A hacking tool is a computer program or software which helps a hacker to
hack a computer system or a computer program. The existences of hacking
tools have made the lives of the hackers much simpler when compared to
the times they did not exist. But it does not mean that if the Hacker is
equipped with a good hacking tool, his entire job is smoothly done. The
hacker still requires the skills of all the aspects of hacking equally
well.
Password Cracker Software
A
password cracker software, which is often referred to as a password
recovery tool, can be used to crack or recover the password either by
removing the original password, after bypassing the data encryption, or
by outright discovery of the password. In the process of password
cracking, a very common methodology used to crack the user password is
to repeatedly make guesses for the probable password and perhaps finally
hitting on the correct one. It cannot be denied that whenever we are
referring to cyber security, passwords are the most vulnerable security
links. On the other hand if the password is too completed, the user
might forget it. Password Cracker software are often used by the
hackers to crack the password and access a system to manipulate it. Do
not unethically use these software for hacking passwords.
In the next section you would be getting familiar with some of the
popular Password Cracker tools which are used by hackers for password
cracking.
It
is a free password cracker software which is based on the effective
implementation of the rainbow tables. It runs on a number of Operating
Systems like Mac OS X, Unix/Linux and Windows Operating System. It is
equipped with real-time graphs for analyzing the passwords and is an
open source software. Ophcrack has the capability to crack both NTLM
hashes as well as LM hashes.
Medusa
is one of the best online brute-force, speedy, parallel password
crackers which is available on the Internet. It has been designed by the
members of the website foofus.net. It is also widely used in
Penetration testing to ensure that the vulnerability of the system can
be exposed and appropriate security measures can be taken against
hacking.
Rainbow
Crack as the name suggests, is a cracker for hashes with the Rainbow
Tables. It runs on multiple operating systems such as Linux, Windows
Vista, Windows XP (Windows Operating Systems). It supports both
Graphical User Interface as well as Command line Interface. It's
software which is used for password cracking by generating rainbow
tables, fuzzing all the parameters.
Wfuzz
is a flexible tool for brute forcing Internet based applications. It
supports many features like Multithreading, Header brute forcing,
Recursion when discovering directories, Cookies, Proxy Support, hiding
results and encoding the URLs to name a few. Wfuzz is a useful tool for
finding unlinked resources like scripts, directories and servlets as
well.
Brutus
is one of the most flexible and free password crackers which operates
remotely. It is popular also because of its high speed and operates
under operating systems such as Windows 2000, Windows NT and Windows 9x.
Currently it does not operate under the UNIX operating system. Brutus
was initially designed to check network devices like routers for common
as well as default passwords.
L0phtCrack
which is now known as L0phtCrack6, is a tool which tests the strength
of a password given, as well as to recover lost passwords on Microsoft
Windows platform. Thus it is a tool for both password recovery as well
as auditing the password. It uses techniques such as Rainbow tables,
brute-force and dictionary to recover passwords.
Fgdump
is a powerful cracking tool. In fact, it's much more powerful than
pwdump6 as the latter has the tendency to hang whenever there is a
presence of an antivirus. Fgdump has the capability to handle this
problem of hanging by shutting down first. It later restarts the
Antivirus software. It supports multi threading which is very relevant
in the multitasking and multi-user environment.
Every
password security study has revealed that the biggest security
weaknesses are the passwords. THC Hydra is a tool for cracking logins
and it is flexible as it supports various protocols. It is very fast and
at the same time, new modules can be easily added. Hydra can run on
operating systems like Solaris 11, OSX, Windows and Linux.
John
the Ripper is a free software for password cracking which was
originally designed for the Unix Operating System. At present, it can
run on 15 Operating systems which includes 11 different versions of
UNIX, Win32, DOS and BeOS. It has the capability to combine several
password crackers into a single package which has made it one of the
most popular cracking tools for hackers.
It
is a network software suite used in 802.11 Wireless Local Area
Networks. It consists of tools such as a packet sniffer, detector and a
WEP. This tool runs on both Windows and Linux Operating systems. It can
work with any type of wireless network interface controller, provided
the driver is supporting the raw monitoring mode.
Cain
and Abel, often referred to as Cain, is a tool for recovering the
password in the Windows platform. It has the capability to recover
various kinds of passwords using techniques such as cracking the
password hashes by using brute-forcing, dictionary attacks,
cryptanalysis attacks and packet sniffing in the network.
The
objective of this security tool is to locate the valid user identities
in a Virtual Public Network along with the secret key combinations. Once
this is accomplished, this information can be used easily by a hacker
to have access to a VPN in an unauthorized manner
Welcome back, my neophyte hackers!
Several of you have
written me asking how to crack passwords. The answer, in part, depends
upon whether you have physical access to the computer, what operating
system you are running, and how strong the passwords are.
In this
first installment on password cracking, we'll assume the simplest
arrangement; you're running Windows, attacking Windows, and have
physical access to the computer whose passwords you're attempting to
crack.
In
future installments, we'll look at cracking passwords remotely, with
and on Linux operating systems, and cracking famous web applications
such as Gmail and Facebook, so keep coming back!
Step 1: Download Pwdump3
Windows systems encrypt user passwords and store them in a file named SAM and store them in the following directory:
c:\Windows\system32\config
The first thing we need to do is grab this file. In an earlier article, we used Metasploit to hack into the malicious dictator's computer and grab his password hashes.
We
can also grab the hashes without Metasploit if we have physical access
to a computer on the network. This can be done with a neat piece of
software called pwdump3. It's installed on BackTrack already, but you can download it for free on Windows using the link below.
Pwdump3
is able to grab the encrypted passwords for us, and we can then crack
them with another password cracking tool. So, let's grab that SAM file
with pwdump3!
Step 2: Grab the Hashes
Open a command prompt. Now navigate to the folder where you placed your pwdump3 app. I put mine on the desktop. Now type:
When you hit enter, pwdump3 will grab the password hashes and place them in the file called "hashdumpfile.txt". Make sure that you replace "mycomputer" in the command above with the actual name of your computer. If you don't know the name of your computer, simply type "hostname" as the command prompt and Windows will return the name of your computer.
Pwdump3 can retrieve the password hashes from any computer on your network!
Step 3: Download Cain & Abel
Now that we
have encrypted passwords (hashes), we now need to decrypt them so we can
read and use them. Most hacking software is developed for the Linux
operating system, then gets ported (recompiled) for Windows, but there
is one delightful exception—Cain and Abel.
Cain
and Abel is a hacking application exclusive to Windows that has never
been ported for Linux. It's a powerful and free (but not open source)
application that every hacker should be familiar with. We'll be using
just one of its many capabilities, namely cracking Windows password
hashes.
Now that we have all the tools we need, let's start cracking those passwords!
Step 4: Crack the Passwords
Cain and Abel must be run with administrator privileges, so right-click the CAIN icon on your desktop and select "Run as administrator." It should then open up a screen that looks like this:
Next, click on the "Cracker"
tab at the top of the work area, and provide Cain and Abel the password
hashes to crack. Simply right-click on the white space in the center of
Cain and Abel and a pull-down window will appear. Select "Import hashes from a text file."
Choose
the file with the password hashes that you created with pwdump3 (in our
example, we used "hasdumpfile.txt") or retrieved on Metasploit, then
click on the "Next" button.
We can now right-click on the hashes
and select what type of hash crack we want to proceed with. The fastest
method is to use the "Dictionary attack."
If you navigate to the Cain folder on your system, you will see a folder called "Wordlist."
You can use this relatively small word list or any other word list of
your choice (there are numerous word lists available on the Internet
with millions of words).
This method attempts all words from the
dictionary file to find password matches, and generally is very fast as
it can search through even a large dictionary file in just a few
minutes. If this fails, select "Hybrid Attack" and finally, a "Brute-Force Attack." A brute force might be slow, but eventually, it will crack all passwords.
Okay, stay connected here at Null Byte, because we have more exciting Hack Like a Pro guides coming up soon! Magnifying glass and password text images via Shutterstock
Do you know there are over thousands of websites and software that claim
to hack Facebook password of any account? They'd ask you the victim's
profile ID, maybe your credentials and some money too and will
reportedly tell you the password which, to be honest, never works. Ever
wonder why? Let me tell you why, they're FAKE! They're a scam which
tricks you somehow in losing your money or your own Facebook account.
Just give it a thought, why would Zuckerberg and his team spend Billions
of Dollars on Facebook if one could hack it in less than a minute?
Today, we'll take a look at this topic in detail with some example
websites and software and get answers to some common related questions.
Back in 2005, I came across a mechanism that reportedly hacked Yahoo
mail password for a user using some simple tricks. It didn't work for me
for obvious reasons but I didn't stop believing the possibility until I
grew up to realize how helpless I am here. One of the major concerns of
large organizations like Facebook and Yahoo is security because of the
super sensitive information about
people they have. Several hundred million dollars are spend yearly by
these organizations to ensure security and then there's these websites
that claim to undo all that protection in less than a minute.
The Facebook password cracking Websites and Software
Let's start with some examples here. I googled the subject and picked the top results without order. Didn't care to search harder because there are thousands such and I know that all are FAKE.
Their FREE Facebook hacker program is said to be capable of cracking the
password of any Facebook user within a day. Sounds cool, I could try it
out, but my Norton Antivirus rejected the file straight away.
I also picked up another one. This Hack-Fbook-Password asks me to enter the profile ID of a user and it will crack the password. I said Okay and began the process.
It ran certain algorithms to determine the password and finally landed
me on a page that said I could DOWNLOAD the password IF I fill an online
survey first. Those of you who've been redirected to surveys would know
they don't work and are put just so to get traffic and earn money.
I said maybe I should leave the website now but hey, they gave me a prize!
So I just became the luckiest person in my city just like that!
Now tell me, how can a sane person believe in all this?
The truth!
Let me get this straight to you, these websites do nothing at all just
waste your time and are never able to do the job. In fact, downloaded
programs just make the situation worse when you run them. I had my
Norton Antivirus to guard me otherwise I could be in severe danger
currently.
These software are mostly keyloggers and tracking programs that record your keystrokes and action and steal personal information from your computer in the background and send it to their master servers. So ultimately a hacker wannabe gets hacked, how ironic!
From now on in the post, I'll be using the word 'Hacker' for these websites and software since you're no more in the position to be called that.
Why do these 'Hackers' do all that?
Setting up websites, maintaining them and developing
software is not an easy task. It requires some money. So why do these
'hackers' do all the hassle? It's because they get equivalent or more
money in return. They can extract your credit card details and other
banking info from your system and use it for their advantage. They can
hack your account and use it for wrong purposes. Give me one reason why
one wouldn't steal money and hack accounts for no loss.
Why people fall in their webs?
Why do people try to use such unreal hacking procedures? It's because
it's unreal to me, it's unreal to you but not to those who are not much
familiar with the working of a software. They get in the web of these
hackers and eventually get screwed up pretty bad without consent.
The websites give guarantees and also portray their 'imaginary' happy
customers so as to trick a reader. Such tactics are simple but really
powerful and serves to their advantage in most cases. This is also why
there are thousands of such websites available.
So is Facebook account an 'unbreakable fortress'?
Well, NO. Facebook accounts can be hacked. No online service
is foolproof and that is because of the flaws and bugs in their
software. There are several ACTUAL hackers in the world who can analyse a
website's security and use that against it thus making hacking a
reality.
But I'm 100% sure none of them uses these scam and fake websites that claim to do the impossible. You can check out our hacking section to know more.
I'll end the 'lesson' with an idiom, "look before you leap". Focus,
think and then follow. In case of any queries or confusions head over to
the comments section. Cheers :)
Social networks are always great for communicative people; they make you
closer to your friends, relatives and hackers. Social networks are very
attractive for such kind of people. You can ask me: “Why do they need
that?” All they need is your account. The fraud schemes may be
different. But the main aim of them is money. They can ask your
relatives for help, especially when you’re far away. Why shouldn’t they
believe their own child, when he needs money?
Fraudsters do not disdain playing on the heartstrings. They can write
everything, that there’s an accident, you’re in a hospital, etc. So
today we’ll study to confront fraudsters and keep our nerves and money
safe.
Consequences
The most people don’t think about possible risks when creating their
profile on social networks. The more personal and professional
information you give, the easier it is for fraudsters to rob you. Let us
discuss the easiest scheme. Some criminals are simply searching for
people living in the same city to plunder their houses. Why does it
happen? Different people are writing perfect information, like “We’re
going to visit California next weekends. Hoping it’ll be great” Of
course it will be great. For the robber, because now he knows that the
house will be empty during weekends and it’s the perfect opportunity for
him.
The second thing is the photos. When you’re downloading images and
photos on social networks not only your friends like them. It’s also the
perfect resource for burglars. From home-made photos, they can receive
information about your welfare and house structure. When you have a dog,
the robber will be prepared, because everyone has photos with their
home pets. That’s why we earnestly advise you not to put in the Internet
photos of your house, and some things that can attract robbers, for
instance your new car or a brilliant ring.
Advice
The next our advice – create a complicated password. We’ve just
discussed what fraudsters can do with the access to your account, so try
to protect yourself, your friends, and relatives as good as you can.
Don’t make a password consisting of just your birth date. Remember, that
it’s the first combination fraudsters try. Also, don’t put your birth
date as the answer to the test question if it’s mail. Check out below
article on password cracking.
Let us imagine that you have a complicated password, you don’t download
the “rob-attractive” photos and one day you receive the link from your
friend where he asks you to vote for him. Stop now. This can be a trap.
If you’ll link, the fraudsters receive your personal data, such as login
and password. Such scheme is called “fishing”. So, in this case,
ask your friend something personal. The other variant is just to make
him a call and ask about this. If you’ll receive the answer like “What
are you talking about?” you should explain him that he was hacked and
offer to change the password. Check out below tutorial to know about
popular hacking method used to acquire sensitive information about
oneself.
Phones are really helpful things. Explain to your friends and relatives
that you can be hacked and if they receive messages with money requests,
they must call you at first and ask about that. Remember that your
security is in your hands and be careful.
Hacking is an engaging field but it is surely not easy. To become a hacker one has to have an attitude and curiosity of learning and adapting new skills. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning
goes on and on. Some people think that a hacker is always a criminal
and do illegal activities but they are wrong. Actually many big
companies hire hackers to protect their systems and information and are
highly paid. We have prepared a list of 12 most important steps
necessary to become a hacker, have a deeper look.
1. Learn UNIX/LINUX
UNIX/LINUX is an open source operating system which provides better security to computer systems. It was first developed by AT&T in Bell labs and contributed a lot in the world of security. You should install LINUX freely available open source versions on your desktops as without learning UNIX/LINUX, it is not possible to become a hacker.
2. Code in C language
C programming is the base of learning UNIX/LINUX as this operating system is coded in C programming which makes it the most powerful language as compared to other programming languages. C language was developed by Dennis Ritchie in late 1970’s. To become a hacker you should master C language.
3. Learn to code in more than one Programming Language
It is important for a person in the hacking field to learn more than one programming. There are many programming languages to learn such as Python, JAVA, C++. Free eBooks, tutorials are easily available online.
4. Learn Networking Concepts
Another important and essential step to become a hacker is to be good at
networking concepts and understanding how the networks are created. You
need to know the differences between different types of networks and
must have a clear understanding of TCP/IP and UDP to exploit
vulnerabilities (loop holes) in system.
Understanding what LAN, WAN, VPN, Firewall is also important.
You must have a clear understanding and use of network tools such as Wireshark, NMAP for packet analyzing, network scanning etc.
5. Learn More Than One Operating Systems
It is essential for a hacker to learn more than one operating system. There are many other Operating systems apart from Windows, UNIX/LINUX etc. Every system has a loop hole, hacker needs it to exploit it.
6. Learn Cryptography
To become a successful hacker you need to master the art of
cryptography. Encryption and Decryption are important skills in hacking.
Encryption is widely done in several aspects of information system
security in authentication, confidentiality and integrity of data.
Information on a network is in encrypted form such as passwords. While
hacking a system, these encrypted codes needs to be broken, which is
called decryption.
7. Learn more and more about hacking
Go through various tutorials, eBooks written by experts in the field of
hacking. In the field of hacking, learning is never ending because
security changes every day with new updates in systems.
8. Experiment A Lot
After learning some concepts, sit and practice them. Setup your own lab for experimental purpose. You need a good computer
system to start with as some tools may require powerful processor, RAM
etc. Keep on Testing and learning until you breach a system.
9. Write Vulnerability (Loop hole program)
Vulnerability is the weakness, loop hole or open door through which you
enter the system. Look for vulnerabilities by scanning the system,
network etc. Try to write your own and exploit the system.
10. Contribute To Open Source Security Projects
An open source computer security project helps you a lot in polishing
and testing your hacking skills. It’s not a piece of cake to get it
done. Some organizations such as MOZILLA, APACHE offer open source projects. Contribute and be a part of them even if your contribution is small, it will add a big value to your field.
11. Continue never ending Learning
Learning is the key to success in the world of hacking. Continuous
learning and practicing will make you the best hacker. Keep yourself
updated about security changes and learn about new ways to exploit
systems
12. Join Discussions and meet hackers
Most important for a hacker is to make a community or join forums,
discussions with other hackers worldwide, so that they can exchange and
share their knowledge and work as a team. Join Facebook groups related
to hacking where you can get more from experts.
Every human discovery has pros and cons, so is the computer which has
pervaded all our lives. The modern humanity is increasingly dependent on
computer for various day-to-day activities. Computers do us a whole lot
of good things, but it is not without some pitfalls. With the extensive
use of internet for hundreds of our needs, computer opens a vicious
cycle of hackers. Computer hacking is a term which refers to an
individual’s illegal and unauthorized access to the data which are
stored in a user’s system. This is done to disturb the confidentiality
and security of the user’s computer.
The hackers focus on individuals’ computer system when they are online.
As long as you are not connected to internet you are less prone to
hacking. The access to internet has actually made computer hacking easy.
You must protect your computer with strong antivirus and firewall
programs to keep hackers away. Hackers are known for creating problems
which are difficult to solve. This gives a good business to computer
investigators and technicians. Hacking can be done in lots of ways. Few
of them are given below:
Worms: These are the programs which propagate through networks.
Trojans: These are hidden in websites, attached files and emails.
Viruses: These attach themselves to various kinds of files. They can damage certain functions of your computer.
Hackers also crash on wireless networks which do not have firewall
installed and enabled. They can also send email attachments with
malicious software which get embedded on the victim’s computer. Hackers
attack accounts which have weak passwords. All these are done to get
access to confidential and sensitive information of the users. Whatever
is the method of hacking, the effect is harmful for the user. Your
system will be flooded with viruses, malwares which steal your
information. In order to avoid hacking one has to make sure that the
systems at home or office have the latest anti-virus program and
firewall installed and enabled. These programs need to be regularly
updated. Use the latest browser and scan your computer on a regular
basis.
New Age...
The New Age of internet has brought with it many risk factors along with
umpteen advantages. The New Age is the time where our personal lives
are no longer very personal, but people are able to access personal
information of internet users from various sources in the virtual world.
We need to be careful about usernames and passwords, else it will lead
to dangerous consequences. Universities, large companies and government
agencies are mostly targeted by hackers simply because of the bulk of
information they handle. The great newspapers like The Wall Street
Journal and The New York Times were also targeted by hackers.
Computer hackers are people who gain remote access to information stored
in a system elsewhere. During the 1950s and 60s hackers were more drawn
towards learning the operations of a computer rather than stealing
confidential information of a remote user. Unlike the olden days, now
computer hacking has become more sophisticated and organized. In the
late 1990s hackers tried to get access to files in the network of
Pentagon. Some more expert hackers gained access to the patent files at
the Indiana University School of Medicine in February 2003. Many hackers
were sentenced in the history since hacking represents a potential
national security threat.
Viruses
One major tool hackers use to steal information from computer systems is
the use of viruses. Over the years the number of viruses has increased
drastically. The virtual world now has above 100000 viruses and the
number grows virtually every day. Apart from the threat the computer
hackers pose, they also can be beneficial in one way. They can bring to
light the flaws in a computer network. Hackers can help in redesigning
the system and in making information inaccessible to illegal users and
to unauthorized access.
Getting Administrative Access
Getting a log in password is one of the predominant ways to get access
to a computer which is by the side of the hacker. Getting remote access
to a computer is another way to hack a system. Managing to crack a Wi-Fi
password is the third method of sneaking into someone else’s system.
Hacking if done on a public or school computer will have serious
consequences. The hacker will be put behind the bars for illegally
accessing the computer which does not belong to him or her.
There are number of methods out their used by hackers to hack your account or get your
personal information. Today in this post i will share with you guys 6
Most commonly used method to crack password and their countermeasures.
You must check out this article to be safe and to prevent your online
accounts from hacking.
1. BruteForce Attack
Any password can be cracked using Brute-force attack. Brute-force attacks try every possible combinations of numbers, letters and special characters until the right password is match. Brute-force attacks
can take very long time depending upon the complexity of the password.
The cracking time is determined by the speed of computer and complexity
of the password.
Countermeasure: Use long and complex passwords. Try to use combination of upper and lowercase letters along with numbers. Brute-force attack will take hundreds or even thousands of years to crack such complex and long passwords.
Example: Passwords like "iloveu" or "password" can be cracked easily whereas computer will take years to crack passwords like "aN34lL00"
2. Social Engineering
Social engineering is process of manipulating someone to trust you and
get information from them. For example, if the hacker was trying to get
the password of a co-workers or friends computer, he could call him
pretending to be from the IT department and simply ask for his login
details. Sometime hackers call the victim pretending to be from bank and
ask for their credit cards details. Social Engineering can be used to
get someone password, to get bank credentials or any personal
information.
Countermeasure: If someone tries to get your
personal or bank details ask them few questions. Make sure the person
calling you is legit. Never ever give your credit card details on phone.
3. Rats And Keyloggers
In keylogging or RATing the hacker sends keylogger or rat to the victim.
This allows hacker to monitor every thing victim do on his computer.
Every keystroke is logged including passwords. Moreever hacker can even
control the victims computer.
Countermeasure: Never login to your bank account
from cyber cafe or someone else computer. If its important use
on-screen or virtual keyboard while tying the login. Use latest
anti-virus software and keep them updated. Check out below article to
know more about Rats and Keyloggers.
4. Phishing
Phishing is the most easiest and popular hacking method used by hackers to get someone account details. In Phishing attack
hacker send fake page of real website like facebook, gmail to victim.
When someone login through that fake page his details is send to the
hacker. This fake pages can be easily created and hosted on free
web-hosting sites.
Countermeasure: Phishing attacks
are very easy to avoid. The url of this phishing pages are different
from the real one. For example URL of phishing page of facebook might
look like facbbook.com (As you can see There are two "b"). Always make
sure that websites url is correct. Check out below article to know more
about phishing.
5. Rainbow Table
A Rainbow table is a huge pre-computed list of hashes for every possible
combination of characters. A password hash is a password that has gone
through a mathematical algorithm such as md5 and is transformed into
something which is not recognizable. A hash is a one way encryption so
once a password is hashed there is no way to get the original string
from the hashed string. A very commonly used hashing algorithm to store
passwords in website databases is MD5. It is almost similar to dictionary attack, the only difference is, in rainbow tables attack hashed characters are used as passwords whereas in dictionary attack normal characters are used as passwords.
Example: ‘hello’ in md5 is 5d41402abc4b2a76b9719d911017c592 and zero length string ("") is d41d8cd98f00b204e9800998ecf8427e
Countermeasure: Make sure you choose password that is long and complex. Creating tables for long and complex password takes a very long time and a lot of resources
6. Guessing
This seems silly but this can easily help you to get someones password within seconds. If hacker knows you, he can use information he knows about you to guess your password. Hacker can also use combination of Social Engineering and Guessing to acquire your password.
Countermeasure: Don't use
your name, surname, phone number or birthdate as your password. Try to
avoid creating password that relates to you. Create complex and long
password with combination of letters and numbers.
The story above is my personal experience while dealing with BAT script.
A hacker also sometimes need to hide their script in the background,
because they don't want the victim become suspicious if something popped
out in their window, since any command prompt window will be visible
until the .BAT/.CMD file execution is complete. Requirement:
1. Notepad or any other text editor
How to Invisibly Execute BAT File in the Background:
1. Let say I will ping google.com by utilizing BAT script.
ping www.google.com
and then save as ping.bat
click the ping.bat we've just created, a command prompt window will
popped out and pinging google.com
and the window will automaticaly closed after the execution is complete.
3. We will utilize Windows Script Host RUN method to invisibly execute BAT file in the background. This is the script Set WshShell = CreateObject("WScript.Shell")
WshShell.Run chr(34) & "C:\ping.bat" & Chr(34), 0
Set WshShell = Nothing
save the script as hidden.vbs with .vbs extension.
4. I've modified the BAT script a little bit, because we need to check whether the script was successfully executed or not.
ipconfig > result.txt
all IP configuration result will be saved into result.txt file.
5.
When we execute the hidden.vbs, no window popped out and if our script
was successfully executed in the background, in our folder location
should have a new file result.txt contained with information about
windows ip configuration.