Saturday, 28 December 2013

How to become the system user in windows and take the SAM file

Windows generally have three types if users wiz. user, administrator, system user. We users only have access to first two users and system user is like the root user in linux. Microsoft does not give us option to function as system user, that means we are not the sole owner of the windows, as we cannot use it as root.

So, here is the way to become the system user of our windows and do whatever we want. In my previous blogs I have mentioned that windows passwords are stored in SAM file in c:\windows\system32\config and we cannot view it or copy or delete it. But once we become the system user we can manipulate this file also. Now you may got the essence of system user.

Here are the steps to become the system user and take home the SAM file.

1. Download psexec.exe from sysinternal

2. Place it your C drive(or drive in which your windows is installed)

3. Open the cmd.exe and type cd \ . It will place you in the root directory where psexec is placed.

4. Use the following command   psexec -i -s cmd.exe
where -i for interactive
          -s for system account

5. When the command completes cmd shell will launched then type whoami, it will say "system"

6. Now, open the task manager and kill the explorer.exe

7. From thr cmd shell that is currently opened type start explorer.exe

8. When the explorer is launched, notice the name "system" as the user. Now you can delete or copy files in the windows\system32 folder which were not possible when your either admin or normal user.

9. Now you can also copy SAM file and extract hashes from it.

Monday, 9 December 2013

How to remove proxy from the linux terminal

As linux has become one of the major platforms in the computer systems. But it is still far from being perfect like windows or mac. It works, but sometimes it just don't. But it is still the best when it comes to Character User Interface(CUI). Sure, Windows and Mac also provide terminal, but they are simply not as developed as of ubuntu or any linux.

Since its launch it has come a long way down the road. But still today, it not the perfect or simplest platform to work, its graphical interface still face lot of problems. One if its problem is changing the proxy.

When proxy is changed from the network settings , from the settings applications, sometimes it doesn't apply to linux terminal or even the browser. No matter how many times system proxy is changed or restarted it just doesn't work. Method to change the proxy through is simple and it always works, all you have to do is follow following steps.

1.  Firstly you have to gain the root access of the system. You can achieve that by su command or sudo su, and then entering your user password if you have never done it before.

2. #cd /etc/apt

3. There will be a file located named "apt.conf"

4. Open the file by #nano apt.conf

5. In this you file all your proxy for various http, https, ftp connections proxy would be mentioned.

6. Change the proxy, to your desired configuration.

7. Save the file and now your new settings will be implimented to the entire system.

Hope it helped, if still any problem occurs, feel free to contact me.

Tuesday, 6 August 2013

Which is best linux distro?

This is a topic which will surely create some controversy. Everyone have different views regarding the various distros of the linux. Even the topic is highly subjective, I have tried to put various distros of the linux in different category for the best distro of that category.

Most Popular

Why does it matter which distros are most popular? They generally offer more resources: larger free software repositories, more tutorials, better doc, more support, and active forums.

Well, the title of most popular is taken by Ubuntu which also include Kubuntu, Xubuntu, Lubuntu, Gubuntu and others. Canonical claims 22 millions ubuntu users and 1.3 million servers running Ubuntu and 22000 new users joining each month.

The next spot in this category will surely be Red Hat.The Red Hat family includes Red Hat Enterprise Linux, CentOS, Fedora, Oracle Linux, and others. I've seen estimates that Red Hat has over 12 million users and Fedora over 1 million. Red Hat is the first billion dollar Linux company

Most User Friendly

The first spot according to me, should go to Mint. Well, Mint is based on Ubuntu, but still is provides far more different user environment than regular ubuntu. Since it is based on Ubuntu, it also enjoys the perks of Ubuntu that include huge software repositories, a familiar system, a big user community, etc. Mint protected their user by providing with the mate and cinnamon. The former is contribution of GNOME 2 interface and latter have GNOME 3 interface.

Many other distros can also cite the spot of most user friendly, but Mint philosophy of capitalizing on Ubuntu while addressing its shortcomings is a winner.

Best Live Distro

The live OS is that which can run right from any bootable flash drive and include all features of a OS to maintain and work on the system.

The first place in this category should be taken by Puppy Linux. This distro can run on any computer right from the flash drive without even the need for installing it. It can run systems that even have some component broken or very laggy computers or systems with lot of restrictions.

It is the distro with just 130 MB of download size, it can run entirely from the memory of the system, at least 256 MB.

Best for older Computers 

If you have an older PC, like a Pentium IV or III, (or even a II!) you need a distro that will run on minimal hardware. It should also be tested on older machines. Puppy Linux fits the bill. It can make your old Windows XP or 98 computer useful again.

Many distros theoretically run on older hardware but they don't have a large user community running mature systems. Join the Puppy forum and you'll see that you're in the right place. 

Best Office Desktop

The office desktop requires the most out of the system which includes office software, email client, calendering and contacts manager. With such requirements everyone have only distro name for it , that is OpenSUSE.

Not only does OpenSUSE come with all the bundled apps you need in the office, it also supplies consistent, user-friendly interfaces. No jumping off the deep end with OpenSUSE: you're not forced into the Windows 8 UI or Unity. So you can just get your work done.

With applications like LibreOffice and Wine, you can co-exist with organizations still using Windows and Office. LibreOffice allows you to interchange office files while Wine runs over 20,000 Windows apps under Linux. (LibreOffice and Wine run on nearly all Linux distros.)

Best Support

If you are looking for the paid support for the linux system that Red Hat is the best way to go. It have great service to offer to maintain your system and a nice user interface. But unlike other distros , it a paid version. Oracle Linux works really well with server database and various offering from the oracle.

For Hackers

If you are into hacking and hopes to continue the legacy with the linux, then Back Track is the best available option for you. Back Track provides with the various vulrability testing software right from the installation. It comes with various application which help to find the vulrability in the system and provides with many other software which helps to do so.

So, these were the various distros of the linux by category. I really hopes this will help you to choose the best linux distro. I would like state it again that, all distros of the linux are good in their own way, but what makes it best is what you are looking for in it.

Thursday, 1 August 2013

Fake Password(or pin) for the Hide it Pro (Audio Manager)

Hide it Pro or Audio Manager provides the feature of the fake password. Consider a situation, where someone caught you hiding something in the audio manager and ask you about it, now what you gonna do? In such situations, the need for a fake password emerges.

Whenever you enter this fake password the vault of the audio manager will open, but it will show every folder empty. That means you can open the vault for anybody, without showing the content of it. Default password for it is 8888 , but it is wise to keep a more obvious password, maybe reverse of the main password.

If you wish to set up your own fake password follow the following steps.

!. Enter the vault of the audio manager, by entering your main password.

2. Select settings > Login Settings > Fake Pin.

Inside of the fake pin you can customize your own fake pin or password and give your content another wall of safety. 

Saturday, 13 July 2013

PROGRAMMING LANGUAGES

There was the time when there were very few programming languages in the market and so was usage of them. As the development in the field of technology, communication and computer science, the need for more simpler, more user friendly and having more application has increased over the time. And now, the market is flooded with the number of programming languages. Every language overpowers other in some specific field and some has very large field of application and are used in many other works.

 So, some of the most useful programming languages and their use in various aspects are described below.

1. Objective-C
    It is a object oriented programming language that adds Smalltalk-style messaging to the C programming language. It is the main programming language used by apple computers to built application for iOS and OS X operating systems.
Objective C was developed in 1980s and was selected as the main language language by the Steve Jobs company NeXT for their operating system and from which present iOS and OS X are derived.
It is thin layer over the original C language and it possible to compile a C language in the objective C compiler or a using a complete C programming as a class for a objective-C program.

2. Java
   Java was developed by the sun microsystems. It is most widely used programming language and is currently used in many forms like as mobile operating system, mobile applications, android application, many software and web applications.
Java is unique in its working and is first of its type and now many programming are developed to run on java virtual machine, which act as a virtual machine to run compiled java programs. After compilation of a java program , program is converted into java bytecode which is understandable only by the java virtual machine(JVM). There are many compilers and interpreters which use JVM to run the code e.g. JRUBY (Ruby interpreter), JYTHON ( python interpreter ).

3. Python
   Python is a interpreted language, which translates every single line of code one by one unlike java or C or objective-C which are compiled language, they tranlates the code to machine language in one go. The main objective of using python is the code readability. It is also a object oriented programming like other two listed so far.Python is mostly used to make programs which are cross-platform.
Application made by python run of JVM and thus does not depend on the operating system, so they can be executed on any operating system.
Python is very strict of identation, program made in python have to identated otherwise it will cause execution error even code is correct.

Monday, 20 May 2013

How to hack windows password


There are various ways out there, by which we can hack the windows password. In windows, after the windows NT, mircrosoft have changed the way of security for the windows password. Now the password is  stored in a file in the registry, which can easily be accessed by the user but cannot be opened. The password is stored in a file named SAM.

The file is present in following directory.
C:\Windows\System32\config
As you can see the file named SAM is present which have password for all users.
When we try to open this file, it will show a message and it won't open.

Now, in order to hack the password we just need to replace this file by some other file which can easily achieved by running some other OS in the system and replace this file from the SAM file of some other computer. The other OS which can be used are quite a long list, anyway we'll use ubuntu.
Follow the following steps

1. Copy the SAM file of some computer in removable storage like pendrive or flash drive.
2. Make bootable pendrive or disk of ubuntu by using any software.
3. Insert the bootable in the computer to be hacked and boot the OS(you may need to change the boot order of the machine from the BIOS of the system).
4. Now choose try ubuntu and then it will boot up.
5. Open the directory in which SAM file is present and delete that and now copy the file taken from other computer in place of the file.
6. shutdown and restart the computer.

Now when you boot the windows, the user name from other computer will appear and password will be of the other computer. And now you can easily access the system without the use of old password.

You can use any other OS in place of ubuntu. I have used ubuntu beacuse its free and easily avaliable.

Hope it works for you, feel free to comment below if you encounter any problem.