registry, RFA now shows size it will be corrected to;
- correction pop-up menu displayed incorrect icon for “modify” correction under some error categories;
+ double-click over a registry entry now will open RegEdit.exe;
+ icons for found entries under Registry Search feature when view mode is set to “view by error level”;
- sometimes incorrect number of total entries in status bar after fixing;
* settings dialog cannot be closed and “edit task” button cannot be clicked twice while scheduler task properties dialog is opened;
- several minor bugs were fixed.

Homepage-http://www.rosecitysoftware.com/


Hide your files in a jpeg image using cmd


This is a simple command prompt ( cmd ) trick. You can hide your files behind jpeg image. You will only need winrar and a little knowledge of dos commands.
just follow these steps

step 1- create a folder and copy all files in the folder you wanted to hide in a image file.(EX- c:\hidden)
step 2- create a rar archive of these files.(EX- secret.rar)
step 3- copy a image file in the same folder. (EX: image.jpeg)
step 4- open cmd and go to the directory of the folder.(c:\hidden> )
step 5- run this command. copy /b image.jpeg+secret.rar output.jpeg



here image.jpeg is the image in which you want to hide you files. secret.rar is the archive of those files which you want to hide in the image. output.jpeg is name of the output image file.

Now you can open output.jpeg by double click. It will open as a image file and will show the preview of the image. If you want to see the files hidden inside the image, open this image output.jpeg using winrar.

Lock your folders without any softwares



This is a very simple batch file trick. Paste the given code in batch file and save it as with any name.(remember Batch file extension is .bat). Double click on this batch file to create a folder locker. Now you will see a folder name Locker at the same directory of batch file. Put all files which you want to hide in the Locker folder. Double click on this batch file to lock the folder 'Locker'. If you want to unlock your files,double click the batch file again and you would be prompted for password. Enter the password and enjoy access to the folder.

if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to Unlock folder
set/p "pass=>"
if NOT %pass%==type your password here goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Locker
echo Locker created successfully
goto End
:End

How to block any website on your computer system without any software





There are many people who want some website unaccessible from their computer. Most of the parents want to block some websites on their computer system. Here i am going to write a well known an easy way to do this.


Steps:

1- go to C:\WINDOWS\system32\drivers\etc
2- Find a file named "HOSTS"
3- Open this file in notepad
4- Under "127.0.0.1 localhost" Add 127.0.0.2 www.xyz.com , Now www.xyz.com site will no longer be accessable.

you can add as many url of websites under this by increasing last no. of ip 
as
127.0.0.3 www.abcxyz.com
127.0.0.4 www.xyzas.com

an so on.
To unblock these website only erase the line corresponding to that website.

Protect your system from USB viruses using Autorun Virus Remover 3.0



Autorun Virus Remover can detect and clean hundreds of usb/autorun viruses and it will block viruses and trojans trying to attack when USB device is inserted. Autorun Virus Remover provides 100% protection against any malicious programs trying to attack via USB storage(USB drive?USB stick?pen drive?flash drive?flash card?secure digital card?removable storage?portable storage?ipod?media player).



Compare Autorun Virus Remover with other antivirus solutions, you will find out its highlights: Autorun Virus Remover provides 100% protection against any threats via USB drive, however, the majority of other products are unable even to guarantee 90% protection. Autorun Virus Remover can detect and clean the usb virus/worm/trojan such as Ravmon,auto.exe in your computer or usb drive,it could solve the problem that unable to open a drive by double clicking. It also removes the leftovers of virus by removing the autorun.inf files and cleaning up your system registry, so you won’t see the autoplay item anymore


Download Autorun virus Remover