Monday, 27 March 2017

Best CMD commands used in hacking

Top CMD or MS-DOS prompt commands which every hacker should know

If you have been following Techworm regularly, chances are you are a very versatile hacker in your own right and don’t need to know these commands. But many of our readers who are beginners and want to learn hacking always ask us for the top Dos Prompt (C:/ or CMD commands in Windows 10/7/8.1) they should know. So here goes.
CMD is a power tool which lets you do almost anything with your PC/laptop. There are common commands like CD.. and MD etc which you probably know so we wont get into that. Here are some really useful things a hacker can do with CMD commands.
First, open your Network Connection and right click and select Properties. Then Select TCP/IP and click Properties again. Now Click on Advanced and WINS tab. Select Default for NeBIOS.
This is just to make sure you have NetBIOS enabled. We will have some fun with NetBIOS on CMD. In case you don’t know how to get CMD by clicking the Windows icon at the left-hand bottom of your screen in all Windows versions and click on Start. Press run from the start, then type “cmd” without quotes.
Now here are the important commands which every wannabe hacker should know :

nslookup
net view
net use
net user
ping
tracert
arp
route
nbtstat
netstat
ipconfig

In case you don’t know some of them, then just type the command on CMD and hit enter. A little help will show up on your screen. Read it to understand what that particular command does.
Let’s start easy…
1) ping : This command will allow you to know if the host you pinging is alive, which means if it is up at the time of executing the “ping” command.
ping x.x.x.x (x is the IP address). You can try pinging 8.8.8.8 which belongs to Google
or
ping www.google.com (www.google.com is the website you want to ping, but you don’t know the IP)
2) nslookup : This command has many functionalities. One is for resolving DNS into IP. Lets say you know the website URL but you don’t know its IP but you want to find it out.
Eg. nslookup www.google.com (www.google.com is the website for which you want to find out the IP)
Now, another really nice function of nslookup is to find out IP of specific Mail Severs
nslookup (enter)
set type=mx (enter)
yahoo.com
This command will give you the mail server IP of yahoo.com. You can use whatever server you want and if it is listed on DNS, then you get the IP. Simple, isn’t it? You can send a spoofed email to your friends using the IP address of the mail server. You can check the tutorial here for sending spoofed email.
3) tracert : This command will give you the hops that a packet will travel to reach its final destination. This command is really helpful if you know the route a packet takes before it goes to the target box.
tracert x.x.x.x (x is the IP address)
or
tracert www.google.com (www.google.com is the website you don’t know the IP)
4) arp : This command will show you the arp table. You can find out if anyone has done arp poisoning in your LAN using this command.
arp -a
5) route : This command will show you the routing table, gateway, interface and metric.
Code:
route print
6) ipconfig : This command will show you a lot of useful things like your IP, Gateway, DNS in use, etc. This command will give all that info but for all networks you might have it.
Code:
ipconfig
or
Code:
ipconfig /all
Also, in case you have a dynamic IP and want to change it, then type…
Code:
ipconfig /release (this will release your IP)
ipconfig /renew (this will renew your iP)
7) netstat : This command will show you connection stats
Code:
netstat
or
Code:
netstat -a (this will show you all the listening ports and connection with DNS names)
netstat -n (this will show you all the open connection with IP addresses)
netstat -an (this will combined both of the above)
net view x.x.x.x or computername (will list the available sharing folders on the target box)
Here are some additional CMD commands which will help you.
Code:
net use \ipaddressipc$ “” /user:administrator
(this command will allow you to connect to the target as administrator)
Now if you want to connect to the target and browse the entire C drive, then use this command:
Code:
net use K: \computernameC$
(this will create a virtual drive on your “my computer” folder)
Please not that this command will only work if the target PC/laptop has not set a Adminastrator Password.
And least but not last, the “help” command.
Quote:
whatevercommand /help
or
Quote:
whatevercommand /?
This command is very useful in finding what a particular command does, especially if you are a newby.
Hope you liked the CMD commands listed above. If you have found any command other than those listed above, kindly note them in the comments for our other readers.

WhatsApp By Sending Unlimited Message.

Whats app bomber: With the help of this application you can send spam messages to your friends phone to hang his whats app application. Your companion will say you that his or her mobile phone is hanging because of this spam message. But Before explaining this trick to I want to tell you that this application is only for prank purpose. Don’t use it for any wrong purpose.
Now days, whats application is become very popular. Everyone is what app application either it is for official use or for chat, video chat etc.
There are many people who need to jump at the chance to do trick with their companion while doing crash whats app application there phone. Furthermore, in the event that you need to bother your buddy to send spam message on their cell phone. So friend, if you are interested to do this prank with your companion then follow these steps.
Steps Follow to Hang your Friend’s Whatsapp By Sending Unlimited Message
Firstly, you should introduced Microsoft .net structure 4.0 for utilize this strategy
then download and install AutoSpamBot 2.0
After successfully installed click on it to start
spam-message
Then, this dialog box will open in front of you. Here, In the first text box you have to mention which message you want to send to your friend and then set the interval (after how much time it will take to send message again and again).
And then, specify the time that how many this message should send to your friend.web
After filling all the fields. Now, Open Web.whatsapp.com from your PC and login with your whats app account by scanning you QR code. then select from your your friends no. to whom you want to send spam messages.
then, click on start button from the spam bot software.
spam1
Select the type message from your web whats app.
whatsapp
Now, message has starting sending to your friend continuously.
spammessage
I want to remind you again that this trick only for fun. Don’t use it for any wrong purpose. Friends if you want to learn more tricks then keep visiting our site. if you need any help please comment in the comment section. we will response as soon as possible.

How to Crack WinRAR Password Protected Files In Simple Steps

winrar-password-crackShort Bytes: Losing/forgetting your WinRAR password could be a headache. So, here, I’m going to tell you this simple method of how to crack WinRAR password protected files. Take a look.
WinRAR is a great utility to compress your files and protect it using a password. You can keep your data safe and save storage space by keeping it compressed in .RAR format. However, what to do if you forget the password of your WinRAR password protected file?
To crack WinRAR password protected file password, you need to recover the WinRAR file password and use it to unlock the file. There are some methods to crack WinRAR password using the command prompt, but they just work on integers and other combinations of characters.
So, all you need is a 100% working method that cracks the WinRAR password. In this detailed tutorial, we’ll be using a simple password recovery tool to recover your lost/forgotten WinRAR file passwords.
You need to use the .RAR Password Genius to crack WinRAR password and .ZIP Password Genius to crack the WinZIP Password.
In the steps described ahead, I’ll describe how to crack WinRAR password. WinRAR Password Genius is a tiny but powerful password recovery tool that is famous for high speed and guessing the complex password algorithms. It supports all the software that create the .RAR archives.
Let’s get started:
  1. To crack the WinRAR passwords, you need to download the WinRAR Password Genius from this link and install it on your PC. This software is the solution to all your worries and it works in three steps to complete the WinRAR password recovery.
  2. To start WinRAR recovery process, you need to fire-up the software and import the .RAR file into the WinRAR Password Genius. You can do this by hitting the Open button and look for the .RAR file on your computer to bring it in the Encrypted File box.how-to-crack-winrar-password-recovery-2
  3. The software uses multiple attack techniques to crack the WinRAR password. Different kinds of attacks are Brute-force, Mask, Dictionary and Smart. These are used to guess different types of passwords and you need to use these methods accordingly. Read more about these here to select the type and settings.
  4. Now after choosing the Type of attack from the drop-down list, select the attack type and crack WinRAR password by pressing the Start button.
  5. After this, the software will start its process and recover the WinRAR password for you. As the software cracks the file, a pop-up will appear showing you the password.recover-locked-rar-file-password-successfully
  6. Now, open the password protected .RAR file in WinRAR and you’ll see a dialog that asks for the password. Now, enter the recovered password and hit enter. This will bypass the password and now you can access your files and extract them.
    how-to-crack-winrar-password-recovery-2
To crack the WinZIP password protected files, you need to use the WinZIP Password Genius.
Did you find this how crack WinRAR password protected file tutorial helpful? Tell us in the comments below

SQL

What is SQL?
When a user wants to get some information from a database file, he can issue a query
A query is a user–request to retrieve data or information with a certain condition.
SQL is a query language that allows user to specify the conditions. (instead of algorithms)
Concept of SQL
The user specifies a certain condition.
The program will go through all the records in the
  database file and select those records that satisfy the
  condition.(searching).
Statistical information of the data.
The result of the query will then be stored in form of a
   table.


Sunday, 26 March 2017

Testing

Testing:- software testing is a critical element of software quality assurances and represent the ultimate review of specifications,desing and code generations
}Testing fundamentals:-
                                        1).   Testing Objectives
                                        2).   Testing Principle
                                        3).   Testability
}Test case desing:-
                                        1).  Whitebox Testing

                                        2).  Blackbox Testing
Testing fundamentals:-
The engineer creates a series of testcase that are intended to “demolish” the
software that has been built in fact testing is the one step in the software
process that could be viewed as destructive rather than constructive. 

}Testing Objectives:-
Alen myear states number of rules that can serve well as testing objectives
1). Testing is a process of executing program with intend of finding an error.
2). A good test case is one that has a high probability of finding an as-yet undiscovered error.
3).  A successful test case is one that uncovers an as-yet undiscovered error.

Testing principle:-
1).All test should be traceable to customer requirements :-
      it follows that the most of defect are those that cause the program to fail to meet its requirements.
2). Test should be planned long before testing begins:-
    all tests can be planned and designed  before any code has been generated.
3).The pareto principle applies to software testing:-
    the pareto principle applies that 80% of all error uncovered during testing.
4).Testing should begin ”in the small” and process toward testing “in the large ” :-
   in starting it focus on individual components after that it covers all components.
5). Exhaustive testing is not posible:-
       it is impossible to execute every combination of path during testing.
6). To be most effective testing should be conducted by an independent third party :-
We mean special software tester is best for testing…...

PHP Error Handling

PHP Error Handling:-
The default error handling in PHP is very simple. An error message with filename, line number and a message describing the error are sent to the browser.

PHP Error Handling:-
When creating scripts and web applications, error handling is an important part. If your code lacks error checking code, your program may look very unprofessional and you may be open to security risks.
This tutorial contains some of the most common error checking methods in PHP.
We will show different error handling methods:
 Simple "die()" statements
 Custom errors and error triggers
 Error reporting
Basic Error Handling : Using the die() function :-
The first example shows a simple script that opens a text file: <?php $file=fopen("welcome.txt","r"); ?>
If the file does not exist you might get an error like this:
Warning: fopen(welcome.txt) [function.fopen]: failed to open stream:
No such file or directory in C:\webfolder\test.php on line 2

To avoid that the user gets an error message like the one above, we test if the file exist before we try to access it: <?php if(!file_exists("welcome.txt")) { die("File not found"); } else { $file=fopen("welcome.txt","r"); } ?>
Now if the file does not exist you get an error like this:
File not found
The code above is more efficient than the earlier code, because it uses a simple error handling mechanism to stop the script after the error.
However, simply stopping the script is not always the right way to go. Let's take a look at alternative PHP functions for handling errors.
Creating a Custom Error Handler:-
Creating a custom error handler is quite simple. We simply create a special function that can be called when an error occurs in PHP.
This function must be able to handle a minimum of two parameters (error level and error message) but can accept up to five parameters (optionally: file, line-number, and the error context):
Syntax:-
error_function(error_level,error_message,error_file,error_line,error_context)
Parameter Description:-
error_level
Required. Specifies the error report level for the user-defined error. Must be a value number. See table below for possible error report levels
error_message
Required. Specifies the error message for the user-defined error
error_file
Optional. Specifies the filename in which the error occurred
error_line
Optional. Specifies the line number in which the error occurred
error_context
Optional. Specifies an array containing every variable, and their values, in use when the error occurred
Error Report levels:-
These error report levels are the different types of error the user-defined error handler can be used for: Value Constant Description:-
2 E_WARNING Non-fatal run-time errors. Execution of the script is not halted.
8 E_NOTICE Run-time notices. The script found something that might be an error, but could also happen when running a script normally
256 E_USER_ERROR Fatal user-generated error. This is like an E_ERROR set by the programmer using the PHP function trigger_error()
512 E_USER_WARNING Non-fatal user-generated warning. This is like an E_WARNING set by the programmer using the PHP function trigger_error()
1024 E_USER_NOTICE User-generated notice. This is like an E_NOTICE set by the programmer using the PHP function trigger_error()
4096 E_RECOVERABLE_ERROR Catchable fatal error. This is like an E_ERROR but can be caught by a user defined handle (see also set_error_handler())
8191 E_ALL All errors and warnings, except level E_STRICT (E_STRICT will be part of E_ALL as of PHP 6.0)
Now lets create a function to handle errors:-
 function customError($errno, $errstr) { echo "<b>Error:</b> [$errno] $errstr<br />"; echo "Ending Script"; die(); }
The code above is a simple error handling function. When it is triggered, it gets the error level and an error message. It then outputs the error level and message and terminates the script.
Now that we have created an error handling function we need to decide when it should be triggered.

Friday, 24 March 2017

PHP 10 Maths Function

1. PHP abs() Function:-
Definition and Usage
The abs() function returns the absolute value of a number.
Syntax
abs(x)
Parameter
Description
x
Required. A number. If the number is of type float, the return type is also float, otherwise it is integer
Example:-
<?php echo(abs(6.7) . "<br />"); echo(abs(-3) . "<br />"); echo(abs(3)); ?>
The output of the code above will be:
6.7 3 3
2. PHP base_convert() Function:-
Definition and Usage
The base_convert() function converts a number from one base to another.
Syntax
base_convert(number,frombase,tobase)
Parameter
Description
number
Required. Original value
frombase
Required. Original base of number. Frombase has to be between 2 and 36, inclusive. Digits in numbers with a base higher than 10 will be represented with the letters a-z, with a meaning 10, b meaning 11 and z meaning 35.
tobase
Required. The base to convert to. Tobase has to be between 2 and 36, inclusive. Digits in numbers with a base higher than 10 will be represented with the letters a-z, with a meaning 10, b meaning 11 and z meaning 35.
Example 1:-
Convert an octal number to a decimal number:
<?php $oct = "0031"; $dec = base_convert($oct,8,10); echo "$oct in octal is equal to $dec in decimal."; ?>
The output of the code above will be:
0031 in octal is equal to 25 in decimal.
Example 2:-
Convert an octal number to a hexadecimal number:
<?php $oct = "364"; $hex = base_convert($oct,8,16); echo "$oct in octal is equal to $hex in hexadecimal."; ?>
The output of the code above will be:
364 in octal is equal to f4 in hexadecimal.
3. PHP Ceil() Function:-
Definition and Usage
The ceil() function returns the value of a number rounded UPWARDS to the nearest integer.
Syntax
ceil(x)
Parameter
Description
x
Required. A number
Example:-
In the following example we will use the ceil() function on different numbers:
<?php echo(ceil(0.60) . "<br />"); echo(ceil(0.40) . "<br />"); echo(ceil(5) . "<br />"); echo(ceil(5.1) . "<br />"); echo(ceil(-5.1) . "<br />"); echo(ceil(-5.9)) ?>
The output of the code above will be:
1 1 5 6 -5 -5
4. PHP exp() Function:-
Definition and Usage
The exp() function returns the value of Ex, where E is Euler's constant (approximately 2.7183) and x is the number passed to it.
Syntax
exp(x)
Parameter
Description
x
Required. A number
Tips and Notes
Tip: E is the Euler's constant, which is the base of natural logarithms (approximately 2.7183).
Example
In the following example we will use the exp() function on different numbers:
<?php echo(exp(1) . "<br />"); echo(exp(-1) . "<br />"); echo(exp(5) . "<br />"); echo(exp(10)) ?>
The output of the code above will be:
2.718281828459045 0.36787944117144233 148.4131591025766 22026.465794806718
5. PHP floor() Function:-
Definition and Usage
The floor() function returns the value of a number rounded DOWNWARDS to the nearest integer.
Syntax
floor(x)
Parameter
Description
x
Required. A number
Example:-
In this example we will use the floor() function on different numbers:
<?php echo(floor(0.60) . "<br />");
echo(floor(0.40) . "<br />"); echo(floor(5) . "<br />"); echo(floor(5.1) . "<br />"); echo(floor(-5.1) . "<br />"); echo(floor(-5.9)) ?>
The output of the code above will be:
0 0 5 5 -6 -6
6. PHP fmod() Function:-
Definition and Usage
The fmod() function divides x by y and returns the remainder (modulo) of the division.
Syntax
fmod(x,y)
Parameter
Description
x
Required. A number
y
Required.
Example:-
In the following example we will use the fmod() function to return the remainder of 5/2:
<?php $r = fmod(5,2); echo $r ?>
The output of the code above will be:
1
7. PHP is_finite() Function:-
Definition and Usage
The is_finite() function returns true if the specified value is a finite number, otherwise it returns nothing.
The value is finite if it is within the allowed range for a PHP float on this platform.
Syntax
is_finite(x)
Parameter
Description
X
Required. The value to check
Example:-
<?php echo is_finite(2) . "<br />"; echo is_finite(log(0)) . "<br />"; echo is_finite(2000); ?>
The output of the code above will be:
1 1
8. PHP is_infinite() Function:-
Definition and Usage
The is_infinite() function returns true if the specified value is an infinite number, otherwise it returns nothing.
The value is infinite if it is too big to fit into a PHP float on this platform.
Syntax
is_infinite(x)
Parameter
Description
X
Required. The value to check
Example:-
<?php echo is_infinite(2) . "<br />"; echo is_infinite(log(0)) . "<br />"; echo is_infinite(2000); ?>
The output of the code above will be:
1
9. PHP lcg_value() Function:-
Definition and Usage
The lcg_value() function returns a pseudo random number in the range of 0 and 1.
Syntax
Lcg_value()
Example:-
<?php echo lcg_value(); ?>
The output of the code above could be:
0.408212029326
10. PHP log() Function:-
Definition and Usage
The log() function returns the natural logarithm (base E) of a number.
Syntax
Log(x,base)
Parameter
Description:-
X
Required. A number
base
Optional. If the base parameter is specified, log() returns logbase x. Note: The base parameter became available in PHP 4.
Tips and Notes
Note: If the parameter x is negative, -1.#IND is returned.
Example:-
In the following example we will use the log() function on different numbers:
<?php echo(log(2.7183) . "<br />"); echo(log(2) . "<br />"); echo(log(1) . "<br />"); echo(log(0) . "<br />"); echo(log(-1)) ?>
The output of the code above will be:
1.00000668491 0.69314718056 0 -1.#INF -1.#IND

Thursday, 23 March 2017

Important Malware Information 2

1)Rogue Anti-Virus:-
Rogue anti-virus programs are fake programs that are designed to disguise and behave just like a legitimate virus removal application. Rogue anti-virus programs are usually created by hackers who attempt to take your money through devious tactics. Rogue anti-virus programs use popups, fake scans and alert messages as scare methods. Rogue anti-virus may scan your system displaying erroneous results of viruses present on your computer. Rogue anti-virus programs may cause damage to your computer and can be difficult to remove in some cases. Rogue anti-virus programs, as well as, rogue anti-spyware programs and rogue registry programs are known to be used by Trojan makers to install malware and other scumware.
2)Rogue Registry Cleaner:-
Rogue registry cleaners are deceitful and unreliable registry cleaner programs that pretend to fix or clean a computer's registry. Rogue registry cleaners use deceptive security alerts and bogus registry scans as a method to get computer users to purchase the full version of the rogue registry cleaner in use.
3)Spyware:-
Spyware is any malware or software used to spy or track your computer activity. While some spyware is not malicious and is intentionally installed by parents or employers to monitor Internet activity, spyware may be installed maliciously. Often spyware can come bundled with downloads of free software, and may track your Internet activity or may steal usernames and passwords, credit card numbers, and other personal financial information.
4)Trackware:-
Trackware is a software application that may send your personal identifiable information by the means of Internet connection.
5)Toolbar:-
Toolbar consists of a group of buttons that may perform certain tasks, such as provide with an additional search bar or additional bookmarks. A toolbar for Internet Explorer is nomally located below the menu bar at the top of the form. Toolbars are usually created by Browser Helper Objects.
6)Rogue AntiSpyware Programs:-
Rogue anti-spyware programs are fake applications that are cleverly disguised to behave like legitimate spyware removal programs. Rogue anti-spyware programs are usually created by hackers with the sole purpose of rendering a sale for the rogue application. Many rogue anti-spyware programs use deceiving tactics to entice computer users to purchase the rogue anti-spyware program. In many cases computer users do not realize that they have downloaded or installed a fake anti-spyware program until after the sale has taken place. Rogue Anti-Spyware Programs are bogus applications that usually require an extra effort to completely uninstall or remove from your system. Computer infections such as Trojans are known to install rogue anti-spyware programs which do not remove parasites or justify the abnormally high cost of the full version.
7)Remote Administration Tools:-
Remote administration tools are mostly used by network administrators to control your PC remotely. The main purpose this spyware is to control and fix your computer and settings without having to physically be in the same location. However, sometimes remote administration tools are used for illegal purposes, such as unauthorized remote control that may allow access to your personal and financial files and information.
8)Network Management Tools:-
Network management tools are mostly used by large corporations to log and examine network traffic, proxies, and other information going through the network. This software can analyze traffic without installing any software on your computer, because it monitors the traffic which goes through the central servers of the network. This spyware is not malicious, but can monitor your Internet activity, which may compromise your username and password information for online banking and ecommerce.
9)Dialers:-
Dialers change your modem's dialup connection settings. Like a lot of spyware, dialers may come bundled with free software, and then begin working without your consent or knowledge. Dialers usually switch your modem from connecting to the Internet through a local provider to a very expensive 900 or international phone number. Owners of the dialers usually collect a share of the money when you connect through this alternative number.
10)Browser Plugins:-
Browser plugins can affect your web browser in a variety of ways. Some plugins may create windows to display additional information on a web page you?re viewing, and others may replace websites? banner advertisements with their own. Some plugins may simply change your home page, while others are used to monitor and report your Internet activity to a parent server. This spyware is usually not stopped by your firewall, because it?s seen by the firewall as part of your browser.
11)Browser Helper Object:-
Browser helper objects may be used to help website authors customize and control Internet Explorer. These components usually load when Internet Explorer starts, and may share IE's memory context and perform any action on the available windows and modules. A browser helper object may detect events, create windows to display additional information on a viewed page, and monitor messages and actions. 

Wednesday, 22 March 2017

Important Malware Information 1

1)Adware:-
Adware usually acts without your authorization or knowledge. Many free utilities may install hidden software, possibly to earn money for the author to recover development costs. While adware is not always malicious, it typically tracks your Internet activity and sends other information from your computer (which can include email addresses) to advertisers. With this information, you may now be a target for pop-up/pop-under advertisements, additional toolbars, and spam
2)Backdoors:-
Backdoors exploit vulnerabilities of installed software to obtain remote, unauthorized access to your computer. Usually, backdoor spyware is secretly installed by viruses, worms, or sometimes even malicious adware programs. As the name suggests, backdoor spyware works sneakily, making it very difficult for you to find and disable without using anti-spyware technology.
3)Browser Hijackers:-
Browser hijackers change your Internet web browser settings without your permission. Sometimes this means changing your home page to a pay-per-click site so that the author of the browser hijacker software earns money. Sometimes browser hijackers may change your ?search? page so that all your queries lead to pay-per-click sites, while also tracking your Internet activity. Unfortunately, simply restoring your browser to factory settings usually will not prevent the browser hijacker from working.
4)Downloader:-
Downloader is a software application which may download and install additional malware to your system. The downloaded malware may have the ability to re-install itself what makes it difficult to remove manually.
5)Hijacker:-
Hijacker is an application that may take control of your browser's settings in order that to redirect you to other websites. Hijacker may cause your browser to behave sluggish.
6)Keyloggers:-
Keyloggers record every keystroke you make on your PC, possibly with the intent of capturing usernames and passwords, credit card numbers, bank account numbers, etc. Some keyloggers also take screen shots of your computer activity, monitor emails and online chatting, and?when installed by someone authorized to do so?are often used to monitor child or employee computer activity. Even in cases such as these, keyloggers usually work secretly.
7)Mail Bombers:-
Mail bombers flood your inbox with thousands of emails. It's usually impossible to find the real source of the spam and to track the attacker.
8)Proxy:-
Proxy is a firewall that blocks and re-creates a connection between two points. Proxy has an ability to hide a user from the outside world or an attacker from a user. For malicious purposes a proxy may be used to make a connection anonymous between an attacker and your computer, making the connection more difficult to notice. SMTP and FTP may be used in conjunction with Firewall Killers, Downloaders, RATs, and Trojans.