Ethical Hackers VS Noobs menu:
Official EHVSN FaceBook Group
Official EHVSN YouTube Channel
My GitHub
Scripting Tutorials (batch/python)
Ethical Hackers VS Noobs menu:
Official EHVSN FaceBook Group
Official EHVSN YouTube Channel
My GitHub
Scripting Tutorials (batch/python)
Dear members of EHVSN, welcome to our FAQ (frequently asked questions) section on the Wiki. Here you can find documented answers of our group's professionals to questions that are frequently posted on the group.
I have made a hack for that a few years ago, basically you need to find out where the pattern is stored, usually in some .db file, which is a sqlite3 database. This setting could reside in the launcher's \data part, go there and just remove the entire file responsible for holding the pattern.
1. BTRemote (free): Control your computer using a bluetooth enabled mobile phone. Move the mouse cursor send key strokes and control the most common applications such windows media player, internet explorer, firefox. Download it here: https://sourceforge.net/projects/btremote/
2. anyRemote (free): Remote control software for applications using Bluetooth or Wi-Fi. anyRemote supports wide range of modern cell phones line Nokia, SonyEricsson, Motorola, majority of Android phones and others. Download it here: https://sourceforge.net/projects/anyremote
“shutdown /m \\COMPUTERDNSNAME /s /f /t 00” /m = machine /s = shutdown /f = force /t = time delay
Before it will reboot, it will prompt for credentials. We can also use PSEXEC for example to execute “shutdown /f /s /t 00”, basically the same command but without the remote machine parameter.
Several ways to do this! Most easy, is LinuxLive USB Creator (aka LiLi) which can be downloaded here:
https://www.linuxliveusb.com/
Sometimes you need a CMD tool for this, and for Windows users we can obtain syslinux and execute: syslinux.exe -ma X:
https://sourceforge.net/projects/designux/files/boot/syslinux/
The no1 resource for booting linux can be found here:
https://www.pendrivelinux.com/
For those who seek a bootable Kali Linux USB drive we recommend reading this article:
https://docs.kali.org/downloading/kali-linux-live-usb-install
wmic process get ProcessID,ExecutablePath or alternatively: tasklist /FI “STATUS eq RUNNING”
taskkill /f /im “virusname.exe”
del /f “%PATHTOVIRUS%\virusname.exe”
The password is stored, the chip that holds the data of the password, needs to be powered to keep the data. So to bypass such protection, we need to make the system powerless. Unplug the system, wait for like 10 - 15 mins OR you can disconnect the battery/power of the system and then turn it on, this will force capacitors to empty, because there is no power source, the BIOS will be forced to defaults.
Alternatively, especially older systems, have a jumper to CLEAR CMOS, shortcut that with a jumper or screwdriver or whatever on booting the system, and it will remove the password as well.