In many operating systems like Dos, MS windows, a batch file is a text file that is supposed to be containing a series of commands that is to be executed by the command interpreter. When a batch file is run on a system, the shell program (generally "cmd.exe") reads the file and executes its commands, normally line by line.
Batch files are generally used for running a sequence of automated executable commands and are often used by programmers to automate tedious tasks. these files can also be bound with other files (like an image or a sound clip) so that when a user open that file, the batch file which was bound with the file starts running in the background. So this can be used in a situation like suppose you want that your target's computer is restarted everytime he opens a particular image file then you can bind a batch file which executes a series of commands which will restart the target's computer to the image file and now when the target opens the image file, the batch file begins running in the background which will restart the target's computer. For this you can also make 2 batch files, one for opening the image and another for running the restart process, I am telling about this alternative method because combining 2 batch files together is very simple and windows itself provide an inbuilt binder called “iexpress” but it can only combine two batch files.
To use the iexpress, u just need to open it from “run”. After doing so, you will get the picture.
Making Batch files is very simple and requires very less time. To make a batch file all you have to do is to write the instructions, to be executed by the batch file, in a notepad and save it with the extension “.bat”.
Here, as an example, I am giving the instructions for the batch file which you can use to see that how much time has elapsed since you started your computer. Just copy paste the following code in a notepad and save it with extension “.bat” and it will show you the time everytime u runs that file:
@echo.
@systeminfo | @find "System Up Time:"
@echo.
@pause
Hack-a-Vaganza
A Beginner's Guide to Hacking.
Tuesday, July 20, 2010
Tuesday, July 6, 2010
Playing With Your IP
In my last post, i wrote about IP address, uses of IP addresses, types of IP address and how to trace IP address, in this post i am going to tell some tricks about how can you modify IP address according to your needs and how you can use IP address for your benefit.
In our daily life we come across such a situation many times when we try to access a website on the computer but we find that it has been blocked by system administrator. There are simply numerous ways of accessing those blocked websites. Some of which you will find in this post.
IP Address can be changed easily by using one of the following techniques. Sometimes these techniques are very useful if you want to access any blocked website. Generally websites are blocked in such a way that the access of that server is blocked from a particular IP but if we somehow manage to change our IP, we'll be able to access the blocked site without any problem.
1. Proxy Servers: A proxy server is a server that acts as a gateway between the client and the server. All the requests made by the client are directed to the required server through a proxy server, so that those requests appear to be coming from the proxy server instead of the client and hence the site is accessible. I am giving below a list of some of the famous proxy sites that i use myself but there are more than thousands of proxy sites which you can find using various search engines.
The method of using these proxies is very easy as all you have to do is, just to go these sites given below and enter the URL of the website that you want to access. The proxy site will then open the required website for you.
• http://freesslproxy.com/
• http://www.samair.ru/proxy/
• http://www.topbits.com/proxy.html (this site has a long list of proxies which is updated regularly)
2. IP Address Spoofing (without proxy servers): IP address Spoofing (commonly called as IP Spoofing) is a method of creation of IP packets with a forged (or fake) source IP Address. The purpose of IP spoofing is to hide the identity of the sender or impersonate other computer systems. This technique is very useful if the attacker wants to gain the trust of the target by pretending to be someone else.
IP spoofing is done mainly by two methods:
• Manually: You can change your IP address manually but you will just have to try your luck until you find a correct IP address which works well with your connection or you have the correct IP address you want to impersonate as.
• By using Softwares: This is very simple as there are many softwares that can change your IP address and assign your machine a new IP Address. For eg. softwares like “auto IP hide” and “HideMyIP” can be used for the above purpose.
In our daily life we come across such a situation many times when we try to access a website on the computer but we find that it has been blocked by system administrator. There are simply numerous ways of accessing those blocked websites. Some of which you will find in this post.
IP Address can be changed easily by using one of the following techniques. Sometimes these techniques are very useful if you want to access any blocked website. Generally websites are blocked in such a way that the access of that server is blocked from a particular IP but if we somehow manage to change our IP, we'll be able to access the blocked site without any problem.
1. Proxy Servers: A proxy server is a server that acts as a gateway between the client and the server. All the requests made by the client are directed to the required server through a proxy server, so that those requests appear to be coming from the proxy server instead of the client and hence the site is accessible. I am giving below a list of some of the famous proxy sites that i use myself but there are more than thousands of proxy sites which you can find using various search engines.
The method of using these proxies is very easy as all you have to do is, just to go these sites given below and enter the URL of the website that you want to access. The proxy site will then open the required website for you.
• http://freesslproxy.com/
• http://www.samair.ru/proxy/
• http://www.topbits.com/proxy.html (this site has a long list of proxies which is updated regularly)
2. IP Address Spoofing (without proxy servers): IP address Spoofing (commonly called as IP Spoofing) is a method of creation of IP packets with a forged (or fake) source IP Address. The purpose of IP spoofing is to hide the identity of the sender or impersonate other computer systems. This technique is very useful if the attacker wants to gain the trust of the target by pretending to be someone else.
IP spoofing is done mainly by two methods:
• Manually: You can change your IP address manually but you will just have to try your luck until you find a correct IP address which works well with your connection or you have the correct IP address you want to impersonate as.
• By using Softwares: This is very simple as there are many softwares that can change your IP address and assign your machine a new IP Address. For eg. softwares like “auto IP hide” and “HideMyIP” can be used for the above purpose.
Monday, July 5, 2010
Basics of Hacking, Part 1: IP Address
An IP Address or an internet protocol is a numerical address assigned to a device connected to a computer network which uses IP address for communication between its various nodes.
An IP address has two prime functions:
* Network or host identification
* Location addressing
An IP address is generally a 32-bit(or 4-byte) number where each byte is separated from each other by a dot(.). Each computer has a different IP Address based on the location of the computer on the network.
IP addresses are generally of two types:
* Static IP Address: When the IP address of the computer does not change, every time it powers up. This is called a static IP address. It is generally set manually by the user or the admin of the network.
* Dynamic IP Address: This type of IP address changes or fluctuates regularly between a certain range.
Prior to attacking the target's machine or preparing to safeguard our own machine against the foreign attacks, it is needed that we should have some basic knowledge about the IP Address of the machine.
Tracing IP Address
When it comes to tracing of IP Addresses, there are more than thousand of ways. Here i will cover some of the basic tricks of tracing IP and will add more ways of tracing IP's in future posts in this blog.
1. Tracert: tracert is a MS DOS command which is used to visually see a network packet being sent and received and the amount of hops required by that packet to reach its destination. For eg. if we use command "tracert www.msn.com" then it will show us how the packet is being sent from our machine to the server and by which route.
2. Netstats: netstat (stands for Network Statistics) is a command line instruction that is used to display the incoming and outgoing connections of a network. For eg. we can use command "netstat -n" to display the incoming and outgoing connections of our network, here "-n" is used to display the active TCP connections in numerical form only.
3. Location trace: If we want to trace the location of the destination machine where our packets are being sent, we can use tools like "NeoTrace pro". the purpose of these tools is to monitor the current location of the packet which was sent from or machine. These kind of tools are very useful for tracking criminals and keeping an eye over our personal network and preventing any unauthorized access to our network.
An IP address has two prime functions:
* Network or host identification
* Location addressing
An IP address is generally a 32-bit(or 4-byte) number where each byte is separated from each other by a dot(.). Each computer has a different IP Address based on the location of the computer on the network.
IP addresses are generally of two types:
* Static IP Address: When the IP address of the computer does not change, every time it powers up. This is called a static IP address. It is generally set manually by the user or the admin of the network.
* Dynamic IP Address: This type of IP address changes or fluctuates regularly between a certain range.
Prior to attacking the target's machine or preparing to safeguard our own machine against the foreign attacks, it is needed that we should have some basic knowledge about the IP Address of the machine.
Tracing IP Address
When it comes to tracing of IP Addresses, there are more than thousand of ways. Here i will cover some of the basic tricks of tracing IP and will add more ways of tracing IP's in future posts in this blog.
1. Tracert: tracert is a MS DOS command which is used to visually see a network packet being sent and received and the amount of hops required by that packet to reach its destination. For eg. if we use command "tracert www.msn.com" then it will show us how the packet is being sent from our machine to the server and by which route.
2. Netstats: netstat (stands for Network Statistics) is a command line instruction that is used to display the incoming and outgoing connections of a network. For eg. we can use command "netstat -n" to display the incoming and outgoing connections of our network, here "-n" is used to display the active TCP connections in numerical form only.
3. Location trace: If we want to trace the location of the destination machine where our packets are being sent, we can use tools like "NeoTrace pro". the purpose of these tools is to monitor the current location of the packet which was sent from or machine. These kind of tools are very useful for tracking criminals and keeping an eye over our personal network and preventing any unauthorized access to our network.
Subscribe to:
Comments (Atom)