Uncategorized

Common Social Engineering Techniques.

​ᴄᴏᴍᴍᴏɴ sᴏᴄɪᴀʟ ᴇɴɢɪɴᴇᴇʀɪɴɢ ᴛᴇᴄʜɴɪϙᴜᴇs: 
sᴏᴄɪᴀʟ ᴇɴɢɪɴᴇᴇʀɪɴɢ ᴛᴇᴄʜɴɪϙᴜᴇs ᴄᴀɴ ᴛᴀᴋᴇ ᴍᴀɴʏ ғᴏʀᴍs. ᴛʜᴇ ғᴏʟʟᴏᴡɪɴɢ ɪs ᴛʜᴇ ʟɪsᴛ ᴏғ ᴛʜᴇ ᴄᴏᴍᴍᴏɴʟʏ ᴜsᴇᴅ ᴛᴇᴄʜɴɪϙᴜᴇs.
 ғᴀᴍɪʟɪᴀʀɪᴛʏ ᴇxᴘʟᴏɪᴛ: ᴜsᴇʀs ᴀʀᴇ ʟᴇss sᴜsᴘɪᴄɪᴏᴜs ᴏғ ᴘᴇᴏᴘʟᴇ ᴛʜᴇʏ ᴀʀᴇ ғᴀᴍɪʟɪᴀʀ ᴡɪᴛʜ. ᴀɴ ᴀᴛᴛᴀᴄᴋᴇʀ ᴄᴀɴ ғᴀᴍɪʟɪᴀʀɪᴢᴇ ʜɪᴍ/ʜᴇʀsᴇʟғ ᴡɪᴛʜ ᴛʜᴇ ᴜsᴇʀs ᴏғ ᴛʜᴇ ᴛᴀʀɢᴇᴛ sʏsᴛᴇᴍ ᴘʀɪᴏʀ ᴛᴏ ᴛʜᴇ sᴏᴄɪᴀʟ ᴇɴɢɪɴᴇᴇʀɪɴɢ ᴀᴛᴛᴀᴄᴋ. ᴛʜᴇ ᴀᴛᴛᴀᴄᴋᴇʀ ᴍᴀʏ ɪɴᴛᴇʀᴀᴄᴛ ᴡɪᴛʜ ᴜsᴇʀs ᴅᴜʀɪɴɢ ᴍᴇᴀʟs, ᴡʜᴇɴ ᴜsᴇʀs ᴀʀᴇ sᴍᴏᴋɪɴɢ ʜᴇ ᴍᴀʏ ᴊᴏɪɴ, ᴏɴ sᴏᴄɪᴀʟ ᴇᴠᴇɴᴛs, ᴇᴛᴄ. ᴛʜɪs ᴍᴀᴋᴇs ᴛʜᴇ ᴀᴛᴛᴀᴄᴋᴇʀ ғᴀᴍɪʟɪᴀʀ ᴛᴏ ᴛʜᴇ ᴜsᴇʀs. ʟᴇᴛ’s sᴜᴘᴘᴏsᴇ ᴛʜᴀᴛ ᴛʜᴇ ᴜsᴇʀ ᴡᴏʀᴋs ɪɴ ᴀ ʙᴜɪʟᴅɪɴɢ ᴛʜᴀᴛ ʀᴇϙᴜɪʀᴇs ᴀɴ ᴀᴄᴄᴇss ᴄᴏᴅᴇ ᴏʀ ᴄᴀʀᴅ ᴛᴏ ɢᴀɪɴ ᴀᴄᴄᴇss; ᴛʜᴇ ᴀᴛᴛᴀᴄᴋᴇʀ ᴍᴀʏ ғᴏʟʟᴏᴡ ᴛʜᴇ ᴜsᴇʀs ᴀs ᴛʜᴇʏ ᴇɴᴛᴇʀ sᴜᴄʜ ᴘʟᴀᴄᴇs. ᴛʜᴇ ᴜsᴇʀs ᴀʀᴇ ᴍᴏsᴛ ʟɪᴋᴇ ᴛᴏ ʜᴏʟᴅ ᴛʜᴇ ᴅᴏᴏʀ ᴏᴘᴇɴ ғᴏʀ ᴛʜᴇ ᴀᴛᴛᴀᴄᴋᴇʀ ᴛᴏ ɢᴏ ɪɴ ᴀs ᴛʜᴇʏ ᴀʀᴇ ғᴀᴍɪʟɪᴀʀ ᴡɪᴛʜ ᴛʜᴇᴍ. ᴛʜᴇ ᴀᴛᴛᴀᴄᴋᴇʀ ᴄᴀɴ ᴀʟsᴏ ᴀsᴋ ғᴏʀ ᴀɴsᴡᴇʀs ᴛᴏ ϙᴜᴇsᴛɪᴏɴs sᴜᴄʜ ᴀs ᴡʜᴇʀᴇ ʏᴏᴜ ᴍᴇᴛ ʏᴏᴜʀ sᴘᴏᴜsᴇ, ᴛʜᴇ ɴᴀᴍᴇ ᴏғ ʏᴏᴜʀ ʜɪɢʜ sᴄʜᴏᴏʟ ᴍᴀᴛʜ ᴛᴇᴀᴄʜᴇʀ, ᴇᴛᴄ. ᴛʜᴇ ᴜsᴇʀs ᴀʀᴇ ᴍᴏsᴛ ʟɪᴋᴇʟʏ ᴛᴏ ʀᴇᴠᴇᴀʟ ᴀɴsᴡᴇʀs ᴀs ᴛʜᴇʏ ᴛʀᴜsᴛ ᴛʜᴇ ғᴀᴍɪʟɪᴀʀ ғᴀᴄᴇ. ᴛʜɪs ɪɴғᴏʀᴍᴀᴛɪᴏɴ ᴄᴏᴜʟᴅ ʙᴇ ᴜsᴇᴅ ᴛᴏ ʜᴀᴄᴋ ᴇᴍᴀɪʟ ᴀᴄᴄᴏᴜɴᴛs ᴀɴᴅ ᴏᴛʜᴇʀ ᴀᴄᴄᴏᴜɴᴛs ᴛʜᴀᴛ ᴀsᴋ sɪᴍɪʟᴀʀ ϙᴜᴇsᴛɪᴏɴs ɪғ ᴏɴᴇ ғᴏʀɢᴇᴛs ᴛʜᴇɪʀ ᴘᴀssᴡᴏʀᴅ.
1 ɪɴᴛɪᴍɪᴅᴀᴛɪɴɢ ᴄɪʀᴄᴜᴍsᴛᴀɴᴄᴇs: ᴘᴇᴏᴘʟᴇ ᴛᴇɴᴅ ᴛᴏ ᴀᴠᴏɪᴅ ᴘᴇᴏᴘʟᴇ ᴡʜᴏ ɪɴᴛɪᴍɪᴅᴀᴛᴇ ᴏᴛʜᴇʀs ᴀʀᴏᴜɴᴅ ᴛʜᴇᴍ. ᴜsɪɴɢ ᴛʜɪs ᴛᴇᴄʜɴɪϙᴜᴇ, ᴛʜᴇ ᴀᴛᴛᴀᴄᴋᴇʀ ᴍᴀʏ ᴘʀᴇᴛᴇɴᴅ ᴛᴏ ʜᴀᴠᴇ ᴀ ʜᴇᴀᴛᴇᴅ ᴀʀɢᴜᴍᴇɴᴛ ᴏɴ ᴛʜᴇ ᴘʜᴏɴᴇ ᴏʀ ᴡɪᴛʜ ᴀɴ ᴀᴄᴄᴏᴍᴘʟɪᴄᴇ ɪɴ ᴛʜᴇ sᴄʜᴇᴍᴇ. ᴛʜᴇ ᴀᴛᴛᴀᴄᴋᴇʀ ᴍᴀʏ ᴛʜᴇɴ ᴀsᴋ ᴜsᴇʀs ғᴏʀ ɪɴғᴏʀᴍᴀᴛɪᴏɴ ᴡʜɪᴄʜ ᴡᴏᴜʟᴅ ʙᴇ ᴜsᴇᴅ ᴛᴏ ᴄᴏᴍᴘʀᴏᴍɪsᴇ ᴛʜᴇ sᴇᴄᴜʀɪᴛʏ ᴏғ ᴛʜᴇ ᴜsᴇʀs’ sʏsᴛᴇᴍ. ᴛʜᴇ ᴜsᴇʀs ᴀʀᴇ ᴍᴏsᴛ ʟɪᴋᴇʟʏ ɢɪᴠᴇ ᴛʜᴇ ᴄᴏʀʀᴇᴄᴛ ᴀɴsᴡᴇʀs ᴊᴜsᴛ ᴛᴏ ᴀᴠᴏɪᴅ ʜᴀᴠɪɴɢ ᴀ ᴄᴏɴғʀᴏɴᴛᴀᴛɪᴏɴ ᴡɪᴛʜ ᴛʜᴇ ᴀᴛᴛᴀᴄᴋᴇʀ. ᴛʜɪs ᴛᴇᴄʜɴɪϙᴜᴇ ᴄᴀɴ ᴀʟsᴏ ʙᴇ ᴜsᴇᴅ ᴛᴏ ᴀᴠᴏɪᴅ ʙᴇᴇɴ ᴄʜᴇᴄᴋᴇᴅ ᴀᴛ ᴀ sᴇᴄᴜʀɪᴛʏ ᴄʜᴇᴄᴋ ᴘᴏɪɴᴛ.
2 ᴘʜɪsʜɪɴɢ: ᴛʜɪs ᴛᴇᴄʜɴɪϙᴜᴇ ᴜsᴇs ᴛʀɪᴄᴋᴇʀʏ ᴀɴᴅ ᴅᴇᴄᴇɪᴛ ᴛᴏ ᴏʙᴛᴀɪɴ ᴘʀɪᴠᴀᴛᴇ ᴅᴀᴛᴀ ғʀᴏᴍ ᴜsᴇʀs. ᴛʜᴇ sᴏᴄɪᴀʟ ᴇɴɢɪɴᴇᴇʀ ᴍᴀʏ ᴛʀʏ ᴛᴏ ɪᴍᴘᴇʀsᴏɴᴀᴛᴇ ᴀ ɢᴇɴᴜɪɴᴇ ᴡᴇʙsɪᴛᴇ sᴜᴄʜ ᴀs ʏᴀʜᴏᴏ ᴀɴᴅ ᴛʜᴇɴ ᴀsᴋ ᴛʜᴇ ᴜɴsᴜsᴘᴇᴄᴛɪɴɢ ᴜsᴇʀ ᴛᴏ ᴄᴏɴғɪʀᴍ ᴛʜᴇɪʀ ᴀᴄᴄᴏᴜɴᴛ ɴᴀᴍᴇ ᴀɴᴅ ᴘᴀssᴡᴏʀᴅ. ᴛʜɪs ᴛᴇᴄʜɴɪϙᴜᴇ ᴄᴏᴜʟᴅ ᴀʟsᴏ ʙᴇ ᴜsᴇᴅ ᴛᴏ ɢᴇᴛ ᴄʀᴇᴅɪᴛ ᴄᴀʀᴅ ɪɴғᴏʀᴍᴀᴛɪᴏɴ ᴏʀ ᴀɴʏ ᴏᴛʜᴇʀ ᴠᴀʟᴜᴀʙʟᴇ ᴘᴇʀsᴏɴᴀʟ ᴅᴀᴛᴀ.
3 ᴛᴀɪʟɢᴀᴛɪɴɢ: ᴛʜɪs ᴛᴇᴄʜɴɪϙᴜᴇ ɪɴᴠᴏʟᴠᴇs ғᴏʟʟᴏᴡɪɴɢ ᴜsᴇʀs ʙᴇʜɪɴᴅ ᴀs ᴛʜᴇʏ ᴇɴᴛᴇʀ ʀᴇsᴛʀɪᴄᴛᴇᴅ ᴀʀᴇᴀs. ᴀs ᴀ ʜᴜᴍᴀɴ ᴄᴏᴜʀᴛᴇsʏ, ᴛʜᴇ ᴜsᴇʀ ɪs ᴍᴏsᴛ ʟɪᴋᴇʟʏ ᴛᴏ ʟᴇᴛ ᴛʜᴇ sᴏᴄɪᴀʟ ᴇɴɢɪɴᴇᴇʀ ɪɴsɪᴅᴇ ᴛʜᴇ ʀᴇsᴛʀɪᴄᴛᴇᴅ ᴀʀᴇᴀ.
4 ᴇxᴘʟᴏɪᴛɪɴɢ ʜᴜᴍᴀɴ ᴄᴜʀɪᴏsɪᴛʏ: ᴜsɪɴɢ ᴛʜɪs ᴛᴇᴄʜɴɪϙᴜᴇ, ᴛʜᴇ sᴏᴄɪᴀʟ ᴇɴɢɪɴᴇᴇʀ ᴍᴀʏ ᴅᴇʟɪʙᴇʀᴀᴛᴇʟʏ ᴅʀᴏᴘ ᴀ ᴠɪʀᴜs ɪɴғᴇᴄᴛᴇᴅ ғʟᴀsʜ ᴅɪsᴋ ɪɴ ᴀɴ ᴀʀᴇᴀ ᴡʜᴇʀᴇ ᴛʜᴇ ᴜsᴇʀs ᴄᴀɴ ᴇᴀsɪʟʏ ᴘɪᴄᴋ ɪᴛ ᴜᴘ. ᴛʜᴇ ᴜsᴇʀ ᴡɪʟʟ ᴍᴏsᴛ ʟɪᴋᴇʟʏ ᴘʟᴜɢ ᴛʜᴇ ғʟᴀsʜ ᴅɪsᴋ ɪɴᴛᴏ ᴛʜᴇ ᴄᴏᴍᴘᴜᴛᴇʀ. ᴛʜᴇ ғʟᴀsʜ ᴅɪsᴋ ᴍᴀʏ ᴀᴜᴛᴏ ʀᴜɴ ᴛʜᴇ ᴠɪʀᴜs, ᴏʀ ᴛʜᴇ ᴜsᴇʀ ᴍᴀʏ ʙᴇ ᴛᴇᴍᴘᴛᴇᴅ ᴛᴏ ᴏᴘᴇɴ ᴀ ғɪʟᴇ ᴡɪᴛʜ ᴀ ɴᴀᴍᴇ sᴜᴄʜ ᴀs ᴇᴍᴘʟᴏʏᴇᴇs ʀᴇᴠᴀʟᴜᴀᴛɪᴏɴ ʀᴇᴘᴏʀᴛ 2013.ᴅᴏᴄx ᴡʜɪᴄʜ ᴍᴀʏ ᴀᴄᴛᴜᴀʟʟʏ ʙᴇ ᴀɴ ɪɴғᴇᴄᴛᴇᴅ ғɪʟᴇ.
5 ᴇxᴘʟᴏɪᴛɪɴɢ ʜᴜᴍᴀɴ ɢʀᴇᴇᴅ: ᴜsɪɴɢ ᴛʜɪs ᴛᴇᴄʜɴɪϙᴜᴇ, ᴛʜᴇ sᴏᴄɪᴀʟ ᴇɴɢɪɴᴇᴇʀ ᴍᴀʏ ʟᴜʀᴇ ᴛʜᴇ ᴜsᴇʀ ᴡɪᴛʜ ᴘʀᴏᴍɪsᴇs ᴏғ ᴍᴀᴋɪɴɢ ᴀ ʟᴏᴛ ᴏғ ᴍᴏɴᴇʏ ᴏɴʟɪɴᴇ ʙʏ ғɪʟʟɪɴɢ ɪɴ ᴀ ғᴏʀᴍ ᴀɴᴅ ᴄᴏɴғɪʀᴍ ᴛʜᴇɪʀ ᴅᴇᴛᴀɪʟs ᴜsɪɴɢ ᴄʀᴇᴅɪᴛ ᴄᴀʀᴅ ᴅᴇᴛᴀɪʟs, ᴇᴛᴄ.
ᴇᴛʜᴇʀᴘᴇᴇᴋ 
ᴇᴛʜᴇʀᴘᴇᴇᴋ ɪs ᴀ ᴡᴏɴᴅᴇʀғᴜʟ ᴛᴏᴏʟ ᴛʜᴀᴛ sɪᴍᴘʟɪғɪᴇs ɴᴇᴛᴡᴏʀᴋ ᴀɴᴀʟʏsɪs ɪɴ ᴀ ᴍᴜʟᴛɪᴘʀᴏᴛᴏᴄᴏʟ ʜᴇᴛᴇʀᴏɢᴇɴᴇᴏᴜs ɴᴇᴛᴡᴏʀᴋ ᴇɴᴠɪʀᴏɴᴍᴇɴᴛ. ᴇᴛʜᴇʀᴘᴇᴇᴋ ɪs ᴀ sᴍᴀʟʟ ᴛᴏᴏʟ (ʟᴇss ᴛʜᴀɴ 2 ᴍʙ) ᴛʜᴀᴛ ᴄᴀɴ ʙᴇ ᴇᴀsɪʟʏ ɪɴsᴛᴀʟʟᴇᴅ ɪɴ ᴀ ᴍᴀᴛᴛᴇʀ ᴏғ ғᴇᴡ ᴍɪɴᴜᴛᴇs.
ᴇᴛʜᴇʀᴘᴇᴇᴋ ᴘʀᴏᴀᴄᴛɪᴠᴇʟʏ sɴɪғғs ᴛʀᴀғғɪᴄ ᴘᴀᴄᴋᴇᴛs ᴏɴ ᴀ ɴᴇᴛᴡᴏʀᴋ. ʙʏ ᴅᴇғᴀᴜʟᴛ, ᴇᴛʜᴇʀᴘᴇᴇᴋ sᴜᴘᴘᴏʀᴛs ᴘʀᴏᴛᴏᴄᴏʟs sᴜᴄʜ ᴀs ᴀᴘᴘʟᴇᴛᴀʟᴋ, ɪᴘ, ɪᴘ ᴀᴅᴅʀᴇss ʀᴇsᴏʟᴜᴛɪᴏɴ ᴘʀᴏᴛᴏᴄᴏʟ (ᴀʀᴘ), ɴᴇᴛᴡᴀʀᴇ, ᴛᴄᴘ, ᴜᴅᴘ, ɴᴇᴛʙᴇᴜɪ, ᴀɴᴅ ɴʙᴛ ᴘᴀᴄᴋᴇᴛs.
sᴜᴘᴇʀsᴄᴀɴ 
sᴜᴘᴇʀsᴄᴀɴ ɪs ᴀ ᴘᴏᴡᴇʀғᴜʟ ᴛᴏᴏʟ ғᴏʀ ɴᴇᴛᴡᴏʀᴋ ᴀᴅᴍɪɴɪsᴛʀᴀᴛᴏʀs ᴛᴏ sᴄᴀɴ ᴛᴄᴘ ᴘᴏʀᴛs ᴀɴᴅ ʀᴇsᴏʟᴠᴇ ʜᴏsᴛɴᴀᴍᴇs. ɪᴛ ʜᴀs ᴀ ᴜsᴇʀ ғʀɪᴇɴᴅʟʏ ɪɴᴛᴇʀғᴀᴄᴇ ᴛʜᴀᴛ ʏᴏᴜ ᴄᴀɴ ᴜsᴇ ᴛᴏ −
ᴘᴇʀғᴏʀᴍ ᴘɪɴɢ sᴄᴀɴs ᴀɴᴅ ᴘᴏʀᴛ sᴄᴀɴs ᴜsɪɴɢ ᴀɴʏ ɪᴘ ʀᴀɴɢᴇ.
sᴄᴀɴ ᴀɴʏ ᴘᴏʀᴛ ʀᴀɴɢᴇ ғʀᴏᴍ ᴀ ʙᴜɪʟᴛ-ɪɴ ʟɪsᴛ ᴏʀ ᴀɴʏ ɢɪᴠᴇɴ ʀᴀɴɢᴇ.
ᴠɪᴇᴡ ʀᴇsᴘᴏɴsᴇs ғʀᴏᴍ ᴄᴏɴɴᴇᴄᴛᴇᴅ ʜᴏsᴛs.
ᴍᴏᴅɪғʏ ᴛʜᴇ ᴘᴏʀᴛ ʟɪsᴛ ᴀɴᴅ ᴘᴏʀᴛ ᴅᴇsᴄʀɪᴘᴛɪᴏɴs ᴜsɪɴɢ ᴛʜᴇ ʙᴜɪʟᴛ ɪɴ ᴇᴅɪᴛᴏʀ.
ᴍᴇʀɢᴇ ᴘᴏʀᴛ ʟɪsᴛs ᴛᴏ ʙᴜɪʟᴅ ɴᴇᴡ ᴏɴᴇs.
 ᴄᴏɴɴᴇᴄᴛ ᴛᴏ ᴀɴʏ ᴅɪsᴄᴏᴠᴇʀᴇᴅ ᴏᴘᴇɴ ᴘᴏʀᴛ.
ᴀssɪɢɴ ᴀ ᴄᴜsᴛᴏᴍ ʜᴇʟᴘᴇʀ ᴀᴘᴘʟɪᴄᴀᴛɪᴏɴ ᴛᴏ ᴀɴʏ ᴘᴏʀᴛ.
ϙᴜᴀʟʏsɢᴜᴀʀᴅ 
ϙᴜᴀʟʏsɢᴜᴀʀᴅ ɪs ᴀɴ ɪɴᴛᴇɢʀᴀᴛᴇᴅ sᴜɪᴛᴇ ᴏғ ᴛᴏᴏʟs ᴛʜᴀᴛ ᴄᴀɴ ʙᴇ ᴜᴛɪʟɪᴢᴇᴅ ᴛᴏ sɪᴍᴘʟɪғʏ sᴇᴄᴜʀɪᴛʏ ᴏᴘᴇʀᴀᴛɪᴏɴs ᴀɴᴅ ʟᴏᴡᴇʀ ᴛʜᴇ ᴄᴏsᴛ ᴏғ ᴄᴏᴍᴘʟɪᴀɴᴄᴇ. ɪᴛ ᴅᴇʟɪᴠᴇʀs ᴄʀɪᴛɪᴄᴀʟ sᴇᴄᴜʀɪᴛʏ ɪɴᴛᴇʟʟɪɢᴇɴᴄᴇ ᴏɴ ᴅᴇᴍᴀɴᴅ ᴀɴᴅ ᴀᴜᴛᴏᴍᴀᴛᴇs ᴛʜᴇ ғᴜʟʟ sᴘᴇᴄᴛʀᴜᴍ ᴏғ ᴀᴜᴅɪᴛɪɴɢ, ᴄᴏᴍᴘʟɪᴀɴᴄᴇ ᴀɴᴅ ᴘʀᴏᴛᴇᴄᴛɪᴏɴ ғᴏʀ ɪᴛ sʏsᴛᴇᴍs ᴀɴᴅ
 ᴡᴇʙ ᴀᴘᴘʟɪᴄᴀᴛɪᴏɴs.
ϙᴜᴀʟʏsɢᴜᴀʀᴅ ɪɴᴄʟᴜᴅᴇs ᴀ sᴇᴛ ᴏғ ᴛᴏᴏʟs ᴛʜᴀᴛ ᴄᴀɴ ᴍᴏɴɪᴛᴏʀ, ᴅᴇᴛᴇᴄᴛ, ᴀɴᴅ ᴘʀᴏᴛᴇᴄᴛ ʏᴏᴜʀ ɢʟᴏʙᴀʟ ɴᴇᴛᴡᴏʀᴋ.
 ᴡᴇʙɪɴsᴘᴇᴄᴛ 
ᴡᴇʙɪɴsᴘᴇᴄᴛ ɪs ᴀ ᴡᴇʙ ᴀᴘᴘʟɪᴄᴀᴛɪᴏɴ sᴇᴄᴜʀɪᴛʏ ᴀssᴇssᴍᴇɴᴛ ᴛᴏᴏʟ ᴛʜᴀᴛ ʜᴇʟᴘs ɪᴅᴇɴᴛɪғʏ ᴋɴᴏᴡɴ ᴀɴᴅ ᴜɴᴋɴᴏᴡɴ ᴠᴜʟɴᴇʀᴀʙɪʟɪᴛɪᴇs ᴡɪᴛʜɪɴ ᴛʜᴇ ᴡᴇʙ ᴀᴘᴘʟɪᴄᴀᴛɪᴏɴ ʟᴀʏᴇʀ.
ɪᴛ ᴄᴀɴ ᴀʟsᴏ ʜᴇʟᴘ ᴄʜᴇᴄᴋ ᴛʜᴀᴛ ᴀ ᴡᴇʙ sᴇʀᴠᴇʀ ɪs ᴄᴏɴғɪɢᴜʀᴇᴅ ᴘʀᴏᴘᴇʀʟʏ, ᴀɴᴅ ᴀᴛᴛᴇᴍᴘᴛs ᴄᴏᴍᴍᴏɴ ᴡᴇʙ ᴀᴛᴛᴀᴄᴋs sᴜᴄʜ ᴀs ᴘᴀʀᴀᴍᴇᴛᴇʀ ɪɴᴊᴇᴄᴛɪᴏɴ, ᴄʀᴏss-sɪᴛᴇ sᴄʀɪᴘᴛɪɴɢ, ᴅɪʀᴇᴄᴛᴏʀʏ ᴛʀᴀᴠᴇʀsᴀʟ, ᴀɴᴅ ᴍᴏʀᴇ.
ʟᴄ4 
ʟᴄ4 ᴡᴀs ғᴏʀᴍᴇʀʟʏ ᴋɴᴏᴡɴ ᴀs ʟ0ᴘʜᴛᴄʀᴀᴄᴋ. ɪᴛ ɪs ᴀ ᴘᴀssᴡᴏʀᴅ ᴀᴜᴅɪᴛɪɴɢ ᴀɴᴅ ʀᴇᴄᴏᴠᴇʀʏ ᴀᴘᴘʟɪᴄᴀᴛɪᴏɴ. ɪᴛ ɪs ᴜsᴇᴅ ᴛᴏ ᴛᴇsᴛ ᴘᴀssᴡᴏʀᴅ sᴛʀᴇɴɢᴛʜ ᴀɴᴅ sᴏᴍᴇᴛɪᴍᴇs ᴛᴏ ʀᴇᴄᴏᴠᴇʀ ʟᴏsᴛ ᴍɪᴄʀᴏsᴏғᴛ ᴡɪɴᴅᴏᴡs ᴘᴀssᴡᴏʀᴅs, ʙʏ ᴜsɪɴɢ ᴅɪᴄᴛɪᴏɴᴀʀʏ, ʙʀᴜᴛᴇ-ғᴏʀᴄᴇ, ᴀɴᴅ ʜʏʙʀɪᴅ ᴀᴛᴛᴀᴄᴋs.
ʟᴄ4 ʀᴇᴄᴏᴠᴇʀs ᴡɪɴᴅᴏᴡs ᴜsᴇʀ ᴀᴄᴄᴏᴜɴᴛ ᴘᴀssᴡᴏʀᴅs ᴛᴏ sᴛʀᴇᴀᴍʟɪɴᴇ ᴍɪɢʀᴀᴛɪᴏɴ ᴏғ ᴜsᴇʀs ᴛᴏ ᴀɴᴏᴛʜᴇʀ ᴀᴜᴛʜᴇɴᴛɪᴄᴀᴛɪᴏɴ sʏsᴛᴇᴍ ᴏʀ ᴛᴏ ᴀᴄᴄᴇss ᴀᴄᴄᴏᴜɴᴛs ᴡʜᴏsᴇ ᴘᴀssᴡᴏʀᴅs ᴀʀᴇ ʟᴏsᴛ.
 ʟᴀɴɢᴜᴀʀᴅ ɴᴇᴛᴡᴏʀᴋ sᴇᴄᴜʀɪᴛʏ sᴄᴀɴɴᴇʀ 
ʟᴀɴɢᴜᴀʀᴅ ɴᴇᴛᴡᴏʀᴋ sᴄᴀɴɴᴇʀ ᴍᴏɴɪᴛᴏʀs ᴀ ɴᴇᴛᴡᴏʀᴋ ʙʏ sᴄᴀɴɴɪɴɢ ᴄᴏɴɴᴇᴄᴛᴇᴅ ᴍᴀᴄʜɪɴᴇs ᴀɴᴅ ᴘʀᴏᴠɪᴅɪɴɢ ɪɴғᴏʀᴍᴀᴛɪᴏɴ ᴀʙᴏᴜᴛ ᴇᴀᴄʜ ɴᴏᴅᴇ. ʏᴏᴜ ᴄᴀɴ ᴏʙᴛᴀɪɴ ɪɴғᴏʀᴍᴀᴛɪᴏɴ ᴀʙᴏᴜᴛ ᴇᴀᴄʜ ɪɴᴅɪᴠɪᴅᴜᴀʟ ᴏᴘᴇʀᴀᴛɪɴɢ sʏsᴛᴇᴍ.
ɪᴛ ᴄᴀɴ ᴀʟsᴏ ᴅᴇᴛᴇᴄᴛ ʀᴇɢɪsᴛʀʏ ɪssᴜᴇs ᴀɴᴅ ʜᴀᴠᴇ ᴀ ʀᴇᴘᴏʀᴛ sᴇᴛ ᴜᴘ ɪɴ ʜᴛᴍʟ ғᴏʀᴍᴀᴛ. ғᴏʀ ᴇᴀᴄʜ ᴄᴏᴍᴘᴜᴛᴇʀ, ʏᴏᴜ ᴄᴀɴ ʟɪsᴛ ᴛʜᴇ ɴᴇᴛʙɪᴏs ɴᴀᴍᴇ ᴛᴀʙʟᴇ, ᴄᴜʀʀᴇɴᴛ ʟᴏɢɢᴇᴅ-ᴏɴ ᴜsᴇʀ, ᴀɴᴅ ᴍᴀᴄ ᴀᴅᴅʀᴇss.
 ɴᴇᴛᴡᴏʀᴋ sᴛᴜᴍʙʟᴇʀ 
ɴᴇᴛᴡᴏʀᴋ sᴛᴜᴍʙʟᴇʀ ɪs ᴀ ᴡɪғɪ sᴄᴀɴɴᴇʀ ᴀɴᴅ ᴍᴏɴɪᴛᴏʀɪɴɢ ᴛᴏᴏʟ ғᴏʀ ᴡɪɴᴅᴏᴡs. ɪᴛ ᴀʟʟᴏᴡs ɴᴇᴛᴡᴏʀᴋ ᴘʀᴏғᴇssɪᴏɴᴀʟs ᴛᴏ ᴅᴇᴛᴇᴄᴛ ᴡʟᴀɴs. ɪᴛ ɪs ᴡɪᴅᴇʟʏ ᴜsᴇᴅ ʙʏ ɴᴇᴛᴡᴏʀᴋɪɴɢ ᴇɴᴛʜᴜsɪᴀsᴛs ᴀɴᴅ ʜᴀᴄᴋᴇʀs ʙᴇᴄᴀᴜsᴇ ɪᴛ ʜᴇʟᴘs ʏᴏᴜ ғɪɴᴅ ɴᴏɴ-ʙʀᴏᴀᴅᴄᴀsᴛɪɴɢ ᴡɪʀᴇʟᴇss ɴᴇᴛᴡᴏʀᴋs.
ɴᴇᴛᴡᴏʀᴋ sᴛᴜᴍʙʟᴇʀ ᴄᴀɴ ʙᴇ ᴜsᴇᴅ ᴛᴏ ᴠᴇʀɪғʏ ɪғ ᴀ ɴᴇᴛᴡᴏʀᴋ ɪs ᴡᴇʟʟ ᴄᴏɴғɪɢᴜʀᴇᴅ, ɪᴛs sɪɢɴᴀʟ sᴛʀᴇɴɢᴛʜ ᴏʀ ᴄᴏᴠᴇʀᴀɢᴇ, ᴀɴᴅ ᴅᴇᴛᴇᴄᴛ ɪɴᴛᴇʀғᴇʀᴇɴᴄᴇ ʙᴇᴛᴡᴇᴇɴ ᴏɴᴇ ᴏʀ ᴍᴏʀᴇ ᴡɪʀᴇʟᴇss ɴᴇᴛᴡᴏʀᴋs. ɪᴛ ᴄᴀɴ ᴀʟsᴏ ʙᴇ ᴜsᴇᴅ ᴛᴏ ɴᴏɴ-ᴀᴜᴛʜᴏʀɪᴢᴇᴅ ᴄᴏɴɴᴇᴄᴛɪᴏɴs.
 ᴛᴏɴᴇʟᴏᴄ 
ᴛᴏɴᴇʟᴏᴄ sᴛᴀɴᴅs ғᴏʀ ᴛᴏɴᴇ ʟᴏᴄᴀᴛᴏʀ. ɪᴛ ᴡᴀs ᴀ ᴘᴏᴘᴜʟᴀʀ ᴡᴀʀ ᴅɪᴀʟʟɪɴɢ ᴄᴏᴍᴘᴜᴛᴇʀ ᴘʀᴏɢʀᴀᴍ ᴡʀɪᴛᴛᴇɴ ғᴏʀ ᴍs-ᴅᴏs ɪɴ ᴛʜᴇ ᴇᴀʀʟʏ 90’s. ᴡᴀʀ ᴅɪᴀʟʟɪɴɢ ɪs ᴀ ᴛᴇᴄʜɴɪϙᴜᴇ ᴏғ ᴜsɪɴɢ ᴀ ᴍᴏᴅᴇᴍ ᴛᴏ ᴀᴜᴛᴏᴍᴀᴛɪᴄᴀʟʟʏ sᴄᴀɴ ᴀ ʟɪsᴛ ᴏғ ᴛᴇʟᴇᴘʜᴏɴᴇ ɴᴜᴍʙᴇʀs, ᴜsᴜᴀʟʟʏ ᴅɪᴀʟʟɪɴɢ ᴇᴠᴇʀʏ ɴᴜᴍʙᴇʀ ɪɴ ᴀ ʟᴏᴄᴀʟ ᴀʀᴇᴀ ᴄᴏᴅᴇ.
ᴍᴀʟɪᴄɪᴏᴜs ʜᴀᴄᴋᴇʀs ᴜsᴇ ᴛʜᴇ ʀᴇsᴜʟᴛɪɴɢ ʟɪsᴛs ɪɴ ʙʀᴇᴀᴄʜɪɴɢ ᴄᴏᴍᴘᴜᴛᴇʀ sᴇᴄᴜʀɪᴛʏ – ғᴏʀ ɢᴜᴇssɪɴɢ ᴜsᴇʀ ᴀᴄᴄᴏᴜɴᴛs, ᴏʀ ʟᴏᴄᴀᴛɪɴɢ ᴍᴏᴅᴇᴍs ᴛʜᴀᴛ ᴍɪɢʜᴛ ᴘʀᴏᴠɪᴅᴇ ᴀɴ ᴇɴᴛʀʏ-ᴘᴏɪɴᴛ ɪɴᴛᴏ ᴄᴏᴍᴘᴜᴛᴇʀ ᴏʀ ᴏᴛʜᴇʀ ᴇʟᴇᴄᴛʀᴏɴɪᴄ sʏsᴛᴇᴍs.
ɪᴛ ᴄᴀɴ ʙᴇ ᴜsᴇᴅ ʙʏ sᴇᴄᴜʀɪᴛʏ ᴘᴇʀsᴏɴɴᴇʟ ᴛᴏ ᴅᴇᴛᴇᴄᴛ ᴜɴᴀᴜᴛʜᴏʀɪᴢᴇᴅ ᴅᴇᴠɪᴄᴇs ᴏɴ ᴀ ᴄᴏᴍᴘᴀɴʏ’s ᴛᴇʟᴇᴘʜᴏɴᴇ ɴᴇᴛᴡᴏʀᴋ.
Uncategorized

DOWNLOAD TOP 10 MOST USED TOOLS IN HACKING

Uncategorized

10 Popular Books To Learn Advanced Hacking

10 Popular Books To Learn Advanced Hacking
1. Expert Metasploit Penetration Testing
2. Kali Linux 2 Assuring Security by Penetration Testing
3. Kali Linux 2: Windows Penetration Testing
4. Mastering Kali Linux Wireless Pentesting
5. Learning Python Web Penetration Testing
6. Practical Mobile Forensics
7. Learning Python for Forensics
8. Digital Forensics with Kali Linux
9. Network Analysis Using Wireshark 2
10. Building Virtual Pentesting Labs for Penetration Testing
Uncategorized

How To Trace Location Of A Person By Chatting on WhatsApp, Facebook, Instagram, Snapchat

 How To Trace Location Of A Person By Chatting on WhatsApp, Facebook, Instagram, Snapchat 
There are some different methods that you can use according to your convenience as a complex is a method, better will be the result. So read out all the methods discussed below and use any of them to check out the location of any person by chatting on social sites.
 Tracing IP Address Of Person On Facebook Chat Using Command Prompt
By using the command prompt, you can actually trace out the IP address of a person whom with you are chatting on facebook. Just 
 Follow the steps below to proceed.
1⃣ First of all, start chatting with your friend whose IP address you want to get and make sure that all other apps and background process must be stopped. Now press Win+R of your keyboard.
2⃣ Now type cmd and hit enter.
3⃣ Now at the command prompt that appears type netstat -an and hit enter.
4⃣ Now note down the IP address of a person.
5⃣ Now you need to scan that IP address to know the actual location of the person that you can check out from http://www.ip-adress.com/ip_tracer/
Uncategorized

How to protect yourself from Evil Twin Attacks

How to protect yourself from Evil Twin Attacks
1) Do not connect to public networks, everyone can smell your data while in a public network. The Twin Throw attack will be done as a public network, so restrict as much as possible the connection to all open or public networks mainly if the wifi name is the same as your wifi name
2) When the Internet connection stops working suddenly, it can be under DOS attack using a double evil attack, just restart the router and the attacker must restart the attack and it takes time. Maybe they will leave or continue at another time
3) Run a VPN to ensure that all browsing and data transmission is performed through an encrypted tunnel that can not be easily spied.
4) Do not always trust the name of the network, make sure it is a legitimate and reliable network or not.
Share and support us
For more such posts in your channel make me admin
Uncategorized

How To Encrypt Keyboard To Avoid Keyloggers

How To Encrypt Keyboard To Avoid Keyloggers
Steps :-
Step 1. First of all download and install the toolKeyScrambler.You Can Easily Get it on Google
Step 2. Now after downloading, install it and after complete installation, you have to reboot your system.
Step 3. Now when your computer boots up, right click on the icon of KeyScrambler in the system tray at the bottom of a screen.
Step 4. Now choose options from there and Keyscrambler will open
Step 5. Now you can alter settings in this according to your wish and after that simply click on ok. Now your key scrambler app is ready, open your browser and type anything you can see that your keystrokes are being encrypted.
That’s it! you are done, now you can see this tool every time you open your browser.
Uncategorized

Key loggers

Key loggers:- 
A key logger is a tool designed to record (\’log\’) every keystroke on an affected machine for 
later retrieval. Its purpose is usually to allow the user of this tool to gain access to confidential 
information typed on the affected machine, such as a user\’s password or other 
private data. Some key loggers uses virus-, trojan-, and rootkit-like methods to 
remain active and hidden. However, some key loggers are used in legitimate ways 
and 
sometimes to even enhance computer security. As an example, a business might have a 
key logger on a computer used at a point of sale and data collected by the key logger 
could be used for catching employee fraud.
Uncategorized

The Best Hacking Books To Read

The Best Hacking Books To Read 
01: Kali Linux Revealed: Mastering the Penetration Testing Distribution 
02: The Hackers Playbook 2 
 
03: The Hackers Playbook 3 
 
04: Improving your Penetration Testing Skills 
05: Tribe of Hackers Red Team 
 
06: Advanced Penetration Testing: Hacking the World\’s Most Secure Networks 
07: Hacking con Metasploit: Advanced Pentesting 
08: The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws
09: Rtfm: Red Team Field Manual  
10: Hash Crack: Password cracking manual
 
11: Hands-On Red Team Tactics:A practical guide to mastering Red Team operations
Uncategorized

CRACKING TERMS THAT EVERYONE MUST KNOW

 CRACKING TERMS THAT EVERYONE MUST KNOW
Part 1/2 This is , if you like do let me know i will make and share 2nd part 
A    
Algorithm: A series of steps specifying which actions to take in which order.
ANSI Bomb: ANSI.SYS key-remapping commands consist of cryptic-looking ext that specifies, using ANSI numeric codes to redefine keys.
B    
Back Door: Something a hacker leaves behind on a system in order to be able to get back in at a later time.
Binary: A numbering system in which there are only two possible values for each digit:
Black Hat: A hacker who performs illegal actions to do with hacking online. (Bad guy, per se)  
Blue Hat: A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.
Bot: A piece of malware that connects a computer to an attacker commonly using the HTTP or IRC protocol to await malicious instructions.
Botnet: Computers infected by worms or Trojans and taken over by hackers and brought into networks to send spam, more viruses, or launch denial of service attacks.
Buffer Overflow: A classic exploit that sends more data than a programmer expects to receive. Buffer overflows are one of the most common programming errors, and the ones most likely to slip through quality assurance testing.
C    
Cracker: A specific type of hacker who decrypts passwords or breaks software copy protection schemes.
D    
DDoS: Distributed denial of service. Flooding someone\’s connection with packets. Servers or web-hosted shells can send packets to a connection on a website usually from a booter.
Deface: A website deface is an attack on a site that changes the appearance of the site or a certain webpage on the site.
Dictionary Attack: A dictionary attack is an attack in which a cybercriminal can attempt to gain your account password. The attack uses a dictionary file, a simple list of possible passwords, and a program that fills them in. The program just fills in every single possible password on the list, until it has found the correct one. Dictionary files usually contain the most commonly used passwords.
DOX: Personal information about someone on the Internet usually contains the real name, address, phone number, SSN, credit card number, etc.
E    
Encryption: In cryptography, encryption applies mathematical operations to data in order to render it incomprehensible. The only way to read the data is applying the reverse mathematical operations. In technical speak, encryption is applied mathematical algorithms with a key that converts plaintext to ciphertext. Only someone in possession of the key can decrypt the message.
E-Whore: A person who manipulates other people to believe that he/she is a beautiful girl doing cam shows or selling sexual pictures to make money.
Exploit: A way of breaking into a system. An exploit takes advantage of a weakness in a system in order to hack it.
F    
FUD: Fully undetectable, can be used in many terms. Generally in combination with crypters, or when trying to infect someone.
G    
Grey Hat: A hacker is someone who is able to manipulate the inner workings of computers, information, and technology to work in his/her favor.
H    
Hacktivist: A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denial-of-service attacks.
I    
IP Address: On the Internet, your IP address is the unique number that others use to send you traffic.
IP Grabber: A link that grabs someone’s IP when they visit it.
K    
Keylogger: A software program that records all keystrokes on a computer’s keyboard, used as a surveillance tool or covertly as spyware.
L    
Leach: A cultural term in the warez community referring to people who download lots of stuff but never give back to the community.
Uncategorized

HOW TO ACCESS DEEP WEB – WHAT YOU NEED TO KNOW (2020)

 HOW TO ACCESS DEEP WEB – WHAT YOU NEED TO KNOW (2020) 
intro:
How to access the deep web?, (Warning: the content of this publication is purely informative, you are solely responsible for what you do with that information).
 This means that in a conventional way it is not possible to access these services which opens up a whole market of possibilities for illegal operations and any type of task that requires certain anonymity.
 
It is not as tough as you think. But, you can’t just access the deep/dark web like a normal web using a normal browser despite your need to use an anonymity software like Tor, which only accesses .Onion Links. Using Tor Browser, you can browse the deep web anonymously. But, that doesn’t enough, you need an extra protection to secure your identity on the invisible web. Because it contains dangerous links which may breach the security.
What can you find in the deep web? 
In addition you can find almost anything, an example of this are the online markets such as Silk Road; Where everything has a price, you can buy weapons, drugs, human organs and even hire a murderer.
In fact many people do not want to associate with a certain service, product or content; You can access the deep web to publish it. This is also the place where a lot of information originates; Only last year, private photos of users of the Snapchat app were leaked.
Step to access the deep web:
To access the deep web, you need to have a Tor browser on your system.
First, Download Tor.
After downloading the Tor bundle, you need to install them on your system.
Click to open the downloaded file to start the installation process.
Follow the installation guidance to complete the process.
Once you have installed Tor, open it.
Now, you can access the deep web using Tor browser.
This isn’t enough, your privacy is not completely secured. To double your security, you must have an advanced VPN service on the system that you access the deep/dark web.
 
Protective measures to enter the deep web:
Even though the deep web is a haven for hackers and other people of dubious reputation, it is necessary that you keep the protection measures to prevent the theft of your private information. These are some that you must follow.Activate your firewall.
That your operating system is updated as well as your antivirus.
Don’t trust anyone out there in the deep web.Disable your webcam to avoid being spied on.Never download anything even though it may seem harmless.Disable JavaScript and Cookies in your Tor browser.
If possible, use a VPN (Virtual Private Server) to protect your information.
It is possible to track your IP address if you try to access the Deep/Dark web sites without using our recommended VPN. Don’t land in trouble by using a free VPN too.
Before accessing the deep web we recommend using a VPN:
To protect yourself from tracking your IP address, I recommend you to run a Powerful VPN on your system before you access the deep web. If you access the site without any premium VPN, then you may land in trouble. Some may track your IP address location from which you access and catch you for accessing illegal content on the web against the Law. By using Tor + VPN, you can protect your identity and communication from state and private surveillance like whistleblowers and journalists.
Uncategorized

How To Become A Hacker ☠️

How To Become A Hacker??
Hacking is an engaging field but it is surely not easy. To become a hacker one has to have an attitude and curiosity of learning and adapting new skills. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning goes on and on.
Some people think that a hacker is always a criminal and do illegal activities but they are wrong. Actually many big companies hire hackers to protect their systems and information and are highly paid. here is the list of most important steps necessary to become a hacker, have a deeper look
Steps:
Learn UNIX/LINUX
NUNIX/LINUX is an open source operating system which provides better security to computer systems. It was first developed by AT&T in Bell labs and contributed a lot in the world of security. You should install LINUX freely available open source versions on your desktops as without learning UNIX/LINUX, it is not possible to become a hacker. .
Code in C language
C programming is the base of learning UNIX/LINUX as this operating system is coded in C programming which makes it the most powerful language as compared to other programming languages. C language was developed by Dennis Ritchie in late 1970’s. To become a hacker you should master C language.
Code in more than one Programming Language
It is important for a person in the hacking field to learn more than one programming. There are many programming languages to learn such as Python, JAVA, C++. Free eBooks, tutorials are easily available online.
Learn Networking Concepts
Another important and essential step to become a hacker is to be good at networking concepts and understanding how the networks are created. You need to know the differences between different types of networks and must have a clear understanding of TCP/IP and UDP to exploit vulnerabilities (loop holes) in system. Understanding what LAN, WAN, VPN, Firewall is also important. You must have a clear understanding and use of network tools such as Wireshark, NMAP for packet analyzing, network scanning etc.
Learn More Than One Operating Systems
It is essential for a hacker to learn more than one operating system. There are many other Operating systems apart from Windows, UNIX/LINUX etc. Every system has a loop hole, hacker needs it to exploit it.
Learn Cryptography
To become a successful hacker you need to master the art of cryptography. Encryption and Decryption are important skills in hacking. Encryption is widely done in several aspects of information system security in authentication, confidentiality and integrity of data. Information on a network is in encrypted form such as passwords. While hacking a system, these encrypted codes needs to be broken, which is called decryption.
Learn more and more about hacking
Go through various tutorials, eBooks written by experts in the field of hacking. In the field of hacking, learning is never ending because security changes every day with new updates in systems.
Experiment A Lot
After learning some concepts, sit and practice them. Setup your own lab for experimental purpose. You need a good computer system to start with as some tools may require powerful processor, RAM etc. Keep on Testing and learning until you breach a system.
Write Vulnerability (Loop hole program)
Vulnerability is the weakness, loop hole or open door through which you enter the system. Look for vulnerabilities by scanning the system, network etc. Try to write your own and exploit the system.
Continue never ending Learning
Learning is the key to success in the world of hacking. Continuous learning and practicing will make you the best hacker. Keep yourself updated about security changes and learn about new ways to exploit systems.
Join Discussions and meet hackers
Most important for a hacker is to make a community or join forums, discussions with other hackers worldwide, so that they can exchange and share their knowledge and work as a team. Join Facebook groups related to hacking where you can get more from experts.
Uncategorized

How To Hack Windows 7 (Become Admin)

How To Hack Windows 7 

(Become Admin) 
This is approved request from our group
Hello! Hackers
In this tutorial I will tell you how to hack windows 7 administrator password.
Specifically, it is used in school, computer labs or other workplaces,
where, administrator is locked with a password, while you can only use standard user or guest.
Start That PC:
#Turn on the UPS and the CPU, tap F8 continuously on the boot screen to get some windows start-up options.
#Choose \”Start windows normally\” option and turn the UPS off immediately.
#Then turn on the PC again, let it load.
#After that you will be prompted with two options in the boot screen (again), select the first option – \”Launch Start-up Repair(recommended)\”
#Let it load and Scan for issues.
#After 5 min, It will ask you to \”restore defaults\”, select \”Cancel\” option.
#Let it continue…
Wait for About 15-20 Minutes:
#After 20 min, an error report screen will pop-up, asking to send information or not.
#Ignore it, click on \”View Problem Details\” arrow, scroll down to the end of the report, then click a link stating X:\\windows\\ something…something (the link starts with an\”X\”)
#Another Window will pop-up, and will look like a notepad (it is a notepad)
#Click File on the Menu-Bar, then select Open, and another window will pop-up (that\’s just too many windows!)
#Navigate to C: drive (or whatever drive on which windows is installed), click Windows, then System32, after that click on the arrow beside the \”File Type\” option and select \”all files\”
#Then search for a file named \”sethc\”(this is the shortcut to stickey keys), rename it to something else (Eg:abc)
#Search for cmd, make its copy and rename the copy as \”sethc\”
The End:
#Close everything, restart the PC, go to the log-in screen, press shift 5 times, until a cmd (command prompt) pops-up.
#Type in \”net user administrator /active:yes\”, and this will activate the default administrator account of the PC.
#Change/delete/manage/reset passwords from there.
Or you can directly change passwords from cmd, type \”net user (admin/any admin account\’s name) and then after a space put an asterix.
Thank you ❤️
 Share and support us❗️