Monday, December 21, 2015
Thursday, August 27, 2009
How to hack Rapid share and Mega upload
Hi all, This is for those who have to wait for about an hour after downloading certain amount of stuff from rapid share. To overcome this time constraint follow these steps:
mega upload Links, Download, Rapid share Links, rapid share movies, rapid share free, hack rapid share, hack mega upload.
RAPID SHARE
mega upload Links, Download, Rapid share Links, rapid share movies, rapid share free, hack rapid share, hack mega upload.
Method 1
1.open your rapid share link
2.then click on free.
3.As soon as timer start type this in address bar and click enter
javascript:alert(c=0)
4.a pop up message will come click ok your counter is zero just download the stu
mega upload Links, Download, Rapid share Links, rapid share movies, rapid share free, hack rapid share, hack mega upload.
Method 2
1.Delete the cookies in your browser internet explorer or Firefox or opera or whatever u use).
2.Press start->run,type cmd.
3.In the command prompt,type ipconfig/flushdns press enter.Then type ipconfig/release,then ipconfig/renew .Now type exit.
4.Now try downloading, for many people this may work if their ISP provides a dynamic ip.
mega upload Links, Download, Rapid share Links, rapid share movies, rapid share free, hack rapid share, hack mega upload.
Method 3
1.Just switch off your router or modem) and switch it back on.
2.This may work for some users Mtnl and Bsnl) and maybe some others too.
Actually these methods generally work for those people whose ISP gives them dynamic ip.
If these don't work then one more thing that can be done is to use proxies.
mega upload Links, Download, Rapid share Links, rapid share movies, rapid share free, hack rapid share, hack mega upload.
MEGA UPLOAD
mega upload Links, Download, Rapid share Links, rapid share movies, rapid share free, hack rapid share, hack mega upload.
Mega upload is very easy to hack to solve the download slots problem). Just go to http://leech.megaleecher.net/
Here you will find a place to put your original link. Put it there press enter and then you will get a direct link within some seconds. You are done!!!!!
mega upload Links, Download, Rapid share Links, rapid share movies, rapid share free, hack rapid share, hack mega upload.
RAPID SHARE
mega upload Links, Download, Rapid share Links, rapid share movies, rapid share free, hack rapid share, hack mega upload.
Method 1
1.open your rapid share link
2.then click on free.
3.As soon as timer start type this in address bar and click enter
javascript:alert(c=0)
4.a pop up message will come click ok your counter is zero just download the stu
mega upload Links, Download, Rapid share Links, rapid share movies, rapid share free, hack rapid share, hack mega upload.
Method 2
1.Delete the cookies in your browser internet explorer or Firefox or opera or whatever u use).
2.Press start->run,type cmd.
3.In the command prompt,type ipconfig/flushdns press enter.Then type ipconfig/release,then ipconfig/renew .Now type exit.
4.Now try downloading, for many people this may work if their ISP provides a dynamic ip.
mega upload Links, Download, Rapid share Links, rapid share movies, rapid share free, hack rapid share, hack mega upload.
Method 3
1.Just switch off your router or modem) and switch it back on.
2.This may work for some users Mtnl and Bsnl) and maybe some others too.
Actually these methods generally work for those people whose ISP gives them dynamic ip.
If these don't work then one more thing that can be done is to use proxies.
mega upload Links, Download, Rapid share Links, rapid share movies, rapid share free, hack rapid share, hack mega upload.
MEGA UPLOAD
mega upload Links, Download, Rapid share Links, rapid share movies, rapid share free, hack rapid share, hack mega upload.
Mega upload is very easy to hack to solve the download slots problem). Just go to http://leech.megaleecher.net/
Here you will find a place to put your original link. Put it there press enter and then you will get a direct link within some seconds. You are done!!!!!
Wednesday, August 19, 2009
Username and password of NOD32 Antivirus
Username:EAV-08784929
Password:2b6u8efpx7
Username:EAV-08784931
Password:tm6xdk62wd
Username:EAV-08802249
Password:jh6mmse65c
Username:EAV-08802242
Password:2etv8t36dc
Username:EAV-08676150
Password:56s67pjsfa
Username:EAV-08654491
Password:tx6rre3bbw
Username:EAV-08653425
Password:t6uhv4hfmk
Password:2b6u8efpx7
Username:EAV-08784931
Password:tm6xdk62wd
Username:EAV-08802249
Password:jh6mmse65c
Username:EAV-08802242
Password:2etv8t36dc
Username:EAV-08676150
Password:56s67pjsfa
Username:EAV-08654491
Password:tx6rre3bbw
Username:EAV-08653425
Password:t6uhv4hfmk
Labels:
Antivirus hack
CISCO scurity auditing tools
CPFPC
http://www.oxid.it/cpfpc.html
CISCO PIX FIREWALL PASSWORD CALCULATOR) PRODUCES THE ENCRYPTED FORM OF CISCO PIX ENABLE MODE PASSWORDS WITHOUT THE NEED TO ACCESS THE DEVICE.
ULTIMA RATIO
http://www.phenoelit.de/ultimaratio/index.html
A REMOTE CISCO IOS EXPLOIT
NIPPER
http://sourceforge.net/projects/nipper
NIPPER IS A NETWORK INFRASTRUCTURE CONFIGURATION PARSER. NIPPER TAKES A NETWORK INFRASTRUCTURE DEVICE CONFIGURATION, PROCESSES THE FILE AND DETAILS SECURITY-RELATED ISSUES WITH THE CONFIGURATION TOGETHER WITH DETAILED RECOMMENDATIONS. NIPPER WAS PREVIOUS KNOWN AS CISCOPARSE. NIPPER CURRENTLY SUPPORTS CISCO SWITCHES (IOS), CISCO ROUTERS (IOS), CISCO FIREWALLS (PIX/ASA/FWSM) AND JUNIPER NETSCREEN (SCREENOS). OUTPUT IS IN HTML, LATEX, XML AND TEXT. ENCRYPTED PASSWORDS CAN BE OUTPUT TO A JOHN-THE-RIPPER FILE FOR STRENGTH TESTING.
VOMIT
http://vomit.xtdnet.nl/
THE VOMIT UTILITY CONVERTS A CISCO IP PHONE CONVERSATION INTO A WAVE FILE THAT CAN BE PLAYED WITH ORDINARY SOUND PLAYERS. VOMIT REQUIRES A TCPDUMP OUTPUT FILE.
CISCO GLOBAL EXPLOITER
http://packetstormsecurity.org/0405-exploits/cge-13.tar.gz
CISCO GLOBAL EXPLOITER IS A TOOL THAT DEMONSTRATES EXPLOITATION OF THE CISCO 677/678 TELNET BUFFER OVERFLOW VULNERABILITY, IOS ROUTER DENIAL OF SERVICE VULNERABILITY, IOS HTTP AUTH VULNERABILITY AND CISCO IOS HTTP CONFIGURATION ARBITRARY ADMINISTRATIVE ACCESS VULNERABILITY, CISCO CATALYST SSH PROTOCOL MISMATCH DENIAL OF SERVICE VULNERABILITY, CISCO 675 WEB ADMINISTRATION DENIAL OF SERVICE VULNERABILITY, CISCO CATALYST 3500 XL REMOTE ARBITRARY COMMAND VULNERABILITY, CISCO IOS SOFTWARE HTTP REQUEST DENIAL OF SERVICE VULNERABILITY, CISCOSECURE ACS FOR WINDOWS NT SERVER DENIAL OF SERVICE VULNERABILITY, CISCO CATALYST MEMORY LEAK VULNERABILITY, CISCO CATOS CISCOVIEW HTTP SERVER BUFFER OVERFLOW VULNERABILITY, %U ENCODING IDS BYPASS VULNERABILITY (UTF), AND CISCO IOS HTTP DENIAL OF SERVICE VULNERABILITY.
CISTO
http://sourceforge.net/projects/cisto/
CISTO (CISCO SCRIPT TOOL) TOOL FOR MANAGING CISCO DEVICES (IOS, CATOS). ALLOWS TO GET CONFIGS, DO CONFIGURATION, INSTALL NEW IMAGES, CHANGE PASSWORDS, DO SINGLE OR LIST OF SHOW COMMANDS AND LOTS MORE FOR A GIVEN LIST OF DEVICES (RUNNING PARALLEL PROZ.)
SWITCHMAP
http://sourceforge.net/projects/switchmap/
EXAMPLE CAPTURES ARE LOCATED HERE:
http://switchmap.sourceforge.net/portlists/SWITCHMAP IS A PERL PROGRAM THAT CREATES HTML PAGES THAT SHOW INFORMATION ABOUT A SET OF CISCO ETHERNET SWITCHES. THIS PROGRAM USES SNMP TO GATHER DATA FROM THE SWITCHES.
RANCID
http://www.shrubbery.net/rancid/
RANCID MONITORS A ROUTER'S (OR MORE GENERALLY A DEVICE'S) CONFIGURATION, INCLUDING SOFTWARE AND HARDWARE (CARDS, SERIAL NUMBERS, ETC) AND USES CVS (CONCURRENT VERSION SYSTEM) OR SUBVERSION TO MAINTAIN HISTORY OF CHANGES.
RANCID DOES THIS BY THE VERY SIMPLE PROCESS SUMMARIZED HERE:
LOGIN TO EACH DEVICE IN THE ROUTER TABLE (ROUTER.DB),
RUN VARIOUS COMMANDS TO GET THE INFORMATION THAT WILL BE SAVED,
COOK THE OUTPUT; RE-FORMAT, REMOVE OSCILLATING OR INCREMENTING DATA,
EMAIL ANY DIFFERENCES (SAMPLE) FROM THE PREVIOUS COLLECTION TO A MAIL LIST,
AND FINALLY COMMIT THOSE CHANGES TO THE REVISION CONTROL SYSTEM
RANCID ALSO INCLUDES LOOKING GLASS SOFTWARE. IT IS BASED ON ED KERN'S LOOKING GLASS WHICH WAS ONCE USED FOR HTTP://NITROUS.DIGEX.NET/, FOR THE OLD-SCHOOL FOLKS WHO REMEMBER IT. OUR VERSION HAS ADDED FUNCTIONS, SUPPORTS CISCO, JUNIPER, AND FOUNDRY AND USES THE LOGIN SCRIPTS THAT COME WITH RANCID; SO IT CAN USE TELNET OR SSH TO CONNECT TO YOUR DEVICES(S).
RANCID CURRENTLY SUPPORTS CISCO ROUTERS, JUNIPER ROUTERS, CATALYST SWITCHES, FOUNDRY SWITCHES, REDBACK NASS, ADC EZT3 MUXES, MRTD (AND THUS LIKELY IRRD), ALTEON SWITCHES, AND HP PROCURVE SWITCHES AND A HOST OF OTHERS.
RANCID IS KNOWN TO BE USED AT: AOL, GLOBAL CROSSING, MFN, NTT AMERICA, CERTAINTY SOLUTIONS INC.
SIPTIGER
http://www.vovida.org/applications/downloads/siptiger
SIPTIGER IS A WEB-BASED PROVISIONING UTILITY FOR CISCO'S LINE OF 7960 AND 7940 SESSION INITIATION PROTOCOL (SIP) IP PHONES AND CISCO SIP PROXY SERVERS (CSPS). THIS UTILITY IS USEFUL FOR ANYONE DEPLOYING CISCO 7960/7940 SIP IP PHONES.
IOSTACK.PL
http://www.phenoelit-us.org/ultimaratio/IOStack2.tgz
IOSTACK.PL IS A SCRIPT TO READ OUT IOS STACK RETURN ADDRESS LOCATIONS.
CISCO ROUTER PASSWORD DECODER
http://www.loud-fat-bloke.co.uk/tools/ciscopass.txt
Simple little perl script to decode router passwords.
http://www.oxid.it/cpfpc.html
CISCO PIX FIREWALL PASSWORD CALCULATOR) PRODUCES THE ENCRYPTED FORM OF CISCO PIX ENABLE MODE PASSWORDS WITHOUT THE NEED TO ACCESS THE DEVICE.
ULTIMA RATIO
http://www.phenoelit.de/ultimaratio/index.html
A REMOTE CISCO IOS EXPLOIT
NIPPER
http://sourceforge.net/projects/nipper
NIPPER IS A NETWORK INFRASTRUCTURE CONFIGURATION PARSER. NIPPER TAKES A NETWORK INFRASTRUCTURE DEVICE CONFIGURATION, PROCESSES THE FILE AND DETAILS SECURITY-RELATED ISSUES WITH THE CONFIGURATION TOGETHER WITH DETAILED RECOMMENDATIONS. NIPPER WAS PREVIOUS KNOWN AS CISCOPARSE. NIPPER CURRENTLY SUPPORTS CISCO SWITCHES (IOS), CISCO ROUTERS (IOS), CISCO FIREWALLS (PIX/ASA/FWSM) AND JUNIPER NETSCREEN (SCREENOS). OUTPUT IS IN HTML, LATEX, XML AND TEXT. ENCRYPTED PASSWORDS CAN BE OUTPUT TO A JOHN-THE-RIPPER FILE FOR STRENGTH TESTING.
VOMIT
http://vomit.xtdnet.nl/
THE VOMIT UTILITY CONVERTS A CISCO IP PHONE CONVERSATION INTO A WAVE FILE THAT CAN BE PLAYED WITH ORDINARY SOUND PLAYERS. VOMIT REQUIRES A TCPDUMP OUTPUT FILE.
CISCO GLOBAL EXPLOITER
http://packetstormsecurity.org/0405-exploits/cge-13.tar.gz
CISCO GLOBAL EXPLOITER IS A TOOL THAT DEMONSTRATES EXPLOITATION OF THE CISCO 677/678 TELNET BUFFER OVERFLOW VULNERABILITY, IOS ROUTER DENIAL OF SERVICE VULNERABILITY, IOS HTTP AUTH VULNERABILITY AND CISCO IOS HTTP CONFIGURATION ARBITRARY ADMINISTRATIVE ACCESS VULNERABILITY, CISCO CATALYST SSH PROTOCOL MISMATCH DENIAL OF SERVICE VULNERABILITY, CISCO 675 WEB ADMINISTRATION DENIAL OF SERVICE VULNERABILITY, CISCO CATALYST 3500 XL REMOTE ARBITRARY COMMAND VULNERABILITY, CISCO IOS SOFTWARE HTTP REQUEST DENIAL OF SERVICE VULNERABILITY, CISCOSECURE ACS FOR WINDOWS NT SERVER DENIAL OF SERVICE VULNERABILITY, CISCO CATALYST MEMORY LEAK VULNERABILITY, CISCO CATOS CISCOVIEW HTTP SERVER BUFFER OVERFLOW VULNERABILITY, %U ENCODING IDS BYPASS VULNERABILITY (UTF), AND CISCO IOS HTTP DENIAL OF SERVICE VULNERABILITY.
CISTO
http://sourceforge.net/projects/cisto/
CISTO (CISCO SCRIPT TOOL) TOOL FOR MANAGING CISCO DEVICES (IOS, CATOS). ALLOWS TO GET CONFIGS, DO CONFIGURATION, INSTALL NEW IMAGES, CHANGE PASSWORDS, DO SINGLE OR LIST OF SHOW COMMANDS AND LOTS MORE FOR A GIVEN LIST OF DEVICES (RUNNING PARALLEL PROZ.)
SWITCHMAP
http://sourceforge.net/projects/switchmap/
EXAMPLE CAPTURES ARE LOCATED HERE:
http://switchmap.sourceforge.net/portlists/SWITCHMAP IS A PERL PROGRAM THAT CREATES HTML PAGES THAT SHOW INFORMATION ABOUT A SET OF CISCO ETHERNET SWITCHES. THIS PROGRAM USES SNMP TO GATHER DATA FROM THE SWITCHES.
RANCID
http://www.shrubbery.net/rancid/
RANCID MONITORS A ROUTER'S (OR MORE GENERALLY A DEVICE'S) CONFIGURATION, INCLUDING SOFTWARE AND HARDWARE (CARDS, SERIAL NUMBERS, ETC) AND USES CVS (CONCURRENT VERSION SYSTEM) OR SUBVERSION TO MAINTAIN HISTORY OF CHANGES.
RANCID DOES THIS BY THE VERY SIMPLE PROCESS SUMMARIZED HERE:
LOGIN TO EACH DEVICE IN THE ROUTER TABLE (ROUTER.DB),
RUN VARIOUS COMMANDS TO GET THE INFORMATION THAT WILL BE SAVED,
COOK THE OUTPUT; RE-FORMAT, REMOVE OSCILLATING OR INCREMENTING DATA,
EMAIL ANY DIFFERENCES (SAMPLE) FROM THE PREVIOUS COLLECTION TO A MAIL LIST,
AND FINALLY COMMIT THOSE CHANGES TO THE REVISION CONTROL SYSTEM
RANCID ALSO INCLUDES LOOKING GLASS SOFTWARE. IT IS BASED ON ED KERN'S LOOKING GLASS WHICH WAS ONCE USED FOR HTTP://NITROUS.DIGEX.NET/, FOR THE OLD-SCHOOL FOLKS WHO REMEMBER IT. OUR VERSION HAS ADDED FUNCTIONS, SUPPORTS CISCO, JUNIPER, AND FOUNDRY AND USES THE LOGIN SCRIPTS THAT COME WITH RANCID; SO IT CAN USE TELNET OR SSH TO CONNECT TO YOUR DEVICES(S).
RANCID CURRENTLY SUPPORTS CISCO ROUTERS, JUNIPER ROUTERS, CATALYST SWITCHES, FOUNDRY SWITCHES, REDBACK NASS, ADC EZT3 MUXES, MRTD (AND THUS LIKELY IRRD), ALTEON SWITCHES, AND HP PROCURVE SWITCHES AND A HOST OF OTHERS.
RANCID IS KNOWN TO BE USED AT: AOL, GLOBAL CROSSING, MFN, NTT AMERICA, CERTAINTY SOLUTIONS INC.
SIPTIGER
http://www.vovida.org/applications/downloads/siptiger
SIPTIGER IS A WEB-BASED PROVISIONING UTILITY FOR CISCO'S LINE OF 7960 AND 7940 SESSION INITIATION PROTOCOL (SIP) IP PHONES AND CISCO SIP PROXY SERVERS (CSPS). THIS UTILITY IS USEFUL FOR ANYONE DEPLOYING CISCO 7960/7940 SIP IP PHONES.
IOSTACK.PL
http://www.phenoelit-us.org/ultimaratio/IOStack2.tgz
IOSTACK.PL IS A SCRIPT TO READ OUT IOS STACK RETURN ADDRESS LOCATIONS.
CISCO ROUTER PASSWORD DECODER
http://www.loud-fat-bloke.co.uk/tools/ciscopass.txt
Simple little perl script to decode router passwords.
Run real Cisco IOS on your PC
One of my coworkers pointed this out to me the other day. It looks like a realy good resource to run real Cisco IOS on your PC via a emulator (NOT simulator).
Check it out Here where they have some config files already made (http://www.internetworkexpert.com/resources/iosonpc.htm). and here for the actual emulator. (http://dyna-gen.sourceforge.net/)
You can create Serial, ethernet and other interfaces, and either bridge them to your network interface(s) on your PC or directly to each other (no need for physical interface.)
For those people looking to build their own Cisco lab this may be a good substitute
Check it out Here where they have some config files already made (http://www.internetworkexpert.com/resources/iosonpc.htm). and here for the actual emulator. (http://dyna-gen.sourceforge.net/)
You can create Serial, ethernet and other interfaces, and either bridge them to your network interface(s) on your PC or directly to each other (no need for physical interface.)
For those people looking to build their own Cisco lab this may be a good substitute
Labels:
CISCO hack
Hide file extension for key logger
This is a good trick to hide your exe files into a jpg file..!
How about sending a trojan or a keylogger into your victim using this trick..??
1) Firstly, create a new folder and make sure that the options 'show hidden files and folders' is checked and ‘hide extensions for known file types’ is unchecked.
Basically what you need is to see hidden files and see the extension of all your files on your pc.
2) Paste a copy of your server on the new created folder. let's say it's called 'server.exe' (that's why you need the extension of files showing, cause you need to see it to change it)
3) Now you’re going to rename this 'server.exe' to whatever you want, let’s say for example 'picture.jpeg'
4) Windows is going to warn you if you really want to change this extension from exe to jpeg, click YES.
5) Now create a shortcut of this 'picture.jpeg' in the same folder.
6) Now that you have a shortcut, rename it to whatever you want, for example, 'me.jpeg'.
7) Go to properties (on file me.jpeg) and now you need to do some changes there.
8) First of all delete all the text on field 'Start In' and leave it empty.
9) Then on field 'Target' you need to write the path to open the other file (the server renamed 'picture.jpeg') so you have to write this :-
'C:\WINDOWS\system32\cmd.exe /c picture.jpeg'
10) The last field, 'c picture.jpeg' is always the name of the first file. If you called the first file 'soccer.avi' you gotta write 'C:\WINDOWS\system32\cmd.exe /c soccer.avi'.
11) So what you’re doing is when someone clicks on 'me.jpeg', a cmd will execute the other file 'picture.jpeg' and the server will run.
12) On that file 'me.jpeg' (shortcut), go to properties and you have an option to change the icon. Click that and a new window will pop up and you have to write this :-
%SystemRoot%\system32\SHELL32.dll . Then press OK.
13) You can set the properties 'Hidden' for the first file 'picture.jpeg' if you think it’s better to get a connection from someone.
14) But don’t forget one thing, these 2 files must always be together in the same folder and to get connected to someone they must click on the shortcut created not on the first file. So rename the files to whatever you want considering the person and the knowledge they have on this matter.
15) For me for example I always want the shortcut showing first so can be the first file to be opened. So I rename the server to 'picture2.jpeg' and the shortcut to 'picture1.jpeg'.
This way the shortcut will show up first. If you set hidden properties to the server 'picture.jpeg' then you don’t have to bother with this detail but I’m warning you, the hidden file will always show up inside of a Zip or a Rar file.
16) So the best way to send these files together to someone is compress them into Zip or Rar.
17) inside the Rar or Zip file you can see the files properties and even after all this work you can see that the shortcut is recognized like a shortcut but hopefully the person you sent this too doesn’t know that and is going to open it.
How about sending a trojan or a keylogger into your victim using this trick..??
1) Firstly, create a new folder and make sure that the options 'show hidden files and folders' is checked and ‘hide extensions for known file types’ is unchecked.
Basically what you need is to see hidden files and see the extension of all your files on your pc.
2) Paste a copy of your server on the new created folder. let's say it's called 'server.exe' (that's why you need the extension of files showing, cause you need to see it to change it)
3) Now you’re going to rename this 'server.exe' to whatever you want, let’s say for example 'picture.jpeg'
4) Windows is going to warn you if you really want to change this extension from exe to jpeg, click YES.
5) Now create a shortcut of this 'picture.jpeg' in the same folder.
6) Now that you have a shortcut, rename it to whatever you want, for example, 'me.jpeg'.
7) Go to properties (on file me.jpeg) and now you need to do some changes there.
8) First of all delete all the text on field 'Start In' and leave it empty.
9) Then on field 'Target' you need to write the path to open the other file (the server renamed 'picture.jpeg') so you have to write this :-
'C:\WINDOWS\system32\cmd.exe /c picture.jpeg'
10) The last field, 'c picture.jpeg' is always the name of the first file. If you called the first file 'soccer.avi' you gotta write 'C:\WINDOWS\system32\cmd.exe /c soccer.avi'.
11) So what you’re doing is when someone clicks on 'me.jpeg', a cmd will execute the other file 'picture.jpeg' and the server will run.
12) On that file 'me.jpeg' (shortcut), go to properties and you have an option to change the icon. Click that and a new window will pop up and you have to write this :-
%SystemRoot%\system32\SHELL32.dll . Then press OK.
13) You can set the properties 'Hidden' for the first file 'picture.jpeg' if you think it’s better to get a connection from someone.
14) But don’t forget one thing, these 2 files must always be together in the same folder and to get connected to someone they must click on the shortcut created not on the first file. So rename the files to whatever you want considering the person and the knowledge they have on this matter.
15) For me for example I always want the shortcut showing first so can be the first file to be opened. So I rename the server to 'picture2.jpeg' and the shortcut to 'picture1.jpeg'.
This way the shortcut will show up first. If you set hidden properties to the server 'picture.jpeg' then you don’t have to bother with this detail but I’m warning you, the hidden file will always show up inside of a Zip or a Rar file.
16) So the best way to send these files together to someone is compress them into Zip or Rar.
17) inside the Rar or Zip file you can see the files properties and even after all this work you can see that the shortcut is recognized like a shortcut but hopefully the person you sent this too doesn’t know that and is going to open it.
Labels:
Extreme hacking
Class Identifier of folders in XP
The batch file basically renames the folder with name abc to abc.{21EC2020-3AEA-1069-A2DD-08002B30309D}. So instead of writing a batch file you can directly rename a folder by appending given number.
The numbers specified after the folder name is actually CLSID (Class Identifier) of folder and the number in particular used here is GUID for Control Panel. That’s why when you try to open the folder after renaming, it opens the Control Panel. Also the icon is also of Control panel. Some other similar CLSIDs that can be used are:
.{450D8FBA-AD25-11D0-98A8-0800361B1103} - My Documents
.{20D04FE0-3AEA-1069-A2D8-08002B30309D} - My Computer
.{2227A280-3AEA-1069-A2DE-08002B30309D} - Printers
.{645FF040-5081-101B-9F08-00AA002F954E} - Recycle Bin
.{FBF23B42-E3F0-101B-8488-00AA003E56F8} - Internet Explorer
.{FF393560-C2A7-11CF-BFF4-444553540000} - History
And there are many more. You can find more CLSIDs under [HKEY_CLASSES_ROOT\CLSID\], including the above specified CLSIDs.
Though the folders are not included in the search, but you can still get the details of files and folders inside it. Suppose you folder was abc and you renamed it to abc.{21EC2020-3AEA-1069-A2DD-08002B30309D}. And consider the folder is present in C drive. Go to comand prompt, at c drive and try dir command
c:\>dir
It will display all the folders in current directory including you folder with name abc.{21EC2020-3AEA-1069-A2DD-08002B30309D} not just abc. Now try
c:\>cd abc.{21EC2020-3AEA-1069-A2DD-08002B30309D}
c>\abc.{21EC2020-3AEA-1069-A2DD-08002B30309D}>dir
It will list all the files and directory present under that folder.
The numbers specified after the folder name is actually CLSID (Class Identifier) of folder and the number in particular used here is GUID for Control Panel. That’s why when you try to open the folder after renaming, it opens the Control Panel. Also the icon is also of Control panel. Some other similar CLSIDs that can be used are:
.{450D8FBA-AD25-11D0-98A8-0800361B1103} - My Documents
.{20D04FE0-3AEA-1069-A2D8-08002B30309D} - My Computer
.{2227A280-3AEA-1069-A2DE-08002B30309D} - Printers
.{645FF040-5081-101B-9F08-00AA002F954E} - Recycle Bin
.{FBF23B42-E3F0-101B-8488-00AA003E56F8} - Internet Explorer
.{FF393560-C2A7-11CF-BFF4-444553540000} - History
And there are many more. You can find more CLSIDs under [HKEY_CLASSES_ROOT\CLSID\], including the above specified CLSIDs.
Though the folders are not included in the search, but you can still get the details of files and folders inside it. Suppose you folder was abc and you renamed it to abc.{21EC2020-3AEA-1069-A2DD-08002B30309D}. And consider the folder is present in C drive. Go to comand prompt, at c drive and try dir command
c:\>dir
It will display all the folders in current directory including you folder with name abc.{21EC2020-3AEA-1069-A2DD-08002B30309D} not just abc. Now try
c:\>cd abc.{21EC2020-3AEA-1069-A2DD-08002B30309D}
c>\abc.{21EC2020-3AEA-1069-A2DD-08002B30309D}>dir
It will list all the files and directory present under that folder.
Labels:
XP hacking
Subscribe to:
Posts (Atom)