Posts

Windows search is not working properly.

 This PowerShell script resets the Windows Search feature and closes the PowerShell window when the "Done" message appears. If you receive an error message stating that running scripts is disabled on your system, enter the command Get-ExecutionPolicy and press Enter. The current policy, such as Restricted, should be noted for future use. After the policy change is completed, close the PowerShell window and repeat steps 2–4. When the "Done" message appears, press any key to continue. To revert to your previous PowerShell execution policy setting, enter the command Set-ExecutionPolicy -Scope CurrentUser -ExecutionPolicy and press Enter. Return to your previous policy setting by pressing the Spacebar, enter the policy value you noted in step 5, and press Enter. This will allow the script to make changes to your device. Remember to press Y and Enter to accept the change and revert to your previous policy setting. Close the PowerShell window when you're done. DOWNLOA...

windows activator micro365

 microsoft 365 and 2010 https://drive.google.com/file/d/1RFxnrwfae_KolBKoBQc6fuxDlL_JDGuH/view?usp=drive_link

All in one windows credential sam and hash decripted and encripted(Dumping :sam: all security

Image
  In this article, we will learn about SAM. We will learn about the passwords and how they are stored in the SAM. We will also focus on the NTLM Authentication. At last, we will be using a bunch of different tools to extract those credentials from SAM. Table of Content Introduction to SAM How passwords are stored? LM Authentication NTLM Authentication Windows 7 PwDump7 SamDump2 Metasploit Framework Invoke-PowerDump.ps1 Get-PassHashes.ps1 PowerShell Powerdump Manual Windows 10 Mimikatz Impacket Metasploit Framework HashDump Credential_collector Load_kiwi (Mimikatz) Koadic PowerShell Empire Mimikatz/sam LaZagne CrackMapExec Decrypting Hash John The Ripper Introduction to SAM SAM is short for the Security Account Manager which manages all the user accounts and their passwords. It acts as a database. All the passwords are hashed and then stored SAM. It is the responsibility of LSA (Local Security Authority) to verify user login by matching the passwords with th...

Computer hardware Networking Interview Questions and Answers

Image
What is a Link? A link refers to the connectivity between two devices. It includes the type of cables and protocols used for one device to be able to communicate with the other.   2) What are the layers of the OSI reference model? There are 7 OSI layers: 1) Physical Layer, 2) Data Link Layer, 3) Network Layer, 4) Transport Layer, 5) Session Layer, 6) Presentation Layer, and 7) Application Layer. 3) What is the backbone network? A backbone network is a centralized infrastructure that is designed to distribute different routes and data to various networks. It also handles the management of bandwidth and multiple channels.   4) What is a LAN? LAN network LAN stands for Local Area Network. It refers to the connection between computers and other network devices that are located within a small physical location.   5) What is a node? A node refers to a point or joint where a connection takes place. It can be a computer or device that is part of a network. Two o...

KMS ACTIVATER

 ALL ACTIVATER MS OFFICE ,ms office 2016,2013,2019 ,2021 link  https://drive.google.com/file/d/16hcVEHtaR8UnJjgqVu3bplW0CSpqHq_K/view?usp=share_link

QBot malware abuses Windows WordPad EXE to infect devices

Image
  QBot malware abuses Windows WordPad EXE to infect devices.. The QBot malware operation has started to abuse a DLL hijacking flaw in the Windows 10 WordPad program to infect computers, using the legitimate program to evade detection by security software. A DLL is a library file containing functions that can be used by more than one program at the same time. When an application is launched, it will attempt to load any required DLLs. It does this by searching through specific Windows folders for the DLL and, when found, loads it. However, Windows applications will prioritize DLLs in the same folder as the executable, loading them before all others. DLL hijacking is when a threat actor creates a malicious DLL of the same name as a legitimate one, and places it in the early Windows search path, usually the same folder as the executable. When that executable is launched, it will load the malware DLL rather than the legitimate one and execute any malicious commands within it. QBot abuse...

how to uninstall security update windows us by cmd

Image
 1:- first off all go to control panel  click program and features click uninstall click to view . 2 Go to start cmd click to run as administrator open  c:/ systeminfo.exe  system information and all details update . at host fix all updated windows security . cmd open  Finally give the following command to remove the desired update. (e.g. the KB "4058702") wusa /uninstall /kb: 4058702  /quiet /norestart wusa /uninstall /kb:999999 /quiet /norestart Force Restart wusa /uninstall /kb:999999 /quiet /forcestart Part 2. Remove Windows Updates using the DISM tool from the Windows GUI. * Note:  The advantage of the DISM tool is that you can use it to remove updates. from either the Windows GUI (if Windows boot normally) or the Windows recovery environment. This is useful if Windows fails to start after an unsuccessful update installation. 1. Open  Command Prompt as Administrator . 2. First, view a list with the installed updates with the DISM command: dis...

Popular posts from this blog

Windows activater failed

All in one windows credential sam and hash decripted and encripted(Dumping :sam: all security

Computer hardware Networking Interview Questions and Answers

Windows defender DisableAntiSpyware

Error Code: INET_E_RESOURCE_NOT_FOUND

eSIM vulnerabilities exploited by SIM swappers for phone numbers: Report

The Windows system screen error is a corrupt issue.