Hack Like an Elite: Batch Scripting for Malicious Purposes: PART 4 (Final) (Protection Using Batch)

May 24, 2015 06:36 AM
635680210007292882.jpg

Hi all, Pro Hackers/Crackers,

Let's see how we can use batch for our own Protection instead of exploiting someone with it.

And this tutorial is going to explain the same.

635680170245922235.jpg

#1 Protection, PC Security:

I will tell you how to add another level of security to your PC, instead of just the log-in screen, which is vulnerable and can be easily exploited.

Copy these two scripts below and save them as Protection.bat and Shutdown.bat respectively.

----------------------------------------------------

@echo off

echo Type the password here :

echo Time is limited (Only 10 seconds left)

echo.

echo If you don't know, switch to Guest (If there is one!)

ping localhost -n 2 > nul

echo OR Dont use the PC.

set /p pass=Password:

if %pass%==qwerty goto :Yes

if not %pass%==qwerty goto :No

:Yes

shutdown /a

exit

:No

cls

color 0a

echo Incorrect Password.

echo Time is running Out !!!

pause

goto :A

:A

cls

color 0c

echo Type the password here :

echo Time Left: 4 sec

ping localhost -n 2 > nul

echo Fast!

set /p pass=Password:

if %pass%==qwerty goto :Yes

if not %pass%==qwerty goto :Bye

:Bye

exit


--------------------------------------------------

I hope you are able to understand it easily!

---------------------------------------------------

@echo off

shutdown /s /t 10 /c "Time UP"

exit


---------------------------------------------------

635680164797555719.jpg

Copy both of these scripts to this folder/location:

C:\Users\%pf%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup

DONE!

635680165012103712.jpg

Whenever you start your PC, these scripts will be executed and you will have you put the correct password to log-in(again) (actually abort shutdown), or the system will shut-down, (Password: qwerty)

You will, only get 10 seconds to put the correct password, if you try to open a new command window, and try to type shutdown -a, it will be too late.

This CAN also be bypassed by logging into safe mode.

This makes a second layer of security.

#2 Locking Private Folders:

Let us, now make a script that locks (actually hides) our private folders.

Password: asdfgh

----------------------------------

@echo off

cls

title Folder Private

if EXIST "Locker" goto UNLOCK

if NOT EXIST Private goto MDLOCKER

:CONFIRM

echo Are you sure you want to lock the folder(Y/N)

set/p "cho=>"

if %cho%==Y goto LOCK

if %cho%==y goto LOCK

if %cho%==n goto END

if %cho%==N goto END

echo Invalid choice.

goto CONFIRM

:LOCK

ren Private "Locker"

attrib +h +s "Locker"

echo Folder locked

goto End

:UNLOCK

echo Enter password to unlock folder

set/p "pass=>"

if NOT %pass%==asdfgh goto FAIL

attrib -h -s "Locker"

ren "Locker" Private

echo Folder Unlocked successfully

goto End

:FAIL

echo Invalid password

goto end

:MDLOCKER

md Private

echo Private created successfully

goto End

:End


---------------------------------------

Cause:Makes a folder, which is important to the system, and hides it accordingly (Simple Words)

Solution:Go to Control panel, search for folder options, and uncheck the Hide Protected Operating System Files...

635680165754423920.jpg

Meanings:It is an easy to understand script, but a little twisted.

1)if EXIST "Locker" goto UNLOCK: It means, if there is a folder named Locker then go to (the location) :UNLOCK

2)if NOT EXIST Private goto MDLOCKER: If a folder named Private does not exist then go to MDLOCKER.

3)Important Note: And if the both of the statements above are incorrect then the script moves to the next line i.e. :CONFIRM

4)ren: It means rename Private to Locker or vice-versa.

5)attrib +h +s: Means, to add these attributes (of h=hidden, s=system folder) to a folder.

6)attrib -h -s: Means, to subtract/Remove these attributes from the folder.

Output:

635680167946042992.jpg
635680168061520804.jpg
635680168170591832.jpg
635680167946042992.jpg
635680168061520804.jpg
635680168170591832.jpg

#3 Keeping a Check on Your Ports:

Let's make a script that checks if the port is open/closed and if any connection service has been established on it.

--------------------------

@echo off

netstat -o -n -a | findstr 4444

if %ERRORLEVEL% equ 0 (@echo "port available") ELSE (@echo "port unavailable")

pause

---------------------------

Meanings:

1)netstat -o -n -a: Displays all connections and listening ports (-a), Displays addresses and port numbers in numerical form (-n), Displays the owning process ID associated with each connection (-o).

2)| findstr 4444: It filters any output, except the one which contain :4444

3)%ERRORLEVEL%: It is used to tell about the error level, if the port is in use, and is open. (or not) (in this case)

Output:

I am being HACKED!!!

635680195734243149.jpg

I am not being hacked:

635680196191005961.jpg

The E.N.D.

This was the final Part about Batch Scripting, however, you have a lot more to learn, keep, the Spirit Up, Elites!

Good-Bye for now,

And remember to keep coming back!

Thank You,

F.3.A.R.

Comments

No Comments Exist

Be the first, drop a comment!