Tampilkan postingan dengan label Hacking. Tampilkan semua postingan
Tampilkan postingan dengan label Hacking. Tampilkan semua postingan

Rabu, 27 Mei 2015

How to change IP address

Hacking - You need to decide whether you’d prefer to have a super-sharp screen or killer battery life. The Lenovo Yoga 920 lasts hours longer than the HP, and performs better in benchmarks and games with the same CPU (although if this is thanks to the Meltdown vulnerability, the playing field is effectively levelled). lasvegas, well we have collected a lot of data from the field directly and from many other blogs so very complete his discussion here about Hacking, on this blog we also have to provide the latest automotive information from all the brands associated with the automobile. ok please continue reading:

People want to change  IP address for a variety of reasons. The Internet Protocol (IP) address is popularly known as the IP address. This private address is used by PCs for any computer network for the communication and identification processes. It is used for the identification of electronic devices connected on a network. Therefore every device is provided with a unique address.

There could be several reasons as to why you might want to change IP. Fortunately, this is something that a user can generally accomplish without any hassle

How to change IP Address:


How to change IP address
1. Click on "Start" in the bottom left hand corner of screen
2. Click on "Run"
3. Type in "command" and hit OK

You should now be at an MS DOS prompt screen.

4. Type "ipconfig /release" just like that, and hit "enter"
5. Type "exit" and leave the prompt
6. Right-click on "Network Places" or "My Network Places" on your desktop.
7. Click on "properties"

You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.

8. Right click on "Local Area Connection" and click "properties"
9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
10. Click on "Use the following IP address" under the "General" tab
11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
13. Hit the "Ok" button here
14. Hit the "Ok" button again

You should now be back to the "Local Area Connection" screen.

15. Right-click back on "Local Area Connection" and go to properties again.
16. Go back to the "TCP/IP" settings
17. This time, select "Obtain an IP address automatically"
tongue.gif 18. Hit "Ok"
19. Hit "Ok" again
20. You now have a new IP address

With a little practice, you can easily get this process down to 15 seconds.

P.S:
This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back

Senin, 25 Mei 2015

How to hack windows password

Hacking - You need to decide whether you’d prefer to have a super-sharp screen or killer battery life. The Lenovo Yoga 920 lasts hours longer than the HP, and performs better in benchmarks and games with the same CPU (although if this is thanks to the Meltdown vulnerability, the playing field is effectively levelled). lasvegas, well we have collected a lot of data from the field directly and from many other blogs so very complete his discussion here about Hacking, on this blog we also have to provide the latest automotive information from all the brands associated with the automobile. ok please continue reading:

Kon Boot is a software which is used to bypass the password of  the computer in windows and mac.It also does not change the original password. Only the user can now enter the system without knowing password. It is very simple to use, tiny and fast. But illegal use of it to get unauthorized access to others computer is strictly prohibited.  It can bypass the password of windows XP, Vista, Windows 7 and Windows 8.1(only with v 4.3 or higher) .

Download Link in The Bottom of The Post.



Installing Kon boot


The antivirus should be disabled while extracting, burning or installing kon boot. Also there should be minimum of 10 MB free space on hardisk with at least Pentium 3 compatible processor.

By USB flash drive


1.First it should be noted that the antivirus is disabled as it can interfere in the process.

2.Then the USB drive should be attached to the PC and it should be formatted in FAT 32 file system .

3.Also all other USB drives should be removed which has no use in installing kon boot.

4.Now open the kon boot directory where it is downloaded..In the folder named " kon-boot USB", right click on file ''usb_install_RUNASADMIN.bat " and pick "Run As Administrator'' and then follow the displayed instructions.









5.You will see that there are now some files copied in your respective pen drive. Now your pen drive is ready for booting.


6.Now make the computer to restart.

7.Press the F2 ,F10 ,DEL, or ESC button as according to your computer to enter into BIOS setup.

8.Also it should be noted that the SECURE BOOT option in the BIOS menu is disabled and LEGACY MODE is enabled .


 9.Enter into BIOS menu to change boot priority order so that your USB is at top of that order.

10.Some computers can directly enter the Boot option and then the respective USB drive is chosen.

11.Then follow the instructions.


12.Now you can write anything in the password field and can enter the computer.

By CD ROM


You need to burn kon boot ISO image to your CD.The recommended software for burning is ImgBurn. It is available free to download at http://www.imgburn.com . Please don't use Power ISO, Any DVD, and others as they can can create some problems.

Steps to install


1.Make sure that the antivirus is turned off before using.Put blank CD-R media into your CD-RW/DVD-RW drive.

2.Run the ImgBurn software.

3.Select 'Write image file to disc'



 4.Click 'browse"



5.Select 'kon-bootCD.iso" -this file is located in your kon boot directory


6.Click burn and wait for burning process to complete.

7. Now the Kon-Boot is ready to be used.

8. Restart the PC. Also it should be noted that the secure boot option in the BIOS menu is disabled and legacy mode is enabled .

9.Boot with CD-ROM by entering into BIOS changing the boot order. Different computers have different keys to enter into bios .Some common keys are F2, F10, DEL, or Esc

10.Now follow the instructions .

11. Enter any password in the login screen and your computer will now open

GUI INSTALLER

Also in latest version of kon boot there is facility of installing kon boot to CD-R or USB thumb drive directly with GUI installer.



Install to CD

Use this option  if you want to burn kon boot ISO image to your CD media. This option requires ImgScreen program and it does not support EFI booting.If you want to use konboot EFI feature please use " Install to USB stick " option.  After the imgscreen window appears just click the BURN icon and wait for burning process to end. Rest all is same for booting using CDD-R as written above.

Install to USB thumb drive(with EFI support)

Use this option if you want to install konboot to your USB thumb drive . Your USB thumb drive needs to be plugged in before running kon boot installer.(Please unplug all other USB drives ) Pick your target USB flash drive before picking  "install to USB " button


How to change Profile Password?


1.After booting with konboot,navigate the start menu to control panel.

2.Select 'user accounts and family safety'

3.(if the user account control window appears) click ''yes" and leave the password field empty.

4.Select "Create a new account "

5.Create the account (pick a name) and set the permission(administrator).

6. Disconnect Kon Boot and restart the computer to original windows authentication functionality.

7.Then restart and select your new user account.

8. Navigate the start menu to to control menu

9.Select the"User accounts and family safety"

10.Select the target User account( the one you want to change)

11.Select the  "change the password  "

12.Input new information for the account and click "change the password"

13. You Are done.

FAQ 


Q. What does kon boot do ?
A. It allows to bypass the windows authentication password which we have to write while logging in without deleting or changing the original password. Also mac compatible version of kon boot can bypass password of mac

Q. Are there any permanent changes to computer?
A.No, only temporary. The windows go back to Previous setting after reboot.

Q. My antivirus detects the kon boot as virus or  malicious program ? what should i do?
A. There is no virus in the kon boot program. I is advised to turn off the antivirus before using kon boot.

Q. Will kon boot bypass the hard drive encryption?
A. No

Q. Kon boot gives an error related to BIOS,what is the problem
A. Unfortunately in some Bios the memory is too small for konboot to run. We cannot do anything in that case.But make sure that the legacy mode is turned on and secure boot is turned off . You can check these setting in BIOS menu

Q. What  does the error mean "Error: Windows volume was not found "
A. It means that you are trying to run kon boot in UEFI mode but your windows is not using UEFI loader. In order to fix this issue you need to either go to BIOS setup and set the BOOT OPTION to
USB (without UEFI) or manually delete the EFI directory from konboot USB media

Q. My system does not show the kon boot logo while booting?
 A. If you have done everything write, then make sure that you are not using authentication through domain. If  still there is problem,then your pc configuration is not supported

Q. My computer does not boot with kon boot. all i see is black screen.
A. Make sure that the software is properly installed . Also there can be a fault in boot priority order. The kon boot logo is definitely seen while booting with CD-R or USB thumb drive.



You can download latest version of konboot v 2.4 by Clicking Here



Rabu, 05 November 2014

12 Simple Steps To Become A Hacker

Hacking - You need to decide whether you’d prefer to have a super-sharp screen or killer battery life. The Lenovo Yoga 920 lasts hours longer than the HP, and performs better in benchmarks and games with the same CPU (although if this is thanks to the Meltdown vulnerability, the playing field is effectively levelled). lasvegas, well we have collected a lot of data from the field directly and from many other blogs so very complete his discussion here about Hacking, on this blog we also have to provide the latest automotive information from all the brands associated with the automobile. ok please continue reading:

Steps to become a hacker
http://lasvegasin.blogspot.com /search/label/HACKING" target="_blank">Hacking is an engaging field but it is surely not easy. To become a hacker one has to have an attitude and curiosity of learning and adapting new skills. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning goes on and on. Some people think that a hacker is always a criminal and do illegal activities but they are wrong. Actually many big companies hire hackers to protect their systems and information and are highly paid. We have prepared a list of 12 most important steps necessary to become a http://lasvegasin.blogspot.com /2013/12/top-6-black-hat-hackers-in-world.html" target="_blank">hacker, have a deeper look

1. Learn UNIX/LINUX

linux operating system
UNIX/LINUX is an open source operating system which provides better security to computer systems. It was first developed by AT&T in Bell labs and contributed a lot in the world of security. You should install LINUX freely available open source versions on your desktops as without learning UNIX/LINUX, it is not possible to become a hacker.


2. Code in C language 

c programming
C programming is the base of learning UNIX/LINUX as this operating system is coded in C programming which makes it the most powerful language as compared to other programming languages. C language was developed by Dennis Ritchie in late 1970’s. To become a hacker you should master C language.

3. Learn to code in more than one Programming Language

programming languages

It is important for a person in the hacking field to learn more than one programming. There are many programming languages to learn such as Python, JAVA, C++. Free eBooks, tutorials are easily available online.

  • http://lasvegasin.blogspot.com /2014/01/top-6-websites-to-learn-computer.html" target="_blank">Top 6 Websites To Learn Computer Programming Languages

4. Learn Networking Concepts

computer networking
Another important and essential step to become a hacker is to be good at networking concepts and understanding how the networks are created. You need to know the differences between different types of networks and must have a clear understanding of TCP/IP and UDP to exploit vulnerabilities (loop holes) in system.
Understanding what LAN, WAN, VPN, Firewall is also important.
You must have a clear understanding and use of network tools such as Wireshark, NMAP for packet analyzing, network scanning etc.

5. Learn More Than One Operating Systems 

operating system
It is essential for a hacker to learn more than one operating system. There are many other Operating systems apart from Windows, UNIX/LINUX etc. Every system has a loop hole, hacker needs it to exploit it.

6. Learn Cryptography

cryptography encryption
To become a successful hacker you need to master the art of cryptography. Encryption and Decryption are important skills in hacking. Encryption is widely done in several aspects of information system security in authentication, confidentiality and integrity of data. Information on a network is in encrypted form such as passwords. While hacking a system, these encrypted codes needs to be broken, which is called decryption.

7. Learn more and more about hacking

hacking or hackers
Go through various tutorials, eBooks written by experts in the field of hacking. In the field of hacking, learning is never ending because security changes every day with new updates in systems.

8. Experiment A Lot

experiment
After learning some concepts, sit and practice them. Setup your own lab for experimental purpose. You need a good computer system to start with as some tools may require powerful processor, RAM etc. Keep on Testing and learning until you breach a system.

9. Write Vulnerability (Loop hole program)

hacking vulnerability

Vulnerability is the weakness, loop hole or open door through which you enter the system. Look for vulnerabilities by scanning the system, network etc. Try to write your own and exploit the system.

  • http://lasvegasin.blogspot.com /2014/01/6-most-common-password-cracking-methods.html" target="_blank">6 Most Common Password Cracking Methods And Their Countermeasures

10. Contribute To Open Source Security Projects

open source software
An open source computer security project helps you a lot in polishing and testing your hacking skills. It’s not a piece of cake to get it done. Some organizations such as MOZILLA, APACHE offer open source projects. Contribute and be a part of them even if your contribution is small, it will add a big value to your field.

11. Continue never ending Learning 

learning hacking
Learning is the key to success in the world of hacking. Continuous learning and practicing will make you the best hacker. Keep yourself updated about security changes and learn about new ways to exploit systems

12. Join Discussions and meet hackers 

discussion
Most important for a hacker is to make a community or join forums, discussions with other hackers worldwide, so that they can exchange and share their knowledge and work as a team. Join Facebook groups related to hacking where you can get more from experts.

About Guest Blogger
Sifat Ullah is the founder of Uthweb. At UthWeb he writes about Tips & Tricks, Apps Review, Information Security, Ethical Hacking Guide and all that stuffs related to technology