You All Probably Know what notepad is.......... or at least I hope you do if you are going to make effective pranks and codes.
For those of you who don't though, here is a basic breakdown of it. First to open notepad go to: Start, all programs, accessories, notepad
notepad is used for both basic and complex codes. Whether it be scripting, batch files, or even HTML if you need to.
unfortunately, I won't put anything complex like Blakis for his command prompt page but I give enough Information.
a normal start for a good script prank goes like this:
Set wshShell =wscript.CreateObject("WScript.Shell")
or simpler stuff will vary
So now you know that, Congrats......
Anyway so yeah if you want to know about scripting message Drew D for command prompt message Blakis
roflmao, thanks Andrew, this is blakis now and yeh guys just ask me anything about command prompt, I know just bout the whole system inside and out, and yeh this page is basically just a breakdown of notepad, I'm going to explain coding, examples, and what it is on this page.
OK, what notepad is, is that it is basically just a file for using commands and messages already created by a program or server. Think of it as this, Its the forge for Halo. It's pretty much just a creation of things already made. Examples are opening files, creating messages, etc.
Notepad uses very similar ways for commands and lines of script, though the lines of script dont create images or create new items, REMEMBER THAT, its not like programming where you can create complitaly new images and programs. Its just a step below that though, Its kinda like customizing presets for something.
So anyways, notepad in some cases is MUCH more expendable than Command Prompt, though Command Prompt is more powerful because of the fact that you can use files directly and not having to worry about going through the process of creating one like Notepad. So anyways, I'm going to find you guys some basic codes and systems for making stuff.
PASSWORD CRACKER 2.0 open Notepad, and type in or copy the following text
title Password Cracker 2.0
echo The Password Cracker 2.0
echo by annonymous
echo Press Enter
echo The Password Cracker 2.0
echo by annonymous
set /P username=
net user %username% =
make sure you save it as something.bat the .bat has to be at the end of the name for this to work. What this will do is you will be able to change anyones password that's on your computer
html is basically web design, It's what most professional web designers have used in the past up until now to create web-sites.
html though is somewhat hard to explain, It's very easy to look up though or look on youtube how to do it. Just type in something on google or youtube "how to use notepad to make a website" or "how to html a website with notepad" or something like that
Phishing is the gaining of knowledge of someone else's passwords and information through accounts. It is used by making a fake login page and, then their information being sent to your email. This method is illegal if it is used under the wrong circumstances, if you for example put bad and inappropriate things on that persons account, it is considered second degree vandalism. You WILL be caught if you do this. It is also a form of spyware too, again don't use this method unless you understand the consequences. I am not being held responsible for your mistakes,
Soo anyways....... lets say someone hacks your email and your upset and want to get them back and they did this through yahoo. first what you have to do is...
you must have a yahoo account in order to do this. If you do not, make one through http://mail.yahoo.com
once created sign into your account.
After you have logged in, click on "Compose" on the left hand frame.
In the to box type:
This is the command for yahoo that allows you to recover your lost and forgotten passwords.
In the subject box type:
In the body type:
Replace the VICTIM_USERNAME with the name of the persons account on yahoo who you want to hack. Replace 'YOUR_USERNAME' with the username from which you logged on and 'YOUR_PASSWORD' with your account password from which you logged on. This is needed by Yahoo! for the account authentication and it assumes that this is the details of Yahoo Staff.
You will get the password within 2 min to 2 hrs, depending on the load on the server. and there you go!!! you just got someone's username and password. I think this also works on other email supporters too such as gmail or hotmail.
There is also a Video tutorial on how to make a Phisher in the links page, I recommond it highly, and it allows you to make a Phisher for any website. Also, you can always download keyloggers and send them to people and you will get every keystroke they type. I HAVE POSTED A FREE KEYLOGGER TO THE LINKS PAGE AND IS CALLED ACTUAL KEYLOGGER. YOU NEED TO DISABLE YOUR FIREWALL WHEN YOU DOWNLOAD THIS SO IT WONT BLOCK IT, AND DONT WORRY, IF YOU HAVE ANY PROBLEMS TELL ME.
Choose and install a keylogger that best suits your needs. There are a number of programs available out there, but most of them require you to have direct access to the computer in order to install it. Once you've installed it, you will need to manually configure it in order to send you the logs. One of the more popular programs that can be installed via email is called "SpyRecon Complete," which is available at SecretView.com.
Install the program and configure it. You will need to tell the program which email you would like to have the logs sent to. To do this, launch the program and then go to "Settings" and "Report Sending." You can put in an email address and the frequency you would like to have them sent. You can also have them sent via FTP.
Attach it as an email and send it. This is the only way to get a keylogger onto a computer if you have no access to it via a network or a direct line to it via the Internet through remote control software. You can attach the program just like any other email attachment. If you're using a web-based application like Gmail, click on "Compose email" and "Attach File," then find which folder you placed the program in, double click on it and click "Open." One problem with this approach is that many spam filters will give warnings about executable files attached to an email. To get the program through the filter, you can embed the file into a document like word and then attach the document to the problem. The second problem you may encounter is that most people know not to download attachments unless they are from a trusted source. So you may have to use the keylogger to get into the email account of someone you know the recipient trusts. Label the attachment as a file that the receiver would be interested in such as "Photos" so that you are sure they will download it. Once it is downloaded, the program will automatically install itself and send you an email confirming its installation. This all takes place in the background invisibly.
Install the keylogger using remote software. This is only possible if at some point you have access to the computer that you want to monitor. If you do, then you can install software from GoToMyPC.com that will allow you to control the computer via remote through any computer connected to the Internet. Once you've installed it, you can log on to GoToMyPC.com from any computer and you will be able to control it as if you were sitting in front of it. This way, you can install a keylogger directly to it even if you are thousands of miles away.
Install the keylogger over a network. The problem with this is that you will need to have system administrator privileges or be able to get access to the user ID and password to get it. So it's possible that you can use the keylogger for this initially and then install it over the network. To do this, go to "Network," find the name of the computer that you would like to install the keylogger on and double click on it. Drag and drop the application to the desktop and install it. Again, you will need to configure the application to send the logs to an email address and you will probably want to put it in stealth mode so that the computer's user will not find it.