Tuesday, January 4, 2011

How to Hack Admin or Administrator Account

I am going to share with you all possible ways to hack admin or administrator account in windows XP. Today i will explain how to hack admin or administrator account in just 2 minutes. So guys get ready to hack your friends systems in 2 minutes.
Most of times specially in our college we don't have the access to the admin account, now suppose you want to install a software on that system. What you will do now? Ask the admin to enter the password for you or simply hack it by yourself. I will tell you frankly that i have never opted method one in my life. Whenever i need administrator right i have hacked it but guys don't do it like that ways because i got suspended from lab twice for doing that.

how to hack admin password,hacking password,reset admin password, system hacking
There are four ways to hack the admin password:
1. Simply accessing Unprotected Administrator Account.
2. Hacking Through Net User Command.
3. Hacking Using the ERD(Emergency Rescue Disk)  Commander.
4. Resetting admin password using Ubuntu Live CD or DVD. 

Lets start from the first technique to hack the admin or administrator password..

1. Simply Accessing the Unprotected Admin or Administrator account.

How this hack works ? When we install windows XP on our system we usually rename the username as our name or some other keyword. But windows always creates the administrator account whenever we set up windows XP. So when you create your user account during install , windows creates two accounts that is one is your username account and other is Administrator account. But the main thing is that you will only see the account with your username and the Administrator account is hidden but its there and you can easily access that using the following steps:
Step1: Start your computer.
Step2: Now let it start until the windows user's username appears as shown in snapshot below...
how to hack admin password,hacking password,reset admin password, system hacking

Step3: As This Window Appears Press Ctrl+Alt +Delete (2 times).. Now the Windows like shown below appears..

how to hack admin password,reset admin password,hack computer password

Step4: Now as shown above Enter the Administrator on the Username box and press enter... Now you will be login in the admin account can easily rest the password...

For Resetting password you can follow two Procedures..
Procedure 1: Goto Start --> Control Panel --> User Accounts.. Now select the account whose password u want to reset.
Procedure 2 : Follow the Next method i.e hacking password through Net User Command.

Note: Hack 1 will only work if Administrator(default) is unsecured i.e User as some other username like above shown figure...


2. Hacking admin or administrator account using net user command
Note: This will work only when user has access of user account or some how he has been allowed  or working in admin account.

Steps to hack admin account:
Step1: Goto the Start and click on Run and Type cmd and press enter ... 
Step 2: Now type "net user" in the command prompt to obtain the All accounts on that computer.. as shown in figure..

how to hack admin password,reset admin password,hack computer password,windows password hacking


Step 3: Now Select the account Which u want to Reset the Password...
Suppose that we want to Reset the Password  of Administrator...
Now Type "net user Administrator *  " Without quotes... and press Enter. As shown in the Below Figure..

reset admin password,hack computer password,windows password hacking

Step 4: Now after that press Enter Twice to rest the password. Now Next time u open that Account .. It will not require any Password..


3. Hacking admin account using ERD commander (100% working hack)
This hack has no restrictions , using this hack you can hack each and every computer.

First of all Download the ERD(Emergency Rescue Disk)  commander... Extract the Files and Make a CD...

STEPS INVOLVED :
1. Insert the ERD Commander Boot CD into the drive and restart the system
2. Boot the computer using ERD Commander Boot CD. You may have to set the boot order in the BIOS first.
3. Select your Windows XP installation from the list as shown.


How to hack Admin Account
4. From the ERD Commander menu (Start menu), click System Tools and click Locksmith
How to hack Admin Account

5. Click Next

How to hack Admin Account

6. Select the administrator account from the list for which you want to reset the password.
How to hack Admin Account

7. Type the new password in both the boxes, click Next and click Finish

How to hack Admin Account

8 . Restart The System and take the CD out of the Drive..And Enjoy Admin account...

Method 4: Resetting windows password using Ubuntu Live CD or DVD
For this hack you will require the Ubuntu Live CD.

Steps involved :

  1. Insert Ubuntu Live CD and boot from it.
  2. Open terminal and install chntpw in Ubuntu. To do so use the following commands.
    sudo apt-get update
    sudo apt-get install chntpw
  3. Now mount your Windows volume. In my case it was dev/sda1. Replace it with yours.
    sudo mkdir /media/WINDOWS
    sudo mount /dev/sda1 /media/WINDOWS
  4. Now navigate to the Windows configuration folder.
    cd /media/WINDOWS/WINDOWS/system32/config/
  5. To reset the administrator password enter
    sudo chntpw SAM
  6. After completing this command you will see 5 different choices. Select the 1st one and press Enter and its done. 
  7. Now restart your system, it will not ask any password. 

How to stop virus or trojan attacks

There are several ways to protect your system from being infected. I will try to share almost all tricks. And the most important thing is that after reading this article your system will be 100% secured from all types of Virus attacks but Trojan attacks can happen because of your negligence but i will try to tell all things so that this can also  does not happen. So Guys read on and stop wasting time in removing viruses or Trojans from your computer because from now a single virus cannot enter into your system Its my Guarantee and challenge to all hackers.


If you want to know that your system is either infected by viruses and trojans then these are certain techniques to know that:
1. Your Computer might be running slow usual than normal.
2. Some programs might open without your permission.
3. System start up takes too much time to start.
4. Various Error messages appear on Screen when you open something or without opening also.
5. System registry has been disabled or folder options is missing.
6. The most important antivirus shows messages of detecting viruses time to time.
7. While scanning your system from any antivirus or anti spyware tool its showing viruses and you noticed that viruses are not deleting.
and much more...

Have you ever think about the reason why your system is got infected. What has infected your system and if its done by any of your friend How he has done it. Surely No, or in some cases you have tried to find the answer but you are not able to get proper answer. But story is different here , I will tell all the ways How your system can be Get infected and How you can protect it if its already infected How you can resolve the problem. So here are few things How your System got Infected , some might be knowing this but by some reason they have ignored them. 


How a System is got Infected because to Negligence?

1. Using Cracked Versions of software specially security ones like antivirus, anti-spyware etc. 
Why I have said this is the first and major cause of infection because of the following simple reason that All hackers know that general internet user public always searches for cracked versions of software's and wishes to use them for free and Hacker take benefit of them. You all now be thinking how it help hackers. We know that almost all antivirus show each and every keygen as virus or some trojan depending upon its type. Now if we all know that then how come hackers will forget this fact so what they do they attaches trojans and viruses to these files and at the time When your antivirus shows it as virus you ignores the alert and keep the keygen means trojan running.
NOTE: And Guys an important note for you all, If your antivirus doesn't show any keygen or crack as a virus then don't ever think that its not a virus but its a most dangerous thing. Why dangerous because now Hacker has used some more brain to fool you that is he has made the virus undetectable simply edit the hex code of original virus. So what is the moral of story Please don't use cracked versions. 
Now you all be thinking that if we don't use the cracked versions then how we will able to get full versions of the software's. Don't worry when I am there no fear drink beer and enjoy everything for free. Its solution will be in solutions step just read article.

2. Pen drive or USB drive :
The biggest cause of infection of your system is usb drives and external hard disks.
Now how a virus enters into your system using USB drives. You have connected your USB drive to your friends computer and by chance (sorry its for sure i.e 100%) your friends system is infected by virus or Trojans and its the property of Virus that it replicates itself using memory. So when you connect your USB to your friends computer your USB is now infected by virus and now when you connect this USB to your PC using the property of your Windows that it searches the files in Newly connected device and autorun the device and for doing this it loads the index of your USB's file system into Memory and now if USB has virus its the property  of virus its replicates itself using system memory. Now if you are using good antivirus , your antivirus will pop warning and alert messages and some times you ignores them means your system is also infected. For USB drive virus solution keep reading article.

3. Downloading things from Unknown Sites:
Most of the users searches for thing over the internet and where ever they find their desired result means file that they want they start downloading that from that site only. Now how it affects your system suppose you want to download any wallpaper say Katrina Kaif. Now hackers know the fact that Katrina has a huge fan following and user will surely going to download it. Then what they do they simply bind their malicious codes with some of files and when users download it his system is infected and he can never imagine that the virus has come from wallpaper that he has downloaded from unknown site. For its solution read on article.

4. The most important one Becoming a Hacker like Me (ROFL but its truth).
Why I have mentioned this you might be clear from the above discussion. Most of the internet users always curious to know ways how can i hack my friends email account or his system for these they download all type of shit from the internet and believe me 99.9% of this shit contains viruses and Trojans that sends your information to the providers. Now I don't say that stop hacking but try to follow some basic steps to learn hacking and first of all you must know how to protect yourself from such type of fake software's. For its solution read on article.


Now after discussing the things How you system is got infected by your simple negligence. Its time You should Know How to fix them and protect your system from all types of viruses and trojans.


HOW TO STOP VIRUS OR TROJANS ??
1. Using Good Antivirus:
There is a nice misconception between the internet users that full antivirus provides better security. Ya its 100% truth but full antiviruses paid ones not the cracked ones.
There are several other solutions to them that you will get for absolutely Free and I guarantee that it will protect your system 100% just doing some little configurations.

Best Free Antivirus : Avira Personal Antivirus i.e Antivir.
You can download avira for free from :
http://www.filehippo.com/download_antivir/

Now after downloading the antivirus what you have to do to make it as good as paid antiviruses.
a. Install the antivirus and update it. Note updating antivirus regularly is compulsory. Don't worry its not your work it will update itself automatically whenever update is available.
b. After Installing at the right hand top corner you will see a "CONFIGURATION" button. Just click on it now a new window will pop up.
c. Now There at left hand top you will see a click box in front of Expert is written . Click on that now you will see several things in it. Now do the following setting one by one.
1. Click on "Scanner" click on all files and set the "Scanner Priority" to high and click on apply.
2. Click on "Guard" and click on all files and click on "Scan while reading and writing" and then click apply.
3. Click on "General" Now click on select all and click on apply. In general tab only go to WMI section and click on advanced process protection and then click on apply.
4. After doing that restart your PC.
Now you have made your free antivirus an equivalent to the paid one..


Best Free Anti-Spyware: Spyware Terminator with crawler Web security toolbar.
Download It for free :
http://www.filehippo.com/download_spyware_terminator/

Install spyware terminator with web security tool bar . Now your following problems are being solved:
1. No Trojan can attack you.
2. Protection from Malicious websites and much more..


2. Solution for Cracked version Software's:
As I have mentioned earlier never download cracks and keygens directly to you system but several other methods are there while you are searching for Crack or Keygen first try to search for Serial Key if you found it then its awesome and if not what to do.
Before downloading any Crack and Keygen . Go to the Website:
http://www.virustotal.com/  

Now copy the download link of the Keygen or crack in the URL box provided on website this website contains all the world famous antiviruses and it will scan file for you if it contains any virus just ignore that otherwise have fun with crack or Keygen.


3. Pen drive or USB drive solution:
How you can protect your system from being infected from the pen drive. Just do the following three things rest is being cared by your antivirus.
1. Turn off Auto Play Devices:
To do it Go to Start Menu--> RUN-->type gpedit.msc and press enter-->User Configuration-->Administrative templates-->System-->Turn off Autoplay--> click on enable and then select all drives.
2. Turn of Computer Browser service:
To do it Go to Start Menu--> RUN-->type services.msc and press enter-->then Find Computer Browser service and disable it and restart your system.
3. Most important one Always scan the Pen drive or External hard drives after connecting them.


4.Downloading things from Unknown Sites Solution:
The solution of this problem is already provided Web browser Security toolbar will help you in surfing only secured and genuine websites and if you want to visit and download Virus Total will help you to identify the file whether its infected or not.


5. Now for Hacker like me i.e Method to use or test Hack tools.
Why I have mentioned this is simply because Hackers always take benefit of these noobish tricks that they attach viruses with files and name them as hack tools . So avoid them if you are too curious like me. Then there are several ways to Handle it.
1. Use Deep Freeze on C drive: For testing Hack tools always use deep freeze as after the next restart your system will be at same position as it was previous.
2. Install Virtual Box and over virtual box install another Windows and test all hack tools using virtual windows. This will protect your system from being infected. Also It will give you more knowledge about handling the viruses and other situations like when something wrong is done what i have to do.
3. Create two to three fake email ID's and use them for testing Keyloggers and other fake email hacking software's.

How To Hack The Hackers

In this tutorial i will explain how to hack the hackers with practical examples and you will really enjoy it. Today i will teach you how to hack the hackers ethically and take revenge from them. Most of us thinks that hackers are extreme computer geeks , its truth but most of hackers are not that much and they always leaves the traces and do very basic and extreme mistakes that will make them even vulnerable to expert guys like me. Today you all will came to know how i hacked almost all hackers accounts, its pity much simple but you must know what to do and how to do. Don't worry you don't have to do much as i have already done that for you. What you have to do is just read the methods How we can hack the hackers... so friends read on the article..

 how to hack the hackers,hack emails,hack accounts,keyloggers
            

Topics that we cover:
1. Hacking the Keyloggers
a. By reverse engineering and viewing the code of keyloggers.
b. By network packet sniffing with wireshark packet sniffer.
2. Hacking the Hackers Hack tools by reverse Engineering.
3. Hacking the phishing web pages(fake pages) of hackers.

So by looking at the above topics that we will cover today you will now be very curious that how really it works. So lets start from the first topic..

HACKING THE KEYLOGGERS:
a. By reverse engineering and viewing the code of keyloggers.
For this we will need Binary File Extractor. What binary file extractor does that it decodes the executable files in binary string format and then converts them to understandable text.  The best tool in this category is provided by McAfee security forensics is Bintext 3.03. You can directly download this tool from McAfee's website .
To download Bintext 3.03 : Click Here

b. By network Packet Sniffing using wireshark packet sniffer
For this hack you will need a packet sniffer called wireshark , best in its category, its also a free tool and you can download it from:

After Downloading the wireshark, install the software and open it. Now how it really works, Most of the remote keyloggers or Rats upload your system data to hackers FTP after every 2 to 10 minutes interval. What we do is that we will monitor our own network using the wireshark packet sniffer and check the connections that our network is making with other websites or networks basically IP addresses. Now we search the FTP in that which works on Port 21 and then we can easily sniff the password of that FTP account as FTP uses connection control protocol which means its header consists of username and password of FTP on which hacker is uploading data.

Here are Steps to use Wireshark?
1. Open the wireshark, choose your network and start monitoring your own system. (In wireshark you can see all the details of type of connections that you are using like FTP,HTTP,UDP etc..)
2. Now the hacker has set a particular timing to send files from your system varying from 2 to 10 mins . So continue monitoring for 10 to 15 mins.
3. Now the hacker is uploading your data to FTP site.So filter the results by FTP as shown below:

hack keyloggers,hacking accounts,hack FTP sites

4. Now you will see the keylogger or Hack tool is uploading your data to the FTP account. Now you will able to see the username of FTP account and its Password and much more..as shown below:

Hacking class,hack keyloggers,hack the hacker
5. Now you have hackers FTP address , his username and his password. So why are you waiting open the hackers website and his account and take your revenge from him...
I hope you all have liked this technique also... Also friends this technique is also 110% working.


2. Hacking the Hackers Hack tools using Reverse Engineering
In this we will use the bintext 3.03 only and the tutorial is absolutely similar to above. Just open the hack tool using the Bintext 3.03 and search for string "@"(without quotes) or "smtp" (without quotes) . where you will find the users FTP account or Email account with password . So visit the hackers account and hack his account...

3. Hacking the phishing webpages(fake pages) of hackers

Now you all are thinking that how you can hack it. Its also pity simple. 

STEPS:
1. Suppose a hacker sends you the fake page or phish page like this this:

Note : Its for Educational Purposes only. Any misuse will result into severe consequences.

2. Now copy the following link:
http://myethicaltest.t35.com/Test/     just remove the file part .i.e test.html .
3. Now what you have to do replace test.html with following: a. log.txt or pass.txt or passes.txt or logs.txt or password.txt try them .... You will surely find the page where all the hacked information will be there.
4. Its done... rofl..


Difference Between A Hacker and A Cracker

Hello friends, today i am going to explain what is the difference between hacker and cracker. There are lots of articles on internet about the difference between hackers and crackers. In those articles authors or publishers often try to correct the public misconceptions. For many years, media has erroneously used the hacker word with a cracker. So the general public now believes hacker is someone who breaks into computer systems,hack passwords, websites and misuse them. But this is absolutely untrue and it demoralizes some of our most talented hackers.
 The greatness of misconception you can determine from the fact that world's biggest authentic source WIKIPEDIA has defined hackers in a incorrect way. Wikipedia has defined hackers in the following way...

"Hacking is unauthorized use of computer and network resources. (The term "hacker" originally meant a very gifted programmer. In recent years though, with easier access to multiple systems, it now has negative implications.)"
There is a very thin line difference between the hacker and cracker. Like a coin has two faces heads or tails, similar is true for computer experts. Some uses their techniques and expertize to help the others and secure the systems or networks and some misuses them and use that for their own selfish reasons. 

There are several traditional ways that determines the difference between the hackers and crackers. I will provide you these ways in order of their acceptance in the computer and IT market.  First of all, let me provide you the basic definitions of both hackers and crackers. 

These definitions are as follows:
Hackers : A Hacker is a person who is extremely interested in exploring the things and recondite workings of any computer system or networking system. Most often, hackers are the expert programmers. These are also called Ethical Hackers or white hat hackers. And the technique or hacking they perform is called ethical hacking.
Ethical Hacking Means you think like Hackers. i.e First you Hack the Systems and find out the loop holes and then try to correct those Loop Holes..These type of hackers protect the cyberworld from every possible threat and fixes the future coming security loop holes. These peoples are also called as "GURU's" of Computer Security. 
Crackers:  Crackers or Black Hat hackers or cheaters or simply criminals, they are called criminals because they are having the mindset of causing harm to security and they steals very useful data and use it in wrong ways. Phishers also come in this category who steals account info and steal your credit card nos. and money over the Net. 

 Below is the Diagrams which shows the basic difference between cracker or black hat hackers and Hackers or ethical hackers or white hat hackers.

hacking, hackers, hack computer system

I hope this will help you to clear most of your doubts about hackers and crackers. And the most important thing, until and unless a ethical hacker thinks like a cracker you can never become a expert ethical hacker because to get most out of any computer system you must understand the mindset of crackers that what they can do and up to what level they can damage. Now when you will identify the vulnerabilities and loopholes , If you fixes them so that in future anyone cannot breach that same vulnerability then you are Hacker or ethical hacker or White Hat hacker and if you utilize that loophole of misdeeds or for fun then its cracking or Black hat hacking. And black hat hackers are intelligent peoples but criminals or simply cyber cops call them evil genius.