Not only does this reduces file size, but it also makes viewing and modifying resources marginally more difficult. Some executable files are "packed" or "compressed" using compression algorithms. Command-line instructions and Resource Hacker™ scripts can remove the drudgery entailed with repeating Resource Hacker™ tasks. Just about all the functionality of Resource Hacker™ can be accessed from the command line without having to open the Resource Hacker™ GUI. (I see no benefit in duplicating what third-party image editors do so well.) Binary resources, usually images, can't be edited directly with the app, but they can still be very easily exported and imported once they've been modified by an external image editor. Once a resource file has been opened, its resources will generally be displayed as either an image (or group of images) or as decompiled text. While Resource Hacker™ is primarily a GUI application, it also provides many options for compiling and decompiling resources from the command-line.Ĭompiling can be initiated either by opening an existing resource script file or by creating one from scratch using Resource Hacker's editor. It's both a resource compiler (for *.rc files), and a decompiler - enabling viewing and editing of resources in executables (*.exe *.dll *.scr etc) and compiled resource libraries (*.res, *.mui). If you have found any command other than those listed above, kindly note them in the comments for our other readers.Resource Hacker is a resource editor for 32bit and 64bit Windows PC applications. This command is very useful in finding what a particular command does, especially if you are a newbie. ![]() ![]() Please note that this command will only work if the target PC/laptop has not set an Administrator Password.Īnd last but not least, the “help” command. (this will create a virtual drive on your “my computer” folder) Now if you want to connect to the target and browse the entire C drive, then use this command: (this command will allow you to connect to the target as administrator) Net use \ipaddressipc$ “” /user:administrator Users just need to enter tasklist on CMD and they will see the list of all running process.įor eg If you want to kill PID 1532 process then you can enter the command-īONUS: Some additional CMD commands which will help you in hacking. This command opens up an entire task manager on the command prompt. This command displays the whole list of resources, computers or domains that are shared by the specified computer. This command reset Windows User Password without Knowing Old Password.Ĭhange yourusername with your PC user name and press Enter. Net view x.x.x.x or computername (will list the available sharing folders on the target box) Netstat -an (this will combined both of the above) Netstat -n (this will show you all the open connection with IP addresses) Netstat -a (this will show you all the listening ports and connection with DNS names) This command will show you connection stats Ipconfig /renew (this will renew your iP) Ipconfig /release (this will release your IP) This command will give all that info but for all networks, you might have it.Īlso, in case you have a dynamic IP and want to change it, then type… This command will show you a lot of useful things like your IP, Gateway, DNS in use, etc. This command will show you the routing table, gateway, interface and metric. ![]() You can find out if anyone has done arp poisoning in your LAN using this command. This command will show you the arp table. Tracert (is the website you don’t know the IP) This command is really helpful if you know the route a packet takes before it goes to the target box.Ĭode: tracert x.x.x.x (x is the IP address) This command will give you the hops that a packet will travel to reach its final destination. You can check the tutorial here for sending a spoofed email. Simple, isn’t it? You can send a spoofed email to your friends using the IP address of the mail server. You can use whatever server you want and if it is listed on DNS, then you get the IP. This command will give you the mail server IP of.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |