Running administrative tools from cmd. Command line cmd, feel like a hacker

Running administrative tools from cmd.  Command line cmd, feel like a hacker
Running administrative tools from cmd. Command line cmd, feel like a hacker

After scoring more points in the 33-hour hacking competition than the combined teams in second and third place - PPP from the USA and Dragon Sector from Poland.

Final scoreboard

The 0CTF final was held according to the rules of Attack-Defense: teams of security specialists got at their disposal the same set of servers with network services specially written for the game, which the participants protect at home and hack from their opponents. Twelve teams arrived from America, Europe and Asia - the best among the nine hundred world teams participating in the qualifying round.

In the final, each team managed six services on different platforms: Ubuntu 14.04, Windows 10, CGC (this is an extremely simplified Linux model for the Cyber ​​Grand Challenge - an event where automatic vulnerability search systems will compete). In each service, the team is looking for errors that allow access to information protected by the opponent - the flag. The team urgently closes such bugs at home and begins to exploit rivals. Each successful attack increases the rating of the team, and the victim, whose service is hacked, on the contrary, loses points. The more vulnerabilities you find and the longer your opponents cannot patch, the more secret flags you will have time to pull off.

A little about Cyber ​​Grand Challenge

The US Defense Research Agency (DARPA) announced the event in 2013, and over the course of three years, seven automatic vulnerability search systems that analyze compiled programs, generate exploits and patch binaries on the fly have reached the final. The purpose of the event is to explore the possibilities of algorithms for finding bugs without human intervention, so the environment for running vulnerable programs was simplified as much as possible: everything is in one stream, only data transfer over the network and working with memory is available, NX and ASLR protection is disabled.

The CGC Finals will take place this summer, with the car winner going head-to-head against human teams in the main event of the season, DEF CON CTF 2016.

The sixth service, called "polaray", was different from the others: it was launched not at the participants, but on the organizers' computer and worked on the principle of the old Core Wars game. Teams upload their pieces of machine code to the jury server, and it conducts fights between the programs of different teams. The goal of each algorithm is to remain the only program in memory by finding and overwriting the code of another program until it has time to do the same in response.


Day 2 kicks off: LC↯BC code wins first in Core Wars

The guys from LC↯BC, consisting of six people, were able to hack all the services prepared by the organizers, finding a dozen different bugs in some of them. Thanks to well-coordinated actions and pre-prepared developments, the team from Russia took the first line of the rating on the first day and gradually increased its advantage until the very end of the competition.


LC↯BC hold the lead and finish with almost a double lead

0CTF has a prestigious status this year DEF CON Qualifier Event- victory in the competition, in addition to a cash prize of 40,000 yuan (about 400,000 rubles), brought the Russian team a ticket to the finals of DEF CON CTF 2016, the oldest hacker competition, where, according to the results of the selection, the world's top teams gather to fight in the "season finals" ".

The DEF CON hacker conference, like every year, will be held in August at the venue in Las Vegas, USA.

When working on Windows all the time, you need to pay due attention to quick ways to access various tools in order to get what you need and complete tasks most quickly.

Below you will find a list of commands that launch the most popular tools that you may find useful in your daily work on the computer.

appwiz.cpl - Uninstall programs
calc - Calculator
charmap - Character Map
chkdsk - Utility to check disks
cleanmgr - Disk cleanup utility
cmd - Command Prompt
compmgmt.msc - Computer Management
control - Control panel
control admintools - Administration
control desktop - Screen settings / Personalization
control folders - Folder properties
control fonts - Fonts
control keyboard - Keyboard properties
controlmouse - Mouse properties
control printers - Devices and printers
control schedtasks - Task Scheduler
desk.cpl - Screen resolution
devmgmt.msc - Device Manager
dfrgui - Disk Defragmenter
diskmgmt.msc - Disk Management
dxdiag - DirectX Diagnostic Tools
eventvwr.msc - Event Viewer
explorer - Windows Explorer
firefox - Firefox browser
firewall.cpl - Windows Firewall
iexplore - Internet Explorer Browser
inetcpl.cpl - Internet Explorer Properties
logoff - Log out of a Windows user account
magnify - Loupe (magnifying glass)
main.cpl - Mouse Properties
migwiz - Windows Easy Transfer
mmsys.cpl - Sound settings
mrt - Malicious Software Removal Tool
msconfig - System Configuration
msinfo32 - System Information
mspaint - Graphic editor Paint
ncpa.cpl - Network connections
notepad
osk - On-Screen Keyboard
perfmon - System Monitor
powercfg.cpl - Power Options
prs - Troubleshooting Action Recorder
regedit - Registry editor
rrr - Reg Organizer Quick Start
shutdown - Shutdown Windows
sysdm.cpl - System Properties
syskey - Windows account database protection
taskmgr - Task Manager
timedate.cpl - Set date and time
utilman - Ease of Access Center
verifier - Driver verification manager
wab - Windows Address Book
winver - Windows Version
wmplayer - Windows Media Player
write - Wordpad Editor
wscui.cpl - Help Center

Extensions - what are they?



Dangerous file extensions

Programs



.COM - programs for MS-DOS.




.SCR - screensaver file.











office macros

An experienced user can be distinguished from a beginner by one very clear sign - knowledge of file extensions. The former can easily tell what this or that file is - a picture, a program, and which one is better not to open without checking with an antivirus. The latter do not understand at all what it is about and how these extensions actually look. This article will provide you with the necessary minimum knowledge that you will need in order to work safely on a computer.

Extensions - what are they?

Wikipedia defines this concept as a sequence of characters that are added to a filename and used to identify its format. This is the most common way to determine the type of data stored in a file.
File display is disabled by default in Windows. Most likely, the developers thus tried to protect users from unnecessary information. But as a result, a huge number of people have appeared who are guided by the names of files and open everything.
Through the Control Panel, you can enable a feature that will display file extensions. Open Folder Options. In the "View" tab, uncheck the "Hide extensions for known file types" option.

Dangerous file extensions

A good antivirus program can keep your work safe. However, even an ideal antivirus may not have time to bring the infection into its filters or make a mistake. Therefore, your head, which has the necessary knowledge, should become an additional factor of protection.
If you received a file by email from a stranger, pay attention to its extension. If you find it in the list below, without opening it, send it to be scanned by an antivirus program.

Programs

EXE is a program file. Most of the programs in Windows have just such an extension.
.PIF is a special file that contains information for DOS programs. They don't contain executable code, but they can be dangerous.
.COM - programs for MS-DOS.
.APPLICATION is an application installer that supports ClickOnce technology from Microsoft.
.HTA is a web application. Can be dangerous, unlike html type applications running in your browser.
.MSC is a Microsoft Management Console file.
.GADGET is a service for displaying on the desktop in Windows Vista and 7.
.SCR - screensaver file.
.MSI - starts the process of installing a program on your computer.
.MSP - updates for already installed programs.
.CPL - All items in the control panel have this extension.
.JAR - executable code for the Java environment.

CMD is a batch file of type .BAT, but this file extension was introduced in Windows NT
.BAT is a batch file that was previously used by MS-DOS. It contains a series of sequential commands for your computer.
.VB, .VBS, .VBE - VBScript file. It will execute its VBScript code at startup.
.WS, .WSF, .WSC, .WSH are Windows Script files.
.PS1, .PS1XML, .PS2, .PS2XML, .PSC1, .PSC2 - command script for Windows PowerShell.
.JS, .JSE - JavaScript file. When working in a browser and used on web pages, it is relatively safe. But, if Windows opens these files outside of the browser, it can be dangerous.
.MSH, .MSH1, .MSH2, .MSHXML, .MSH1XML, .MSH2XML - shell script for Monad. Monad was later renamed to PowerShell.

LNK - ensures the launch of the program. May contain command line attributes that are dangerous because they can delete files without permission.
.INF is a text file designed to be automatically launched from external media. Often used for files copied from flash drives or disks.
.SCF is a Windows Explorer file. May contain potentially dangerous commands.

REG is a Windows registry file where you can find a list of entries that will be added or removed at startup. The danger is that you may lose important information from the registry or enter unwanted or dangerous data into it.

office macros

DOCM, .DOTM, .XLSM, .XLTM, .XLAM, .PPTM, .POTM, .PPAM, .PPSM, .SLDM are new office file extensions introduced in Office 2007. The "M" at the end of the extension indicates that the document contains macros.
.DOC, .XLS, .PPT - Microsoft Word, Excel, PowerPoint documents. They may contain malicious macro code.

It is advisable to remember all this information, but you can print it and hang it in a conspicuous place. Or save the link and use it as needed. Share this information with all users

Microsoft on Saturday withdrew the Windows RT 8.1 update for Surface RT internet tablets. According to Microsoft, the recall is due to the fact that some users of these tablets reported problems with the update, more precisely, the impossibility of installing it on the tablet in the normal mode.

In particular, some tablet owners claim that their gadgets have stopped turning on due to damage to the files necessary to boot Windows, writes The Verge. To restore work, users need to use a special utility.

xxx: Users need to use a special boot floppy to recover.

How to control a computer without a mouse? To do this, you can launch the Windows cmd command line using the win + r key combination and then type cmd in the console that appears and press Enter.

A command line window has opened. Through it, you can turn off the computer, create/delete folders, set the schedule for launching programs, make programs system, change file extensions, start and stop applications, and much more.

If you want a number of cmd commands to be executed automatically on your computer, you can write them down in notepad and save them with the .bat extension

An example of a simple program:
@echo off
color 0a
chcp 1251
echo Reboot the computer
pause
shutdown /r

This program restarts the computer and requires you to press any key to do this. To stop the execution of the program, you just need to close the window that appears.

Such bat files (batch files) are often used to write computer viruses, which, by the way, are not noticed by antivirus programs (in most cases). And for secrecy, they are transferred to the .exe format.

You can read more about cmd commands below. (or you can just write help on the command line)

A
append - allows programs to open files in the specified directories as if they were in the current directory.

arp - display and change tables for converting IP addresses into physical ones used by the address resolution protocol.

assoc - display or change associations for file name extensions.

at - the command is designed to run programs at a specified time.

atmsdm - Monitor connections and addresses registered by the ATM call manager on ATM networks.

attrib - change the attributes of files and folders.

auditusr - sets the user audit policy.

B
break - enable CTRL+C key processing mode.

bootcfg - This command line program can be used to configure, extract, modify or remove command line options in the Boot.ini file.

C
cacls - view changes to file ACL access control tables.

call - call one batch file from another.

cd - display the name or change the current folder.

chcp - display or change the active code page.

chdir - display or change the current folder.

chkdsk - disk check and report output.

chkntfs - Displays or changes disk check options at boot time.

ciddaemon is a file indexing service.

cipher is a file encryption program.

cls - clear the interpreter screen.

cmd - launches a new command prompt window.

cmstp - install connection manager profiles.

color - sets the color for text and background in text boxes.

comp - compare the contents of two files or sets of files.

compact - view and change file compression settings on NTFS partitions.

convert - convert the file system of a FAT volume to NTFS.

copy - copy one or more files.

D
date - display or set the current date.

debug - a tool for debugging and editing programs.

defrag - disk defragmentation.

del - delete one or more files.

devcon is an alternative to device manager.

diantz is the same as MAKECAB.

dir - list files and subfolders from the specified directory.

diskcomp - Compare the contents of two floppy disks.

diskcopy - copy the contents of one floppy disk to another.

diskpart - using the diskpart script.

diskperf - disk performance counter.

doskey - editing and recalling Windows commands; creating DOSKey macros.

driverquery - View a list of installed device drivers and their properties.

E
echo - output messages and switch the mode of displaying commands on the screen.

edit - launches the MS-DOS editor.

endlocal - end localization of environment changes in a batch file.

edlin - launches a line-by-line text editor.

erase - delete one or more files.

esentutl is a maintenance utility for Microsoft(R) Windows databases.

eventcreate - This command allows the administrator to create a special event entry in the specified event log.

eventtriggers - This command allows the administrator to display and configure event triggers on the local or remote system.

exe2bin - Convert EXE files to binary format.

exit - command line termination.

expand - uncompress compressed files.

F
fc - Compare two files or two sets of files and print the differences between them.

find - search for a text string in one or more files.

findstr - search for strings in files.

finger - display information about users of the specified system.

fltmc - work with driver load filter.

for - executes the specified command for each set file.

forcedos - Matches MS-DOS applications that are not recognized by Microsoft Windows XP.

format - disk formatting for working with Windows.

fontview is a font viewer.

fsutil - Manage reparse points, manage sparse files, unmount a volume, or expand a volume.

ftp is a file transfer program.

ftype - View and change file types associated with a file name extension.

G
getmac - Displays the MAC address of one or more of the computer's network adapters.

goto - Transfer control to the line containing the label in a batch file.

gpresult - Displays the resulting policy (RSoP) for the specified user and computer.

gpupdate - Perform group policy updates.

graftabl - selection of a code page for displaying symbols of national alphabets in graphics mode.

H
help - displays an incomplete list of commands that are used in cmd.

hostname - displays the computer name.

I
if is an operator to conditionally execute commands in a batch file.

ipconfig - Display subnet mask, default gateway and information about your IP.

ipxroute is the NWLink IPX routing manager.

L
label - Create, modify, and delete volume labels for a disk.

lodctr - update counter names and explanatory text for extended counter.

logman - Schedule management for performance counters and event trace log.

logoff - End a Windows session.

lpq - display the queue status of the remote print queue lpq.

lpr - Sends a print job to a network printer.

lsass - local security definition server.

M
makecab - archiving files into a cab-archive.

md - create a folder.

mem - displays information about used and free memory.

mkdir - create a folder with extended functionality.

mmc - open an MMC console window.

mode - debug system devices.

mofcomp - 32-bit Microsoft(R) MOF compiler.

more - sequential output of data in parts of one screen.

mountvol - View, create and remove volume mount points.

move - move and rename files and directories.

mqbkup is a utility for archiving and restoring a message queue.

mqsvc - Provides the infrastructure for running distributed applications.

msg - send messages to the user.

msiexec - Runs the Windows Installer.

N
nbtstat - Displays protocol statistics and current TCP/IP connections using NBT (NetBIOS over TCP/IP).

net - a package of applications designed to work with the network.

net1 is the same as net.

netsh - local or remote display and change steam

Sometimes we are faced with the fact that some important files on the flash drive are no longer available to us. This happens for various reasons: we could accidentally delete them or format the flash drive, a virus could get on the media. A power surge, incorrect removal of the media from the port, or mechanical damage could make the data inaccessible. How to recover data from a flash drive?

First of all, don't panic. If you yourself accidentally deleted files - do not rush to format, it will be much more difficult to recover data from a flash drive. If you did format the media, do not overwrite any new files, this can also complicate recovery.

But what if you did nothing, but the files still became inaccessible? In such cases, when you try to connect a removable drive or work with files and folders from the drive (open or copy them), system error messages occur when reading the drive. If you go to the properties of a removable disk, you will see that the disk capacity, the amount of free and used space, and the file system are not correctly determined.

To recover data from a USB flash drive, first of all, try restarting your computer - you definitely won't make it worse, but it can help. If the flash drive is still not readable, unplug it (only correctly, via "safely remove hardware"), and then plug it back in. If this does not help, check the removable disk. To check the file system of the flash drive, you need to open "My Computer". Right-click on the flash drive (removable disk) icon. A context menu will open, select "Properties" in it. A dialog box will open, in it you need to open the "Tools" tab and click on the "Run a check ..." button. In the dialog box that opens, check the boxes "Automatically fix system errors" and "Scan for and repair bad sectors". Then click the "Start" button and wait for the test to finish.

If these simple methods did not help, you will have to use special programs to recover data from a flash drive. Such programs operate on two main principles. The first type of programs collects information about the file system of a flash drive and builds a hierarchical structure of files and folders. Programs of the second type find file headers and their contents, but do not restore the folder structure and file names. The choice of a program of one type or another depends on the specific situation.

The following programs can be called as examples of programs for recovering data from a USB flash drive in Windows.

Recovery Toolbox for Flash is designed to recover data from flash drives and can work with memory cards and USB drives. It only supports the FAT file system. The program is paid, but using the demo version, you can scan the disk and recover 5 files.

The free PC Inspector File Recovery utility recovers data in FAT and NTFS file systems, but NTFS is much less supported. It is possible to recover files with original time and date of their creation.

Another free program, SuperCopy is quite simple. It allows you to copy data from damaged media by replacing bad sectors with a sequence of zeros. Such copying does not take much time.

Recuva recovers files accidentally deleted by the user or as a result of a software failure. It allows you to search for files by name or extension and works with different types of files.

Unstoppable Copier copies and moves files from damaged media, trying to copy the maximum amount of data. It prevents disk corruption if copying fails.

Undelete Plus supports all file systems and can also recover data from memory cards. This program is also free.

You may also need programs for recovering data from a hard drive: many of them can work with other media, including USB flash drives.

Unfortunately, most media recovery programs are shareware. This means that you can download a free demo version of the program, but its functionality will be significantly reduced (you will not be able to recover more than a certain number of files, or the maximum size of a recoverable file will be limited).

To recover data from a USB flash drive in Linux, you can use the following utilities:
Foremost
scalpel
The Sleuth Kit
Magicrescue
NtfsUnDelete
photorec
RecoverJpeg
NtfsUnDelete and The Sleuth Kit are used to recover data on an unformatted flash drive with a saved file system. NtfsUnDelete is used for devices with the NTFS file system, The Sleuth Kit for other file systems. Foremost is suitable for formatted media or in case of partition damage.

When recovering data from a flash drive, be sure to save it to another medium. Of course, you need to be extremely careful when recovering files from media yourself, but in especially emergency cases, it is quite possible to avoid contacting specialists and successfully recover data from a flash drive.

It's no secret that the OS reserves a significant part of your PC's resources for its own needs. Today we are talking about Windows services, a significant part of which is running in vain. For example, in Windows Vista there are 122 of which about 25-35 are not needed. Fortunately, the “seven” can only envy this figure. In general, as you already understood, today we will talk about how to dump unnecessary ballast.

Below is a list of services that it is desirable to disable in Windows 7 and I recommend disabling them because in most cases they are not needed and simply bite off system resources, and I will also tell you how to do it for you. Let's start.

Services to disable:
Windows Card Space
Windows Search (loads your HDD)
Offline Files
Network Access Protection Agent
Adaptive brightness control
Windows Backup
IP Helper Service
Secondary login
Grouping network members
Remote Access Automatic Connection Manager
Print Manager (if there are no printers)
Remote Access Connection Manager (if no VPN is available)
Network Member Identity Manager
Performance Logs and Alerts
Windows Defender (if there is an antivirus, feel free to turn it off)
Secure storage
Configuring a Remote Desktop Server
Smart Card Deletion Policy
Shadow Copy Software Provider (Microsoft)
Homegroup listener
Windows Event Collector
Network logon
Tablet PC Input Service
Windows Image Download Service (WIA) (if there is no scanner or camera)
Windows Media Center Scheduler Service
smart card
Volume Shadow Copy
Diagnostic System Assembly
Diagnostic Service Host
Fax
Performance counter library host
Security Center
Windows Update (so that the key does not fly off Windows)

Here are the services that were tested, and the test showed that the OS could well work without them.

For those who care about the System Restore service, I strongly recommend not to disable:
Volume Shadow Copy
Shadow Copy Software Provider (Microsoft).

Otherwise, recovery and creation of checkpoints will not work.
How to disable services to optimize the system:

Start - Control Panel - Administrative Tools - Services.
Or:
Start - in the search bar we write "Services"
We find the service in the list, double-click on it with the left mouse button. If it is running, click on the "Stop" button, and then select "Startup type" - "Disabled". By the way, you can read the hints in the same place near the service management menu. So we do with all the services listed above.

Such small optimization saves valuable resources. After all, services also consume them, and some are quite plentiful. And do not say that Windows 7 is already fast - for me it’s like that, there is never enough performance. Try it, keep it up! All in your hands.

From habr:
The new mouse allows you to feel the "weight" and size of files.
The larger the file or folder size, the more the mouse resists movement. In addition, the mouse also trembles, depending on how often the file is used.

Files dangerous for the computer.

Extensions - what are they?



Dangerous file extensions

Programs



.COM - programs for MS-DOS.




.SCR - screensaver file.











office macros


calc - Calculator
charmap - Character Map


cmd - Command Prompt

control - Control panel



control fonts - Fonts

controlmouse - Mouse properties


desk.cpl - Screen resolution





explorer - Windows Explorer
firefox - Firefox browser





main.cpl - Mouse Properties

mmsys.cpl - Sound settings


msinfo32 - System Information


notepad
osk - On-Screen Keyboard
perfmon - System Monitor
powercfg.cpl - Power Options

regedit - Registry editor


sysdm.cpl - System Properties

taskmgr - Task Manager



wab - Windows Address Book
winver - Windows Version

write - Wordpad Editor
wscui.cpl - Help Center

56 Commands Every Windows User Should Know

When working on Windows all the time, you need to pay due attention to quick ways to access various tools in order to get what you need and complete tasks most quickly.

Below you will find a list of commands that launch the most popular tools that you may find useful in your daily work on the computer.

appwiz.cpl - Uninstall programs
calc - Calculator
charmap - Character Map
chkdsk - Utility to check disks
cleanmgr - Disk cleanup utility
cmd - Command Prompt
compmgmt.msc - Computer Management
control - Control panel
control admintools - Administration
control desktop - Screen settings / Personalization
control folders - Folder properties
control fonts - Fonts
control keyboard - Keyboard properties
controlmouse - Mouse properties
control printers - Devices and printers
control schedtasks - Task Scheduler
desk.cpl - Screen resolution
devmgmt.msc - Device Manager
dfrgui - Disk Defragmenter
diskmgmt.msc - Disk Management
dxdiag - DirectX Diagnostic Tools
eventvwr.msc - Event Viewer
explorer - Windows Explorer
firefox - Firefox browser
firewall.cpl - Windows Firewall
iexplore - Internet Explorer Browser
inetcpl.cpl - Internet Explorer Properties
logoff - Log out of a Windows user account
magnify - Loupe (magnifying glass)
main.cpl - Mouse Properties
migwiz - Windows Easy Transfer
mmsys.cpl - Sound settings
mrt - Malicious Software Removal Tool
msconfig - System Configuration
msinfo32 - System Information
mspaint - Graphic editor Paint
ncpa.cpl - Network connections
notepad
osk - On-Screen Keyboard
perfmon - System Monitor
powercfg.cpl - Power Options
prs - Troubleshooting Action Recorder
regedit - Registry editor
rrr - Reg Organizer Quick Start
shutdown - Shutdown Windows
sysdm.cpl - System Properties
syskey - Windows account database protection
taskmgr - Task Manager
timedate.cpl - Set date and time
utilman - Ease of Access Center
verifier - Driver verification manager
wab - Windows Address Book
winver - Windows Version
wmplayer - Windows Media Player
write - Wordpad Editor
wscui.cpl - Help Center

Cloud Mail.Ru, an online data storage service, began scanning all downloaded files for viruses. In addition to the new data, the service checked for security all the files downloaded since the launch of Cloud Mail.Ru. If an unsafe document is detected, the service will not allow you to download it or create a link to it.

Files dangerous for the computer.

An experienced user can be distinguished from a beginner by one very clear sign - knowledge of file extensions. The former can easily tell what this or that file is - a picture, a program, and which one is better not to open without checking with an antivirus. The latter do not understand at all what it is about and how these extensions actually look. This article will provide you with the necessary minimum knowledge that you will need in order to work safely on a computer.

Extensions - what are they?

Wikipedia defines this concept as a sequence of characters that are added to a filename and used to identify its format. This is the most common way to determine the type of data stored in a file.
File display is disabled by default in Windows. Most likely, the developers thus tried to protect users from unnecessary information. But as a result, a huge number of people have appeared who are guided by the names of files and open everything.
Through the Control Panel, you can enable a feature that will display file extensions. Open Folder Options. In the "View" tab, uncheck the "Hide extensions for known file types" option.

Dangerous file extensions

A good antivirus program can keep your work safe. However, even an ideal antivirus may not have time to bring the infection into its filters or make a mistake. Therefore, your head, which has the necessary knowledge, should become an additional factor of protection.
If you received a file by email from a stranger, pay attention to its extension. If you find it in the list below, without opening it, send it to be scanned by an antivirus program.

Programs

EXE is a program file. Most of the programs in Windows have just such an extension.
.PIF is a special file that contains information for DOS programs. They don't contain executable code, but they can be dangerous.
.COM - programs for MS-DOS.
.APPLICATION is an application installer that supports ClickOnce technology from Microsoft.
.HTA is a web application. Can be dangerous, unlike html type applications running in your browser.
.MSC is a Microsoft Management Console file.
.GADGET is a service for displaying on the desktop in Windows Vista and 7.
.SCR - screensaver file.
.MSI - starts the process of installing a program on your computer.
.MSP - updates for already installed programs.
.CPL - All items in the control panel have this extension.
.JAR - executable code for the Java environment.

CMD is a batch file of type .BAT, but this file extension was introduced in Windows NT
.BAT is a batch file that was previously used by MS-DOS. It contains a series of sequential commands for your computer.
.VB, .VBS, .VBE - VBScript file. It will execute its VBScript code at startup.
.WS, .WSF, .WSC, .WSH are Windows Script files.
.PS1, .PS1XML, .PS2, .PS2XML, .PSC1, .PSC2 - command script for Windows PowerShell.
.JS, .JSE - JavaScript file. When working in a browser and used on web pages, it is relatively safe. But, if Windows opens these files outside of the browser, it can be dangerous.
.MSH, .MSH1, .MSH2, .MSHXML, .MSH1XML, .MSH2XML - shell script for Monad. Monad was later renamed to PowerShell.

LNK - ensures the launch of the program. May contain command line attributes that are dangerous because they can delete files without permission.
.INF is a text file designed to be automatically launched from external media. Often used for files copied from flash drives or disks.
.SCF is a Windows Explorer file. May contain potentially dangerous commands.

REG is a Windows registry file where you can find a list of entries that will be added or removed at startup. The danger is that you may lose important information from the registry or enter unwanted or dangerous data into it.

office macros

DOCM, .DOTM, .XLSM, .XLTM, .XLAM, .PPTM, .POTM, .PPAM, .PPSM, .SLDM are new office file extensions introduced in Office 2007. The "M" at the end of the extension indicates that the document contains macros.
.DOC, .XLS, .PPT - Microsoft Word, Excel, PowerPoint documents. They may contain malicious macro code.

It is advisable to remember all this information, but you can print it and hang it in a conspicuous place. Or save the link and use it as needed. Share this information with all users

F1

F2



Entering CMOS/BIOS settings.

F3


F4
Open the search window.


F5




F6

F7

F8

Delete in Total Commander.

F9

F10
Calls up the program menu.

F11


F12




Firebug opening.

7 useful secrets in Windows 7

1. By adjusting the ClearType text, you can achieve better text display quality on your monitor. Windows 7's ClearType Font Customizer is already built in! In order to open the CleatType configuration tool in Windows 7, click start and type "cleartype" in the search field, then press the enter key. Then follow the tips and tricks of the ClearType setup wizard.

2. In the Windows 7 operating system, the items in the start menu work as shortcuts, which means that when you click on the “control panel” link, for example, the control panel window will open. But you can do it in a more convenient way! Click on the "start" button with the right mouse button, in the settings window, click the "customize" button, then find the "control panel" in the list and select the display method - display as a menu, as a result of which a list of all panel utilities will be displayed in the "start" menu controls, which greatly speeds up access to them!

3. Hold down the Shift key in Explorer or on the Windows 7 desktop, right-click on the file and some additional functions will appear in the context menu.

4. When you right-click on a running program in the Windows 7 taskbar while holding down the Shift key, the menu used in previous versions of Windows will open instead of Jump List, which is used in Windows 7.

5. Windows 7 operating system supports batch file renaming. In order to implement this, select a group of files in the explorer and press the F2 key, then give a name to the first file, and the entire group of files will be named with this name + the serial number of the file in parenthesis.

6. For Windows 7 users who have two monitors installed, they can use very useful keyboard shortcuts: Windows + Shift + Left Arrow and Windows + Shift + Right Arrow, with these keyboard shortcuts you can move from one monitor to another active window.

7. In the Windows 7 operating system, it is possible to make different volumes for different running programs in the system. For example, you are running the Opera browser in which a tab is open with some kind of Flash animation accompanied by sound, you also have Windows Media Player and WinAmp open, by clicking on the “speakers” button in the system tray and clicking on the “mixer” link, you are from one Windows can adjust the volume of Oper's Windows Media Player and WinAmp, as well as the volume of system sounds and the overall volume of the speakers.

A list of the main meanings of the F1-F12 function keys in the Windows operating system.

F1
Almost always, this key performs the function of calling the Help window.
Entering the CMOS/BIOS settings (when the computer boots).

"Windows F1" will open the "Help and Support" window.
In some cases, it opens the Taskbar.

F2
Typically used to rename a selected file, folder, or shortcut.
"Alt Ctrl F2" opens the "Open Document" window, for example in Microsoft Word.
"Ctrl F2" displays the preview window in Word.
Entering CMOS/BIOS settings.

F3
Usually opens the possibility of searching in programs.
In MS-DOS or at the Windows command line, the F3 key will repeat the last command.
In Microsoft Word, the "Shift F3" key combination will change case from upper to lower or the first letters in each word.

F4
Open the search window.
Redo last action (Word).
"Alt F4" will close the active program.
"Ctrl F4" will close open windows within the current active window.

F5
In all modern Internet browsers, it will refresh the site page or document window.
Opens a Find and Replace window, such as in Word.
Inserts the time and date in the Notepad text editor.
Starting a slideshow in PowerPoint.
Copying in Total Commander.

F6
Put the cursor in the address bar in IE, Chrome and Mozilla Firefox browsers.
Moving files in Total Commander.

F7
Checking spelling grammar in Word.
Creating a folder in Total Commander.

F8
Highlights the address bar in the Opera browser.
Delete in Total Commander.

F9
Opens the measurement toolbar in Quark 5.0.

F10
Calls up the program menu.
Switching to a hidden recovery partition on SONY and HP computers.

F11
Enable full screen mode in all modern browsers.
Hidden recovery partition on EMACHINES, Gateway and Lenovo computers
Enabling a Hidden Recovery Partition on Many Dell PCs.

F12
Opening the Save window (Word).
"Shift F12" - saves the Word document.
"Ctrl Shift F12" - printing a Word document.
Page preview in Microsoft Expression Web.
Firebug opening.
Quick settings in the Opera browser.

"Yandex.Disk" provided users of its application with an additional 200 gigabytes of space. They became compensation for a bug identified in one of the versions of Drive for Windows. The error was in the uninstaller; because of it, when the program was uninstalled, Windows system files could be erased.

Command line cmd.

How to control a computer without a mouse? To do this, you can launch the Windows cmd command line using the win + r key combination and then type cmd in the console that appears and press Enter.

A command line window has opened. Through it, you can turn off the computer, create/delete folders, set the schedule for launching programs, make programs system, change file extensions, start and stop applications, and much more.

If you want a number of cmd commands to be executed automatically on your computer, you can write them down in notepad and save them with the .bat extension

An example of a simple program:
@echo off
color 0a
chcp 1251
echo Reboot the computer
pause
shutdown /r

This program restarts the computer and requires you to press any key to do this. To stop the execution of the program, you just need to close the window that appears.

Such bat files (batch files) are often used to write computer viruses, which, by the way, are not noticed by antivirus programs (in most cases). And for secrecy, they are transferred to the .exe format.

You can read more about cmd commands below. (or you can just write help on the command line)

A
append - allows programs to open files in the specified directories as if they were in the current directory.

arp - display and change tables for converting IP addresses into physical ones used by the address resolution protocol.

assoc - display or change associations for file name extensions.

at - the command is designed to run programs at a specified time.

atmsdm - Monitor connections and addresses registered by the ATM call manager on ATM networks.

attrib - change the attributes of files and folders.

auditusr - sets the user audit policy.

B
break - enable CTRL+C key processing mode.

bootcfg - This command line program can be used to configure, extract, modify or remove command line options in the Boot.ini file.

C
cacls - view changes to file ACL access control tables.

call - call one batch file from another.

cd - display the name or change the current folder.

chcp - display or change the active code page.

chdir - display or change the current folder.

chkdsk - disk check and report output.

chkntfs - Displays or changes disk check options at boot time.

ciddaemon is a file indexing service.

cipher is a file encryption program.

cls - clear the interpreter screen.

cmd - launches a new command prompt window.

cmstp - install connection manager profiles.

color - sets the color for text and background in text boxes.

comp - compare the contents of two files or sets of files.

compact - view and change file compression settings on NTFS partitions.

convert - convert the file system of a FAT volume to NTFS.

copy - copy one or more files.

D
date - display or set the current date.

debug - a tool for debugging and editing programs.

defrag - disk defragmentation.

del - delete one or more files.

devcon is an alternative to device manager.

diantz is the same as MAKECAB.

dir - list files and subfolders from the specified directory.

diskcomp - Compare the contents of two floppy disks.

diskcopy - copy the contents of one floppy disk to another.

diskpart - using the diskpart script.

diskperf - disk performance counter.

doskey - editing and recalling Windows commands; creating DOSKey macros.

driverquery - View a list of installed device drivers and their properties.

E
echo - output messages and switch the mode of displaying commands on the screen.

edit - launches the MS-DOS editor.

endlocal - end localization of environment changes in a batch file.

edlin - launches a line-by-line text editor.

erase - delete one or more files.

esentutl is a maintenance utility for Microsoft(R) Windows databases.

eventcreate - This command allows the administrator to create a special event entry in the specified event log.

eventtriggers - This command allows the administrator to display and configure event triggers on the local or remote system.

exe2bin - Convert EXE files to binary format.

exit - command line termination.

expand - uncompress compressed files.

F
fc - Compare two files or two sets of files and print the differences between them.

find - search for a text string in one or more files.

findstr - search for strings in files.

finger - display information about users of the specified system.

fltmc - work with driver load filter.

for - executes the specified command for each set file.

forcedos - Matches MS-DOS applications that are not recognized by Microsoft Windows XP.

format - disk formatting for working with Windows.

fontview is a font viewer.

fsutil - Manage reparse points, manage sparse files, unmount a volume, or expand a volume.

ftp is a file transfer program.

ftype - View and change file types associated with a file name extension.

G
getmac - Displays the MAC address of one or more of the computer's network adapters.

goto - Transfer control to the line containing the label in a batch file.

gpresult - Displays the resulting policy (RSoP) for the specified user and computer.

gpupdate - Perform group policy updates.

graftabl - selection of a code page for displaying symbols of national alphabets in graphics mode.

H
help - displays an incomplete list of commands that are used in cmd.

hostname - displays the computer name.

I
if is an operator to conditionally execute commands in a batch file.

ipconfig - Display subnet mask, default gateway and information about your IP.

ipxroute is the NWLink IPX routing manager.

L
label - Create, modify, and delete volume labels for a disk.

lodctr - update counter names and explanatory text for extended counter.

logman - Schedule management for performance counters and event trace log.

logoff - End a Windows session.

lpq - display the queue status of the remote print queue lpq.

lpr - Sends a print job to a network printer.

lsass - local security definition server.

M
makecab - archiving files into a cab-archive.

md - create a folder.

mem - displays information about used and free memory.

mkdir - create a folder with extended functionality.

mmc - open an MMC console window.

mode - debug system devices.

mofcomp - 32-bit Microsoft(R) MOF compiler.

more - sequential output of data in parts of one screen.

mountvol - View, create and remove volume mount points.

move - move and rename files and directories.

mqbkup is a utility for archiving and restoring a message queue.

mqsvc - Provides the infrastructure for running distributed applications.

msg - send messages to the user.

msiexec - Runs the Windows Installer.

N
nbtstat - Displays protocol statistics and current TCP/IP connections using NBT (NetBIOS over TCP/IP).

net - a package of applications designed to work with the network.

net1 is the same as net.

netsh - local or remote display and change steam

Over the past few years, wherever big politics open their mouths for freedom of information, hacktivists from the Anonymous group have appeared.

Armed with code knowledge, social engineering skills, and a developed political self-awareness, they take on the role of a revolutionary jester and declare war on powerful megastructures where big guns and brute force decide the least - in virtual reality. Whether it's CIA dirty secrets, corporate wars with Swedish crypto-anarchists, Arab Spring censorship, or the recent clashes in Taksim Square, any current political issue translates into security holes, virtuoso hacks, and carpet DDoS bombings.

Who are Anonymous

In a time when information oozes from all the foundations of the world order, they are the collective embodiment of the old myth of the faceless fighter for the rights of the oppressed. As old as the myth itself is the reaction to it. Since Anonymous turned the Internet into a shameful failure zone for big political players, the latter are less willing to look like idiots and spend more and more resources on harassing opponents. And even if "their name is legion," this does not save the nobility from repression. Over the past three years, about a hundred people have been detained on charges of involvement with Anonymous, some of whom have been arrested and are awaiting their sentences, up to double figures.

Before Anonymous, the history of politically motivated hacking was a sporadic activity of disparate groups whose existence was highly inconsistent. Although since the early 1990s, communities like Cult of the Dead Cow and Electronic Disturbance Theater have been using the networks to the fullest to express their ideas, paralyzing the activity of state sites. Anonymous themselves, as the embodiment of the political will of the hacker underground, appeared in 2008. Starting in the early 2000s with wildly merry imageboards, they first took shape in the Chanology project against the authoritarian activities of the Church of Scientology.

Impressive scale DDoS attacks, countless offline pranks and even street demonstrations have helped decentralized anonymous people to realize themselves as a force capable of delivering a massive and organized rebuff. After that, the "combat" operations of Anonymous began to take place with enviable regularity. The main front was in opposition to Internet censorship. During this time, the group managed to support Assange and WikiLeaks, the Occupy movement, The Pirate Bay and quarrel with a bunch of multinational companies (Sony, PayPal, Visa), half of the world's governments, copyright associations and even British tabloids.

Anonymous has breathed new life into the previously criminalized image of the hacker. In 2012, Time magazine included the group in the 100 most important phenomena on the planet. Now codebreakers are rightfully heroes of their time, but ironically, their faces can only be seen when they are behind bars.

In 2012, Time magazine named Anonymous one of the 100 most important events on the planet. Code breakers rightfully become heroes of their time

Newbie Aendy


The first person to receive a real sentence for participating in activities related to Anonymous was 19-year-old American Dmitry Guzner. In 2009, he was sentenced to prison for hacking the Church of Scientology website in the very first hacktivist attack. A smiling, bespectacled brunette from New Jersey took the blame entirely, but refused to admit to being part of an organized group. The prosecutor demanded ten years of imprisonment for Dmitry, and the court eventually settled on 366 days in prison plus two years without a computer. Since 2009, nothing has been heard about Dmitry.

Grandpa Commander X


The more information came about Doyon, the more important his figure in the hacker movement seemed.

After accidental casualties like Goosener, the arm of American justice has managed to get a hold of larger-scale hackers. In 2011, police arrested homeless Christopher Doyon for his involvement in cyberattacks on the Santa Cruz County, California website. Thus, 50-year-old Doyon protested against a law that prohibited free camping in the county. During the investigation, it turned out that the California homeless from the mid-1980s was a political activist of the People's Liberation Front, a proto-hacker group that advocated a free Internet.

Doyon was known to his comrades as Commander X, under the same nickname he sat in chat rooms and coordinated Anonymous attacks in support of the Occupy Wall Street movement. The more information came about Doyon, the more important his figure in the hacker movement seemed.

At the beginning of the court hearings, the prosecutor demanded 15 years in prison for the prisoner. After assessing the risks, Doyon's lawyer secured $35,000 for a bail, and on the same day, Christopher went on the run. Commander X has been hiding in Canada for a year and a half and continues to participate in Anonymous activities, for example, coordinating operations related to the Arab Spring. At the same time, Doyon likes to annoy the US government with endless interviews, where he likes to argue that anonymous people cannot be defeated, and government databases are available like drunk schoolgirls at graduation.

Anarchist

The record holder for the longest sentence among those arrested affiliated with Anonymous was political activist, musician of the ska band Dirty Surgeon Insurgency, member of LulzSec and hacker Jeremy Anarchaos Hammond. In late 2011, Hammond was involved in a large-scale security breach of the private intelligence firm Stratfor, a strategic partner of the CIA. As a result of the network raid, the company, whose main bread is security and intelligence, lost not only five million letters of internal correspondence, but also the credibility of its customers.

The 28-year-old Chicago anarchist, with an IQ of 168, showed just how inept big analytic structures can be when it comes to things like network security. During the arrest, Hammond was threatened with life imprisonment, then stopped at 30 years. After 15 months in a local pre-trial detention center without the right to bail and a sincere confession, justice has pity to ten. The final verdict will be announced on September 6, 2013.

LulzSec

Hammond's arrest was part of a larger operation to capture the "radical wing" of Anonymous, LulzSec. Members of the group carried out the most high-profile hacks of 2011 against Sony, telecommunications giant AT&T and the US government.

In 2012, four other people were detained along with Hammond.


Ryan Cleary, Mustafa Al-Bassam, Jake Davis, Ryan Ackroyd.

First, Jake Davis, alias Topiary, was in charge of coordinating LulzSec and is now at large, released on bail without the right to use a computer, and awaiting extradition to the United States.

Second, Londoner Ryan Ackroyd, known as Kayla, was considered the group's most advanced hacker. At the age of 19, Ackroyd began military service in Iraq, but after five years on the watch he left the British army and defected to hacktivism. Along with Ryan Viral Cleary, who provided a zombie network of 100,000 computers, and Mustafa T-Flow Al-Bassam, who was looking for holes in government sites, Ackroyd is waiting for double-digit sentences and a US trial for crimes against the state. As a result of the arrests, it turned out that the main core of LulzSec was in the UK.

two more those arrested turned out to be Irish: Darren Marty and Donnch O'Kirrhale are accused of illegally hacking into the computer systems of Ireland's largest party, Fine Gael.

Traitor Sabu

LulzSec caught masterfully. The FBI was able to find hackers all over the world. In addition to the US and the UK, Matthew Flannery aka Aush0k was arrested in Australia (waiting for a verdict on charges of 12 years in prison). The reason for such success of repressive measures turned out to be as old as the world. In 2011, authorities caught and then recruited a key member of LulzSec. It turned out to be a 28-year-old New Yorker - Hector Savier Monsegur under the nickname Sabu. The unemployed father of two children was immediately charged with 124 years in prison and quickly persuaded to cooperate with the investigation. Hector betrayed almost all the comrades he knew and turned into the main anti-hero of Anonymous. Today, Sabu continues to cooperate with the FBI and is trying to knock off a life sentence to a sane term.

A total of 14 people were arrested in connection with the attack on PayPal. Among them is another 42-year-old woman

Girl No and 14 people from the PayPal list

Among those caught by Anonymous, there are not only formidable hackers, but also completely random activists, even girls. As part of the FBI operation PayPal 14 to detain participants in cyberattacks on the payment system in 2011, Mercedes Rene Hefer, also known under the nickname No.

After PayPal, along with Visa and Mastercard, refused to accept donations to WikiLeaks, as part of Operation Avenge Assange, DDoSed thousands of people or the websites of the aforementioned companies using Canon's Low Orbit Ion program. Among them is a 20-year-old student at the University of Nevada, who a few months later was surprised to meet heavily armed feds on the threshold of her house.

A total of 14 people were arrested in connection with the attack on PayPal. Among them is another woman - 42-year-old Tracey Ann Valenzuela. Mercedes, Tracy and the other members of the list cannot even be called hackers. They just used free software to get their message across to the US government. But, to be discourteous, the federal authorities decided to charge everyone with cybercrime.

After scaring the activists with selective justice, the PayPal list members ended up getting off with suspended sentences and great prison photos.

Tunisian slim404

Anonymous is caught not only in English-speaking countries. During the Arab Spring in January 2011, Slim slim404 Amomou provided network support for Tunisian revolutionaries. As part of "Operation: Tunisia" Anonymous "put" a lot of pro-government websites and obtained important documents that influenced the victory of the street revolution.

But before the historical moment, the authoritarian authorities of old Tunisia managed to arrest Amoma as the most effective hacktivist. Didn't have to sit long. Seven days later, the regime was overthrown, and slim404 turned from a prisoner into the Minister of Sports and Youth of the transitional government.

He has since stepped down, gone back into opposition, maintains a popular blog, runs a small software company, and is active in a pirate party.

Ideologist Barrett Brown

The last big victim caught in the war against Anonymous was Barrett Brown. The well-known online activist, journalist and former heroin addict has never hidden his identity and has been something of the movement's chief spokesman, giving out countless interviews about the goals and successes of online operations. But in 2012, it turned out that Barrett was not just a popular online activism theorist.

While chatting with like-minded people, Texas police broke into his house and charged him with intimidating an FBI agent. Brown actually recorded a sensational video where he spoke very unflatteringly about the feds who bothered his mother. But within a few months, the activist was charged with 12 more charges in completely different cases, including an investigation into the activities of LulzSec and the Stratfor hacks.

A few days ago in Sweden, Gottfried Svartholm, creator of The Pirate Bay, received two years in prison. Russia has adopted an insane anti-piracy law. The Obama administration spends a month making excuses about global wiretapping and simultaneously catching former CIA officer Edward Snowden who released "classified" surveillance data.

The revolutions of the future are unfolding online. Today, hacking and knowing how to code is comparable to reading and writing in the dark ages. If you master the skill, then you instantly get a head start over the townsfolk and immunity against the manipulators.

Members of Anonymous and other hacktivists understand this better than others and from this they become full-fledged subjects of world politics. In their hands is a weapon capable of already physically harming authoritarian systems by sticking out of the holes in computer networks a huge and offensive middle finger for those who are passionate about power.

The heroes who have settled in IRC chats represent the prototype of a radical hivemind that generates the virtual world as an information freemen. Countering them is getting dirtier and dirtier, and hard times are coming for the rebels.

In a world where matter is already being converted into code and vice versa, the main battle is for information, not for space, for the freedom to know, not to blindly believe, for the right to honesty, not for hypocrisy. But even under pressure from the secret services, Anonymous has the courage to formulate itself according to Streisand's law: "We are a hydra, cut off one head - two will grow in its place."

Many are interested in the question of which operating system is best suited for hacking. First I will say that almost every professional and expert uses for this linux or Unix. Although some operations can be performed from under Windows And MacOS, almost the entire toolkit is designed specifically for linux.

But there are some exceptions, like programs Cain and Abel, Havij,Zenmap And Metasploit, which are developed or can be transferred to Windows.

Applications for linux which have been developed under linux and then ported to Windows may lose some features. In addition, some of the options that are built into linux, not available in Windows. For this reason, hacker tools in most cases are designed ONLY for linux.

In general, to become a high-class hacker, you need to master some skills in linux, as well as work with distributions such as back track or Kali.

For those who have never used linux, devoted to this compilation is the basics linux with a focus on the skills you need to hack. So you need to run back track or other distribution linux.

Step 1: Start Linux

After launch back track and login as user" root", enter the command:

Bt > startx

The screen should look something like this.

Step 2: Opening the terminal

To become an expert in linux need to learn how to use the terminal. In various distributions linux many things can be done simply by hovering over and clicking, as is done in Windows or MacOS, but a professional hacker needs to know how to use the terminal to run most of the tools.

So, you can open the terminal by clicking on its icon in the bottom panel. An image similar to this should appear on the screen.

Terminal in linux similar to the command line in Windows but it is much more powerful. Unlike the command line, in the terminal with linux you can do EVERYTHING and control the system more accurately than in Windows.

It is important to remember that in linux character case matters. That is, the command Desktop" differs from " desktop", which is not the same as " DeskTop". For some newcomers to linux it causes difficulties, therefore, it requires memorization.

Step 3: Familiarize yourself with the directory structure

Let's move on to the basics linux. Many beginners get confused about the structure of the file system linux. On Linux, unlike Windows, the file system is not tied to physical disk space, so there is no system disk. c:\, as operating system root linux, but there is / .

forward slash character ( / ) represents the root ( root) or the top of the file system hierarchy. All other directories (folders) are below in structure, like folders and subfolders on a disk c:\.

To visualize the file system, look at the diagram below.

It is important to have a basic understanding of the file structure because you will often need to use the terminal to navigate the file system without a tool like windows explorer.

There are a few important things to note about this graphical representation.

Catalog /bin is where the binaries are located. Programs that allow linux work.

/etc is the folder where the configuration files are stored. IN linux almost everything is configured using text configuration files, which are located in /etc.

In catalog /dev places device files like drivers in Windows.

/var is the location where the log files and other files are stored.

Step 4: Using the pwd Command

Terminal in back track opens in user directory by default home. As shown in the graphic above, in the hierarchy, this is one step down from the root directory. root. You can check which directory the user is in by typing:

Bt > pwd

Team pwd derived from " present working directory" (eng. "represent the working directory"), and it returns the value /root, which means that the user is in his root directory (do not confuse it with the top of the system's file structure).

team pwd better to remember, as it will always help to find out where the user is located in the directory system.

Step 5: Using the cd Command

You can change the directory with the command cd(from English change directory, "change directory"). In this case, to go "up" in the folder structure, you need to type:

Bt > cd..

Team cd followed by two dots ( .. ) says "go one level up in the folder structure". Note that the command line has changed, and when you type pwd, Linux responds that the current user is in " / ” or at the top of the directory system (in the root directory of the system).

Bt > pwd

Step 6: Using the whoami Command

The last step of this tutorial will use the command whoami. The output of this command will be to display the name of the user who is logged on to the system. Since the user here is logged in as root, any user account can be logged in and that user's name will be displayed in the terminal.

Bt > whoami

That's all for now. IN next tutorial posts set out the basics of work in linux, which you will need to become a professional hacker.

Denial of responsibility: This article is written for educational purposes only. The author or publisher did not publish this article for malicious purposes. If readers would like to use the information for personal gain, then the author and publisher are not responsible for any harm or damage caused.