Saturday, 13 June 2015

Chapter Overview and Key Learning Points
This chapter will explain the downloading and installing process Kali Linux on:

– Hard drives
– Thumb drives (USB memory sticks)
– SD cards
Kali Linux
I nstalling operating systems, such as Microsoft’s Windows, A pple’s O S X, or open source
platforms like D ebian and Ubuntu, may be second nature to some, but a refresher on
this process is always good. Those that have never installed an operating system before
should not worry, the following sections in this chapter will provide all of the steps
necessary to locate, download, and install Kali Linux.
Kali Linux is unique in many ways, but the most important distinctions of this
distribution are the ability to not only run from a hard drive installation but also boot as
a live disk and the number and type of specialized applications installed by default. A
live disk is an operating system installed on a disk including Compact D isks (CD s),
D igital Video D isk (D VD ), or Blu-Ray D isk. A s a penetration tester, the ability to boot live disk is quite important. Those with access to local machines on the network can
leverage live disks to use these machines even if the penetration tester does not have an
account on the installed operating system. The system will boot to the live disk instead of
the local hard drive; that is, if the machine is configured correctly the penetration tester
will then have access to many of the resources on the local network, while at the same
time not leaving evidence on the local machines hard drive. The software installed on
Kali Linux is another reason it is uniquely outfi􀄴ed for the penetration tester. By default
Kali Linux has 400 penetration testing and security tools, packages and applications
installed and has the ability to add more as they are needed.
System Information
A ll operating systems have uniqueness’s and slight deviations that will appear through
their initial installation and setup; however, most Linux/Unix-based platforms are
relatively similar in nature. When installing Kali Linux, as with other Linux operating
systems, planning before installation is crucial. Below is a short list of things to consider
when installing Kali Linux.
Will the operating system be running on a desktop computer or laptop?
What size hard drive is needed?
Does the available hard drive have sufficient space available?
How many hard drive partitions are needed?
Is log management a concern?
Is security a concern?
Selecting a Hardware Platform for Installation
Traditionally, the operating system is installed on the computer’s hard drive, however,
with operating systems such as Kali Linux, there is an ability to install the operating
system to thumb drives (aka flash drives) and S D cards due to the recent, availability,
and affordability of larger capacity devices. Regardless of the storage device is used to
install the operating system, it is critical to determine whether to install to a standalone
computer (such as a lab computer) or a laptop that will allow for a mobile solution?
I f very specific hardware, such as high-powered graphics cards, will be used for
cracking passwords, it is recommended that the installation of Kali Linux be installed on
a desktop computer. I f there is a need to carry the operating system from customer site
to customer site, or there is a desire to test wireless devices, a laptop is recommended.
The installation of the operating system is the same for laptop and desktop computers.
Hard Drive Selection
N ot to over use the phrase, but “S ize does ma􀄴er.” A general rule of thumb is the bigger
the drive, the be􀄴er. This book is recommending a drive with a minimum of 120GB of
space; however, even this can become full very quickly, especially in the case of password
cracking and forensics or pentesting projects that require a lot of control over, evidence,
logs and report generation or collection. I n the case of most commercial and government
security assessments, the operating system is cleaned, erased, or completely removed to
maintain an established baseline environment. This practice is widely accepted
throughout the security community due to the need for a proper handling of customer
confidential data and minimizing spillage of corporate information that could possibly
harm the company’s infrastructure or reputation.
Partitioning the Hard Drive
Partitioning is the act of separating out the file system to specific areas of the hard drive
by se􀄴ing special block sizes and sectors. Partitioning can prevent an operating system
from becoming corrupted by log files that take over a system and under certain
circumstances provide greater security. The operating system is, at the basic level,
already broken into two different partitions. The first partition is the swap area, which is
used for memory paging and storage. A second partition is designated for everything
else and is forma􀄴ed with a file structure such as the extended file system 3 (ext3) or
extended file system 4 (ext4). I n the case of laptops, especially those devices where the
operating system will be reloaded time and time again, further partitioning is not
necessary. For customized installations or computers that will have a more persistent
operating system, there is a need to at least separate out the temporary (tmp) files.
A dvanced partitioning of the hard drive and dual booting a computer are outside the
scope of this book and will not be covered. The only exception is in A ppendix A where
customized distributions are introduced with a third-party application called, Tribal
Chicken.
Security During Installation
Kali Linux is a very powerful operating system with a plethora of preinstalled tools that
can possibly destroy computers, network infrastructure, and if used improperly or
unethically, can lead to actions that will be perceived as criminal or law breaking. For this
reason passwords are essential. While passwords are the most basic security practice,
many administrators and security professionals often forget or ignore the use of
passwords. Basic security practices such as proper use of passwords are essential to
ensure that your installation of Kali Linux is not used by others who might inadvertently
or maliciously cause harm to a person, computer, or network.
Downloading Kali
Kali Linux is a distribution of Linux and is downloaded in an I SO (pronouncede: ye-so)
file. I t will need to be downloaded from another computer and then burned to a disk
prior to installation. At the time of writing this book, Kali Linux can be downloaded from
http://www.kali.org/downloads/. D ocumentation for advanced operations, configurations,
and special cases can also be found in Kali’s official website, http://www.kali.org/officialdocumentation/.
There is also a very large and active community where users can post
questions and help others with difficulties. Registration at this site is recommended to
gain access to the community boards that are managed by O ffensive S ecurity, the makers
of Kali Linux. O ffensive S ecurity will also send out messages about updates and
community information (Figure 2.1).
FIGURE 2.1 Downloading Kali Linux.
Be sure to select the right architecture (i386=32-bit, amd64=64-bit). The trusted
contributed images of Kali Linux is outside the scope of this book; however, if you wish
to get familiar with Kali or need a sandbox environment for greater control then the
VMware download is perfect for those situations. Click on the appropriate download link
to continue with your selection.
For Microsoft Windows7 users, double-click on the completed download and the Burn
I S O Wizard will appear. Follow the prompts to complete the conversion of I S O image to
a D VD that can be used for installation. Linux users will need to open the I S O in a
suitable disk burning application such as K3b.
Hard Drive Installation
The following sections will provide a textual and graphical installation guide designed
for simplicity. To correctly install Kali on the systems hard drive, or even boot to the live
disk, it is critical that the Basic I nput O utput S ystem (BI O S ) be set to boot from optical
disk. To begin the installation, place the CD in the computer’s CD tray and boot the
computer to the disk. A dvanced users comfortable with virtualization technology such as
VMware’s Player or O racle’s Virtualbox will also find this guide straightforward and
helpful as an aide to creating a virtualized version of Kali Linux.
Booting Kali for the First Time
A computer booted to the Kali Linux disk successfully will display a screen that looks
similar to Figure 2.2. The version of Kali Linux being used for this guide is 1.0.5 64-Bit;
versions downloaded at different times may look slightly different; however, the
graphical installations are quite similar in nature. A n updated guide for every new
release of Kali Linux can be found at http://www.kali.org/, and it is highly recommended
that this site is consulted for the latest documentation for your version prior to
installation or if you have any questions along the way.
FIGURE 2.2 Live ISO Boot menu.
Kali Linux is distributed as a “Live CD” (akaL ive ISO), which means that the operating
system can be run straight from the disk in addition to being installed to a hard drive.
Running Kali from the live disk allows the system to boot and all of the tools will execute;
however, the operating system presented is nonpersistent. N onpersistent means that
once the computer is shut down, any memory, saved se􀄴ings, documents, and possibly
very important work or research may be lost. Running Kali in a nonpersistent state takes
great care, advanced handling, and decent understanding of the Linux commands and
operating system. This method is great for learning the Linux operating system without
deleting the existing operating system already installed on the computer’s hard drive.
A nother installation, that is out of the scope of this book, is I nstallation with S peech
S ynthesis. This is newer feature to Kali and the D ebian operating system. I nstallation can
be controlled vocally if you have hardware that supports speech synthesis. This book will
focus on the graphical installation for now; therefore, highlight G raphical Install and
press the Enter key.
Installation—Setting the Defaults
The next few screens will allow the selection of the systems a default language, location,
and keyboard language. S elect the appropriate se􀄴ings and click on continue to advance
the installer. A s the computer begins to prestage the installation of Kali Linux, various
progress bars will be presented on the screen throughout the installation. S electing the
default settings is appropriate for most of the selection screens.
Installation—Initial Network Setup
Figure 2.3 details the initial setup and basic configuration of the primary network
interface card. Choose a hostname by typing in the box and clicking on continue.
Hostnames should be unique, as complications with networking can be a result of
computers that were accidentally configured with the same hostname while located on
the same network.
FIGURE 2.3 Setting a hostname.
A fter selecting a hostname and clicking on the Continue bu􀄴on, the next screen will
ask for the computer’s fully qualified domain name, FQ D N . This is necessary for joining
domain environments and not necessary for most lab environments. For this guide, the
FQ D N was left intentionally blank and can be bypassed by selecting the Continue
button.
Passwords
The next prompt in the wizard will ask for a root-level password. The default password is:
toor; however, it is recommended that a new password is selected that contains at least
one each of the following: uppercase, lowercase, number, and symbol. The password
should have no traceability to the user and not be easily guessed. A password of 10 or
more characters is suggested. For example if the user once played high school soccer,
then soccer22 would not be recommended. Passwords can be made from variations of
common phrases to increase recall. Here are some examples of strong passwords:
St0n(3)b@tt73 – “Stone Battle”
P@p3r0kCur5# – “Paper, Rock, Curse”
m!gh7yP@jjjama% h – “Mighty Pajamas”
When typing your password, it will show up as a series of dots or asterisk. This is
normal and hides your password from being displayed in case someone may be viewing
the computer screen. A fter entering in the same strong password twice, click on the
Continue button to advance further into the installation (Figure 2.4).
FIGURE 2.4 Setting a password.
Configuring the System Clock
Figure 2.5 shows the prompt for selecting a time zone. Click on the appropriate time
zone and the click on the Continue button to advance on in the installation.
FIGURE 2.5 Configure the clock.
Partitioning Disks
There are so many ways to configure partitions for se􀄴ing up a Linux operating system
that someone could devote an entire book to the subject. This guide will focus on the
most basic installation, G uided Partitioning. Figures 2.6 through Figures 2.10 show the
default se􀄴ings to that are initially highlighted. There will be nothing to select until
Figure 2.10. At this time, the installation may be sped up by clicking continue until
partitioning is complete, however, it is wise to take a moment and review each step of the
installation wizard.
FIGURE 2.6 Partition disks—1.
Figure 2.6 shows different options for partitioning hard drives during the installation.
LVM, or Logical VolumeManagement, is not recommended for laptop, thumb drive, or
S D card installation. LVM is for multiple hard drives and is recommended only for
advanced users. “Guided—user entire disk,” should be selected. Click on the Continue
button to advance through the installation process.
Figure 2.7 shows the hard drive that has been selected for installation. D epending on
hardware and version of Kali Linux, the installation experience may differ slightly. The
hard drive will be selected for and if acceptable click on the Continue bu􀄴on to advance
through the installation process (Figure 2.8).
FIGURE 2.7 Partition disks—2.
FIGURE 2.8 Partition disks—3.
A s this book is geared toward new users of the Kali Linux distribution: “A ll files in one
partition (recommended for new users)” is the best option and should be selected. Click
on the Continue button to advance through the installation process.
At the next prompt in the wizard, the partition guide has been completed and is
presented for your review. A primary partition containing all of the system, user, and
scripting files will be created as one partition. A second partition is created for swap
space. The swap area is virtual system memory that pages files back and forth between
the computer’s central processing unit (CPU) and random access memory (RA M). A ll
Linux systems are recommended to have a swap area and the general practice is to set
the swap area equal to or one and a half times the amount of physical RA M installed on
the computer. A s seen in Figure 2.9, “Finish partitioning and write changes to disk,” will
be selected for you. Click on the Continue bu􀄴on to advance through the installation
process.
FIGURE 2.9 Partition disks—4.
Figure 2.10 is a last chance review for partitioning before the hard drive configuration
is commi􀄴ed. There are ways to change partition sizes in the future if necessary, but
doing so could potentially cause massive damage to your operating system if not done
correctly. This prompt in the wizard is a warning that you are about to write data to a
specified hard drive with the previously defined partition tables. S elect YES and click on
the Continue button to advance through the installation process.
FIGURE 2.10 Partition disks—5.
A fter clicking continue at the last prompt of the partitioning section of the wizard, the
hard drive partition will begin. Figure 2.11 shows that the actual installation is being
conducted at this time. D epending on the hardware you possess, this process can take
just a few minutes or even an hour or more.
FIGURE 2.11 Installation is underway.
Configure the Package Manager
The package manager is a crucial part of the operating system’s setup. The package
manager refers to the update repository where Kali Linux will pull updates and security
patches. I t is recommended to use the network mirror that comes with the Kali Linux
I S O as this will the most up to date sources for package management. Figure 2.12 shows
that “YES” will be selected by default. Click on the Continue bu􀄴on to advance through
the installation process.
FIGURE 2.12 Configure the package manager.
I f using a proxy, enter the configuration information where appropriate on the next
prompt in the wizard or leave it blank as pictured in Figure 2.13. Click on the Continue
button to advance through the installation process.
FIGURE 2.13 Configuring a proxy.
Installing the GRUB Loader
TheGrand Unified Bootloader( GRUB) is the main screen that will be displayed every
time the computer is started. This allows the verification of certain se􀄴ings at boot, make
on the fly changes, and make se􀄴ing adjustments before the operating system loads.
While GRUB is not necessary for some advanced users, it is highly recommended for
most installation types. Figure 2.14 shows that “YES” to install the GRUB is selected for
you. Click on the Continue button to advance through the installation process.
FIGURE 2.14 Install GRUB.
Completing the Installation
N ow remove the disk from the computer and reboot you machine. When prompted do so
and then click on the Continue button to finish the installation (Figure 2.15).
FIGURE 2.15 Installation complete.
A fter rebooting, the welcome screen will be presented. Log in as the root user with the
predefined password set earlier in the installation process. Welcome to Kali Linux!
Thumb Drive Installation
US B memory devices, often referred to as thumb drives and many other names, are
nothing more than a storage device that is a􀄴ached via a US B interface to the computer.
This book recommends using a USB device with atl east 8GB of space, preferably much
more. N ew computers can boot to US B devices. I f this option is selected make sure that
the computer being used can support booting from a USB device.
The following sections break down the installation of Kali Linux on to US B using a
Microsoft Windows computer or Linux platform. Be sure to check the documentation
provided on the Official Kali Linux homepage for updates to this process.
When it comes to thumb drives being used as bootable devices, there are two key
terms that are very important: persistence and nonpersistence. Persistence refers to the
ability of your device to retain any wri􀄴en or modified files after the machine is powered
off. N onpersistence refers to the device losing all se􀄴ing, customizations, and files if the
machine reboots or is powered off. S pecifically for this book, the thumb drive installation
of Kali Linux from a Windows platform will be nonpersistent, and the installation from a
Linux platform will be persistent.
Windows (Nonpersistent)
Required application—Win32 D isk I mager:
http://sourceforge.net/projects/win32diskimager/
A fter downloading the Kali Linux I S O , put a thumb drive in the computer and allow it
to automatically be detected by Windows, taking note of the drive le􀄴er assigned. N ext
open Win32 D isk I mager. Click on the folder icon to browse and select the Kali I S O file
and then click the “O K” bu􀄴on. S elect the correct drive le􀄴er from the device drop-down
menu. Finally click the “Write” button.
When Win32 D isk I mager has completed burning the I S O , reboot the computer and
select the thumb drive from the BI O S PO S T menu. Most manufacturers have different
methodologies for booting to US B devices; be sure to check the computer manufacturer’s
documentation.
Linux (Persistent)
When building a persistent thumb drive, again, size does ma􀄴er! The bigger the thumb
drive, the be􀄴er. A lso, depending on the version of Linux in which you will be building
this US B device, be sure that the application GParted is installed. Be sure to check your
operating system’s documentation if you are having difficulties installing GParted. O ne
of the following methods may be necessary for your Linux installation if GParted is not
installed:
apt-get install gparted
aptitude install gparted
yum install gparted
A fter downloading the Kali Linux I S O , plug in thumb drive. O pen a terminal window
and verify the USB devices location the following command.
mount | grep -i udisks |awk ‘{print $1}’
Figure 2.16 shows that the output of the command as “/dev/sdb1.” The US B device’s
output may be different based on the computers se􀄴ings and configuration. I n the next
command, swap “sdb” to match the correct identification and remove any numbers at
the end.
FIGURE 2.16 Mounted USB.
Use the “dd” command to transfer the Kali ISO image to the USB device.
dd if=kali_linux_image.iso of=/dev/sdb bs=512k
Now launch Gparted.
gparted /dev/sdb
The drive should already have one partition with the image of Kali that was just
installed.
A dd a new partition to the US B by selecting N ew, from the menu that appears after
clicking on the Partition menu from the File Menu Bar. S light deviations in output can be
present from many different device manufacturers. O n average, the steps are similar to
the following.
Click on the grey “unallocated” space.
Click on “New” from the Partition drop-down menu.
Use the sliders or manually specify drive size.
Set the File System to ext4.
Click Add.
From the main window select, Apply All Operations from the Edit drop-down menu.
Click Okay when prompted. This may take a while.
To add in persistent functionality use the following command.
mkdir /mnt/usb
mount /dev/sdb2 /mnt/usb
echo "/ union" >> /mnt/usb/persistence.conf
umount /mnt/usb
Creation of the LiveUS B is now be completed. Reboot the computer and boot from the
thumb drive.
SD Card Installation
Microcomputing devices such as the RaspberryPi and Google’s Chrome N otebook are
capable of running on S D cards. These small devices can be used for a plethora of
purposed; someone is only limited by their own imagination. The greatest advantage of
devices; such as the Raspberry Pi, is that they are cheap and a huge hit in the open source
communities making resources readily available to tinkerers everywhere.
There is one drawback to the installing Kali Linux on A RM devices, the images are
custom and have to be defined for each piece of hardware. I mages for A RM devices can
be located on Kali’s official download pages, http://www.kali.org/downloads/. Be sure to
check out the website to see if your hardware has a supported image available for
download.
The following steps provide a short guide to installing Kali Linux to compatible A RM
architecture-based devices.
1. Download the appropriate image from Kali’s official website
(http://www.kali.org/downloads/).
2. Insert a blank SD card. Verify the mounted location with the following command.
mount | grep -i vfat
(Assuming/dev/sdb for the next step.)
3. Transfer the Kali.img file to the SD card.
dd if=kali.img of=/dev/sdb bs=512k
4. Unmount and sync any write operations before removing the device.
umount /dev/sdb
sync
5. Remove the SD card.
6. Insert the SD card containing the Kali Linux image into your ARM architecture
computing device and boot to the SD card.
Summary
I n this chapter, the topics covered will give the user the ability to install Kali Linux to
most computers, laptops, thumb drives, and microcomputing devices. I nstalling Kali
Linux is much like riding a bicycle; do it once, and you won’t really ever forget how to
install Kali. Be sure to check with the documentation and community message boards on
Kali’s official website as new updates, versions, and technologies developed in the
security community. Linking up and networking with other security professionals,
hobbyists, and hackers alike can, and will, expand the mind, delve deeper into new
projects, and assist in answer questions when able

Friday, 12 June 2015

Sometimes you face a problem that your computer freezes or having hanging problem


Step 1: whenever it happened wait… and don’t be tempted to press more buttons or click on the screen, as this can give more tasks for the computer to do and compound the problem.

Step 2: If, after a few minutes, it still hasn’t unfrozen, press and hold the Ctrl, Alt and Delete key at the same time. (You may have a key saying DEL instead of Delete and they may be in different places depending upon what type of keyboard you have).

Step 3: Once you have pressed Ctrl, Alt and Delete the following screen will come up. Choose Start Task Manager from the list on the screen.
Image result for what happen if alt ctrl del pressed in win 7
Step 4: A 'Task Manager' dialogue box will come up on the screen. Under the applications tab, a list of the applications and programs currently running will be shown. If the application is frozen, you may see ‘Not Responding’ in the status column  next to it.

Image result for task manager windows 7


Step 5: Click on the application name, so that it is highlighted and then click End Task .

Step 6: There Choose  End Program.

Step 7: If you do these steps and your computer continues to be frozen and won’t respond or you try to
do Ctrl , Alt and Delete and still nothing happens, the last resort is to press and hold the power on button of your computer for a few seconds until the computer goes off. Wait a few seconds, then turn your computer back on again.

Step 8: If you find that your computer keeps freezing when you start a program, you may need to uninstall the program from your computer

Step 9: From the start menu, choose Control Panel. Once the Control Panel is open,find that program then choose Uninstall a program.

Step 10: If you find that your computer boots up but then freezes and you can’t uninstall the problem, you may have to re-boot but boot into 'safe mode'.  press F8 at boot time the windows load in safe mode then uninstall that program.


Your computer may also freeze because it is running out of space on the hard drive.

There are a few things you can do:

Step 1: Uninstall programs that you don’t use.

Step 2: Run a 'Disk Cleanup'. A number of files and applications can use up memory and aren’t required – such as temporary files and cookies. Running 'Disk Cleanup' will allow you to remove any data that isn’t
needed to free up more space on your hard disk.

Step 3: From the 'Windows Start Menu', choose Computer . When the computer dialogue box opens up, right click on the C: and choose properties from the menu.

Step 4: Click on Disk Cleanup in the next window, the computer will then go through a number of files and programs to see what can be deleted.

Step 5: Once it has done this, it will offer a list of possible files to delete.

Step 6: Scroll down the list in the disk cleanup to see what you can delete to free up space. Click in the tick box to choose the item. When you have finished and are happy to delete the files, click on Clean up system files .

Step 7: Update your antivirus software and do a complete and full scan. Sometimes viruses can cause a computer to freeze

Thursday, 11 June 2015

Hack Windows XP/7/8 admin password easily without any software

Hello guys. Here's a new 100% working trick to hack windows password .
I know there's a lot of softwares out there to get it done . But thats not geeky & also not time consuming . The real fun is when you can hack this manually within just a few minuets .

So here are the steps to do it.

Required things:

1) Windows 98 bootable USB drive ( We will learn to make it as we proceed) .
2) Basic knowledge of DOS commands .
3) Basic knowledge of how to boot your PC from a USB drive .

Theory:

Now you may wanna know the theory behind this hack . So here's how we do it .
In windows we can change the password of the PC with command prompt very easily .
with the command line net user username password . (replace username & password with the credentials you want ) . But this can be possible only if you have admin access to the command prompt . A command prompt with admin access is called elevated command prompt . When you simply open a command prompt window it brings you to the C:\users\username directory . But in an elevated command prompt you are brought to the C:\windows\system32 directory .

So if we can start an elevated command prompt window in the windows login screen, then we can run the above said command and change the password to what we want . So the main problem is how can we do this .




There are some programs which we can run directly from the login screen. These are our keys to hack a windows password .
The programs are:
1) sethc.exe ( windows xp , windows vista )
2) narrator.exe ( windows 7 , 8 )
3) magnify.exe ( windows 7 ,8 )
There are more but these will be enough for us . In windows 7 & 8 we can access them by clicking on the " Easy of Access " button in the login screen & then selecting "narrator" or "magnifier" then "apply" & then "OK"

All these files are stored in the C:\windows\system32 folder . And also the file for command prompt is stored in this folder ( named cmd.exe ).

So if we can replace one of those above mentioned files with cmd.exe & then if we start those programs in login screen, we can get an elevated command prompt & then type the net user command to change the password & we can gain access to the system .

Now the question is how to replace those files with command prompt when we have no access to the system ? The answer is by using a live OS which we can boot from an external USB drive & then accessing the file system through it. Most people will suggest you to use a Ubuntu live CD . But Ubuntu is near about 800 MB in size . So I'll suggest you to use MS-DOS 98 with an external usb drive which is 3 MB in size .

Now here are the steps to make a Bootable MS-DOS 98 usb drive:

1) Download DOS 98 from the link given below .
2) Download HP USB Disk Storage Format Tool form the below link .
3) Unzip & install the HP USB Disk Storage Format Tool .
4) Unzip DOS 98.zip and extract the folders ms-dos & ntfs dos . Remember the location .
5) Plug in your USB drive ( pen drive ) in your pc . ( make sure you backed up your contents of the pen drive, because your pen drive will be formatted . )
6) Now run HP USB Disk Storage Format Tool . ( in windows 7 right click on it & run as administrator ).
7) Now on the device window select your pen drive . In my case it's kimgston data travelar... . 

8)now in the file system select FAT . & tick both "quick format" & "Create a dos startup disk" .
9) now click on the 3 dots next to the box & select the ms-dos folder you extracted earlier . & press ok .





10) Now press start . Let the process complete .
11) Now copy the contents of NTFS folder in your pen drive .
Thats it . Now your bootable USB pen drive is ready .

Now here comes the main part.

Booting the target PC with this pen drive:

Switch on the target pc with the pen drive pluged in . And wait until a black ( sometime blue ) screen appears . There you will see some options like ** to enter setup , ** boot menu etc . In my case it's like F10 - to enter setup , Esc - Boot menu . Press the button which says Boot menu ( in my ps it's Escape button ) & select the pen drive from the list of available devices. Now you should see the dos window .

*Check your PC's BIOS manual for more info on accessing boot menu. Some PCs don't have the Boot menu . In such cases you need to Enter Bios setup by pressing the particular key ( in my case it's F10 ) & then change the boot device order as Removable media in the first place .

**To know more about how to change boot order of a PC follow these links or refer to the BIOS manual.

http://lifehacker.com/5991848/how-to-boot-from-a-cd-or-usb-drive-on-any-pc
http://pcsupport.about.com/od/fixtheproblem/ss/bootorderchange.htm


Real Hacking Begins Here:

If you booted correctly from the usb drive, you should now see the dos prompt. something like this with the C:\ prompt .

Now the first thing to do is to find out the windows instalation directory .
For this just change the drives serially , check for the windows directory in that drive with dir command .

Your commands should look like this:
C:\> D:  (press enter)                                              --------- Changes the prompt to drive D.
D:\> dir (press enter)                                               ---------  Lists all the files and folders in the drive D .
D:\> some results with files & folders.                       --------  Search for the windows folder here.

You should probably find it here in the drive D . If not then change the dir again to E . 

D:\> E:   (press enter)                                                --------- Changes the prompt to drive E.
E:\> dir   (press enter)                                               ---------  Lists all the files and folders in the drive E.
E:\> some results with files & folders                          --------  Search for the windows folder here.

If not found repeat the process with F , G , H , drives serially untill you get the windows folder .
In the below image the windows folder is in C drive . We get the below result after executing the following command .
C:\> dir (press enter )


 Now suppose you get the windows folder in D: drive .
You should return on the D:\> prompt automatically .

Now type the command cd windows\system32 (press enter).
You should now see D:\windows\system32> on the prompt .
Now type the following commands exactly as they are.

copy narrator.exe c: ( press enter )

copy cmd.exe c: (press enter)

del narrator.exe  (press enter)

ren cmd.exe narrator.exe (press enter)

 This should look like this.

 Thus we replaced the narrator.exe file with cmd.exe .

Now whenever we start the narrator process we will get the Elevated Command Prompt .

Changing The Password:
Now restart your PC normally . without the pen drive plugged in .
Now when you are on the login screen . Click on Easy of access on the left bottom corner . And tick the narrator > Apply > OK . In no time you'll get a command prompt window . Like DOS .

Now type in the command net user your_username your_new_password .
Suppose the user name is computer , then type net user computer 12345 (enter) . And the new password will be 12345 .
Now close the command prompt & enter your new password in the box & go . Bingo ! now you have access to the system .

***Note
In windows xp there's no "easy of access button" so you have to change the commands a little .


copy sethc.exe c: ( press enter )

copy cmd.exe c: (press enter)

del sethc.exe  (press enter)

ren cmd.exe sethc.exe (press enter) 

 And then on the login screen press "shift" key five times in a row & the command prompt will appear . Least of tutorial is same for windows xp .

If i was not clear at any point please let me know to help you out in the comments section.

This hack was successfully tested on win 7 & 8 . But i hope the above said WIN XP hack will also work . Let me know if it works.

I'm posting this tutorial only for the password recovery purpose in case you forgot your windows password . I'll not be responsible for any kind of illegal usage of this tutorial .  

 
Download links to the files:

 HP USB Disk Storage Format Tool

 MS-DOS 98+NTFS DOS


Tuesday, 9 June 2015

Windows XP Tips Part-IV


31) To disable unneeded startup services for a safer, faster XP, use the "Services" Admin Tool (Control Panel > Administrative Tools > Services). If you are a single user of a non-networked machine, you can disable the following items, with no ill effect.

Fast User Switching
Human Interface Access Devices
Indexing Service (Slows the hard drive down)
Messenger
Net Logon (unnecessary unless networked on a Domain)
Netmeeting Remote Desktop Sharing (disabled for extra security)
Remote Desktop Help Session Manager (disabled for extra security)
Remote Procedure Call Locator
Remote Registry (disabled for extra security)
Routing & Remote Access (disabled for extra security)
Server
SSDP Discovery Service (this is for the utterly pointless "Universal P'n'P", & leaves TCP Port 5000 wide open)
TCP/IP NetBIOS Helper
Telnet (disabled for extra security)
Universal Plug and Play Device Host
Upload Manager
Windows Time
Wireless Zero Configuration (for wireless networks)
Workstation
[Attribution: axiouS, iexbeta]

32) You might be alarmed to discover that some Trojan scanners report that your copy of Windows XP is infected by the "Sockets de Troie" Trojan on port 5000. It isn't. As detailed at board.iexbeta.com, Stopping the Windows XP service called SSDP, which runs together with Universal Plug and Play, closes the open port. Disable both, and Port 5000 is gone. To start and stop services, use the Administrative Tools Control Panel noted above, or right-click the My Computer icon and choose "Manage," then select the appropriate item(s) from "Services and Applications>Services." A Microsoft Technet Bulletin describes the issue and provides a downloadable patch that closes the holes.

33) Speaking of security, if you are running an FTP server and you wish to enable XP's firewall, you might have to "enable passive transfers" in your FTP client. in order to access the service from behind the firewall. (In WS_FTP, this is found in the Advanced settings dialog.) While you're at it, you might want to change the default FTP port from 21 to something unique. In this case, you'll need to add a new service to the firewall's advanced configuration section, then specify your unique TCP port.
Remember, too, that XP's firewall blocks incoming traffic only. If you want an outgoing blocker, too, install a program such as Tiny Personal Firewall (which Microsoft's code is based upon, apparently) or ZoneAlarm.

34) If you are trying to install Windows XP on a machine and find that the machine keeps freezing part of the way through the installation, try pulling out non-essential cards (e.g., everything but the graphics card.) In many cases, it is an Ethernet card, modem or sound card that is hanging the installer. Once XP is up and running, you can add these cards one at a time (powering down the machine before adding new hardware, of course).

35) Make Windows XP boot up even faster. (This really works!) www.microsoft.com/HWDEV/fastboot/

36) Interested in Skinning Windows XP? Check out Styles XP, from www.tgtsoft.com. It's faster than Stardock's WindowBlinds XP and, at least currently, less buggy, too. (For the record, our favorite third-party skin for XP is AquaBlue -- a Mac OS X lookalike skin currently in beta, but already gorgeous.) See XP-Themes for more info on this and other themes.

37) Microsoft has released a set of Boot Floppies for Windows XP. These could be useful for systems unable to boot from the XP CD-ROM.

38) Microsoft has posted a nifty web-based interface designed to help you tune your system's ClearType display for optimum readability on LCD or CRT displays. Check it out at  www.microsoft.com/typography/cleartype/

39) "Labtecgw" at iexbeta.com notes:
Windows 2000 & XP machines delay as long as 30 seconds when you try to view shared files across a network because Windows is using the extra time to search the remote computer for any Scheduled Tasks. Here's how to prevent this remote search for Scheduled Tasks:

Open up the Registry and go to :
HKEY_LOCAL_MACHINE/Software/Microsoft/Windows/Current Version/Explorer/RemoteComputer/NameSpace
Under that branch, select the key :
{D6277990-4C6A-11CF-8D87-00AA0060F5BF}
and delete it.
If you like you may want to export the exact branch so that you can restore the key if necessary. This fix is so effective that it doesn't require a reboot and you can almost immediately determine yourself how much it speeds up your browsing processes.

Windows XP Internet Connection Firewall
Windows XP's Internet Connection Firewall (ICF) protects your network against undesired incoming traffic from the Internet -- everything from casual port scans by bored teenagers to serious break-in attempts by determined hackers. ICF creates a protective barrier between your network and the Internet, only passing through traffic that you've requested.

You can enable or disable ICF separately on each dial-up, LAN, or high-speed Internet connection in the Network Connections folder. That's good, because there are some connections that can benefit from ICF, and some that must not use it.

Personally i do not use it. Zone Alarm is my favourite.
 Some very important points:
Internet Connection Firewall is for use ONLY on a direct connection to the Internet, such as a dial-up, DSL, or cable modem. If your computer gets its Internet connection through a software router (like Internet Connection Sharing) or a hardware router, you don't have a direct connection and must not enable ICF
If the Internet Connection Firewall is enabled on a local area network connection with other computers, it will block File and Printer Sharing. This is probably the most common problem in Windows XP networking.
ICF is only effective against undesired incoming traffic from the Internet. It can't stop undesired outgoing traffic from spyware, Trojan horse programs, or other hacker tools. If you want outgoing protection, use a firewall that offers that capability, and disable ICF on all connections.
To enable or disable ICF, you must be logged on as a user that is a member of the Administrators group.

Enabling and Disabling the Internet Connection Firewall
  To enable ICF on an Internet connection, open the Network Connections folder, right click the desired connection, and click Properties.
  Click the Advanced tab, then check Protect my computer and network by limiting or preventing access to this computer from the Internet

  If the firewall is enabled and you want to disable it, un-check the same box.

Windows XP Tips Part-III


21) To access the Administrator login/shutdown screen, log all users out and then press CTRL+ALT+DEL twice.

22) To quickly access the computer management console, where you can see event logs (to see what's causing a problem, for example), right-click My Computer and choose Manage. Then, select the Event viewer and double-click highlighted events in the Applications or System areas to view detailed explanations of what went wrong. 

23) Roxio Direct CD version 5.02 or older releases do not work properly under Windows XP-- they prevent the machine from shutting down properly; it restarts instead; Roxio has an update to 5.1 that solves the problem. However, there are other alternatives, too. A similar program is Instant CD/DVD V6.02 from www.vobinc.com.  It supports backing up to DVD-RAM/RW or CDRW and fully supports CDRW drag & drop and DVD drag & drop in Windows XP and earlier Windows releases. A 30-day demo download is available. Read more....

24) Although the Creative Labs SoundBlaster Live is supported at a basic level by native Windows XP drivers, you can get additional features by installing Creative's Liveware 3.0. However, to get it to run successfully under XP, you'll need to replace the file called DEVLDR32.EXE with the version that comes on your the Windows XP CD, in i386/Drivers.Cab. Expand the cab Find DEVLDR32.EXE and copy it to a safe place.

Then install Liveware 3.0 for Windows 2000. When you reboot , make sure you boot into Safe mode (Press F8 at startup). Run the Task Manager (CTRL+ALT+DEL) and make sure DEVLDR32.EXE isn't running; if it is select it and click End Task. Then copy the DEVLDR32.EXE file you extracted earlier to your Windows/System32 folder and replace the Creative labs version. Read more....

25) Although Windows XP comes with the cool-looking Windows Media Player 8.0, the older Windows Media Player 6.4 is installed, too. It's at C:\Program Files\Windows Media Player\mplayer2.exe. Try it when playing movies -- it usually plays them more smoothly than WMP8.

26) You don't need Adobe Type Manager to use PostScript Type 1 fonts under Windows XP. Just drag the Type 1 font files to your fonts folder; XP automatically installs and activates the font. This works for TrueType and OpenType fonts, too. 

27) Want to remove that useless Welcome screen?
1 - Open TweakUI and go to About - Policy - Run Group Policy Editor
2 - Go to Administrative Templates - System - Logon - Don't display... welcome screen
3 - Set it to enable to remove the Welcome screen

And there is another option to remove the username from Start Menu:
1 - Open TweakUI and go to About - Policy - Run Group Policy Editor
2 - Go to User Configuration - Administrative Templates - Start Menu and Taskbar - Remove user name from Start Menu...
3 - Set it to enable to remove the username from the Start Menu
[Attribution: magoo, iexbeta]

28) You can only uninstall Windows XP if you upgraded from Windows 98/98SE or Windows Me... not Windows 2000. If you are considering an XP upgrade from W2K, you should back up your drive first, so that you will not need to re-install everything should you encounter unexpected problems with XP. By the way, W2K users can only upgrade to the Pro version of XP.

29) RhinoTrip at iexbeta discovered that you can run "wmiprvse.exe" as a process for quick shared network access to Win98/ME machines. Stick it in Startup or make it a service.
In the XP Networking forum over at NTCompatible.com, Robbie adds:
"On the PC running XP, log in as you normally would, go to users, manage network passwords.
Here is where the problem lies. In this dialog box remove any win98 passwords or computer-assigned names for the win98 PCs. In my case , I had two computer-assigned win98 pc names in this box (example G4k8e6). I deleted these names (you may have passwords instead). Then go to My Network Places and -- voilà -- no more delay!

Now, after I did this and went to My Network Places to browse the first Win98 PC, I was presented with a password/logon box that looked like this: logon: G4k8e6/guest (lightly grayed out) and a place to enter a password. I entered the password that I had previously used to share drives on the Win98 PCs long before I installed XP. I have the guest account enabled in XP.

This solves the problem for Win98 & XP machines on a LAN; I can't guarantee it will work for Win2K/ME machines as well, but the whole secret lies in the passwords.  If this doesn't solve your slow WinXP>Win98 access problems, then you probably have other things wrong. Don't forget to uncheck 'simple file sharing,' turn off your ICS firewall, enable NetBIOS over TCP/IP and install proper protocols, services & permissions."

[Attribution: RhinoTrip @ iexbeta and Robbie @ ntcompatible.com]

30) The default Log-in password expires as a security precaution. If you've set your XP system up without a password, and you see this message (typically, 14 days after installation), just press Enter when prompted for the old and new passwords. For more control over  passwords (including the ability to change the default expiry behavior), run 'gpedit.msc' as noted in tip #15.

Windows XP Tips Part-II


11) Want to hear that cool XP startup theme song or see the startup video again? They're both in the OOBE folder of your system. (OOBE stands for out-of-box experience.) The startup video is called intro.wmv; the audio track is title.wma. Try a search for either name.

12) Useful shortcuts:
Windows Key + L = Fast user switching logon screen
Windows Key + U = Utility Manager (Narrator, Magnifier, on-screen keyboard.)
Windows Key + R = Run command
Windows Key + F = Search for Files dialog
Windows Key + E = Explorer
Windows Key + D = Toggle Desktop / Windows view
Windows Key + M = Minimize all Windows

13) Version 5.0x of DirectCD is not compatible with Windows XP. Here's how to read UDF disks (by AngelDeath):
There is a way to read the CD, what you need to do is this, it works every time:

In Windows Explorer, right click any drive but not the CD-ROM with the disc in it, select properties, then go to hardware, then select the CD-ROM drive, then click properties, then go to volume, then click populate, you should see a dump occur in the window of the contents of the disc. Then click OK all the way to windows explorer, and then select the CD-ROM the disc is in, and now you have access to the disc, BUT it wont tell you the volume name...but you can see the disc, I have 6 discs that I have to do that to.
To format discs with UDF 1.02, 1.5, or 2.01, try Instant CD/DVD V6.02 , discussed in tip #23, below.
Nov. 1, 2001 Update: a better solution is to obtain the Windows XP compatible update for Easy CD Creator.

14) Although the NetBEUI networking protocol is not available by default as part of the Windows XP networking setup, it is still on the CD. Go to Network Properties and choose the option to Add a Protocol. Choose the "Have Disk" option. You'll find it on your XP disk in VALUEADD\MSFT\NET\NETBEUI. Install, then reboot.   

15) Over at the SuperSite for Windows, we came across what is probably the best tip of all: gpedit.msc is a built-in configuration tool that allows easy access to virtually every feature in Windows XP without having to resort to regedit. Run gpedit.msc and dig around!

16) Some (but not all) DivX movies play upside-down. DivXmovies.com notes a few solutions to this weird XP glitch. Briefly, you may have to move the file DivX_c32.ax from the windows/system or windows/system32 directory to another place (any directory). Do not do this unless you need to, as this file allows manual control of brightness and other settings. DivX Version 4.02 (final) also resolves this issue.

17) To change drive letters (useful if you have two drives and have partitioned the boot drive, but the secondary drive shows up as "D"), go to Start > Control Panel > Administrative Tools > Computer Management, Disk Management, then right-click the partition whose name you want to change (click in the white area just below the word "Volume") and select "change drive letter and paths." From here you can add, remove or change drive letters and paths to the partition.

18) Windows XP can directly access WebDAV "internet disks" such as Apple's iDisk. In Internet Explorer, use the "Open..." command, type the name of the WebDAV server you want to access (e.g., http://idisk.mac.com/username) and select the "Open as Web Folder" checkbox. Enter the password when prompted and you're in!
This trick also works on Windows Me and Windows 2000. Interestingly, Windows XP doesn't seem to support iDisk via the "Add a Network Place" command, possible with these other operating systems. Once set up using the "Open" command, however, the idisk can be accessed by simply double-clicking its icon in the Network Places folder.

19) Windows XP's digital camera support makes it incredibly easy to connect cameras such as the FujiFilm FinePix 4800Z we tested. After snapping some shots, we simply connected the camera to our PC via the included USB cable. Windows XP automatically recognized the camera and mounted the camera's removable 16MB storage card as a removable drive, allowing us to easily copy the images (at the camera's highest resolution, 4 megapixels each) to the "My Pictures" folder on the PC's hard drive. From there, you can run the photo printing wizard or automatic slide show to view the results. Things get even fancier if you have the optional Windows XP Plus! pack installed. Plus! provides exotic slide-show routines, displaying the images as if mapped onto a cube, carousel, or with a variety of other special effects such as "roll-up," "photo album," or fading in and out, etc.

20) Enhanced Scrolling Wheel support. Try pressing the CTRL key and rotating the wheel while viewing a web page. The fonts will change size.