-->

ABOUT US

Our development agency is committed to providing you the best service.

OUR TEAM

The awesome people behind our brand ... and their life motto.

  • Kumar Atul Jaiswal

    Ethical Hacker

    Hacking is a Speed of Innovation And Technology with Romance.

  • Kumar Atul Jaiswal

    CEO Of Hacking Truth

    Loopholes are every major Security,Just need to Understand it well.

  • Kumar Atul Jaiswal

    Web Developer

    Techonology is the best way to Change Everything, like Mindset Goal.

OUR SKILLS

We pride ourselves with strong, flexible and top notch skills.

Marketing

Development 90%
Design 80%
Marketing 70%

Websites

Development 90%
Design 80%
Marketing 70%

PR

Development 90%
Design 80%
Marketing 70%

ACHIEVEMENTS

We help our clients integrate, analyze, and use their data to improve their business.

150

GREAT PROJECTS

300

HAPPY CLIENTS

650

COFFEES DRUNK

1568

FACEBOOK LIKES

STRATEGY & CREATIVITY

Phasellus iaculis dolor nec urna nullam. Vivamus mattis blandit porttitor nullam.

PORTFOLIO

We pride ourselves on bringing a fresh perspective and effective marketing to each project.

Showing posts with label windows. Show all posts
Showing posts with label windows. Show all posts
  • Why we need of Virtualization technology



     

    Why we need of Virtualization technology ?

     

    Virtualization technology is a way to create multiple virtual versions of a physical computer or other hardware resources, such as a server or network. This is done by using specialized software, called a hypervisor or virtual machine monitor, which creates a layer of abstraction between the hardware and the virtual machines.

    Virtualization technology allows multiple operating systems to run on a single physical machine simultaneously, without interfering with each other. Each virtual machine has its own virtualized hardware, including CPU, RAM, storage, and network interfaces, and can run its own applications and services as if it were a physical machine.

    Virtualization technology has many benefits, including improved hardware utilization, easier software deployment, increased flexibility, and improved disaster recovery capabilities. It is widely used in data centers and cloud computing environments, as well as in desktop and mobile computing environments.



    How to enable virtualization technology in bios?


    The steps to enable virtualization technology in BIOS may vary slightly depending on the motherboard and BIOS version, but generally, the following steps should work:

       

    # Start or restart your computer and enter the BIOS setup by pressing the appropriate key during the boot process (this key is usually displayed on the screen, and commonly it's F2 or Del key).
     

    # Navigate to the "Advanced" or "System Configuration" or "Security" tab, depending on your motherboard manufacturer and BIOS version.

    # Look for an option called "Intel Virtualization Technology", "Intel VT-x", "Virtualization Extensions", "AMD-V", or something similar.

    # Change the setting to "Enabled" or "On".

    # Save the changes and exit the BIOS setup.

        Restart your computer and the virtualization technology should now be enabled.

    It's important to note that not all CPUs support virtualization technology, and some older motherboards or BIOS versions may not have this option. Also, be aware that enabling .



    Disclaimer

     

    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.

     

     

  • windows security module

     

    windows security module

     


    Windows Security


    Per Microsoft, "Windows Security is your home to manage the tools that protect your device and your data".

    In case you missed it, Windows Security is also available in Settings.

     

     

    windows security module

     

     

     In the above image, focus your attention on Protection areas.

    • Virus & threat protection
    • Firewall & network protection
    • App & browser control
    • Device security


    Each following task will briefly touch on these areas.


    Before proceeding, let's provide a quick comment on the status icons.


    • Green means your device is sufficiently protected, and there aren't any recommended actions.
    • Yellow means there is a safety recommendation for you to review.
    • Red is a warning that something needs your immediate attention.

        

    Click on Open Windows Security.

     

    windows security module

     

     

    Note: Since the attached VM is a Windows Server 2019 edition, it looks different from a Windows 10 Home or Professional edition.

    The below image is from a Windows 10 device.

     

    windows security module

     

     

    1) In the above image, which area needs immediate attention?

    Ans - Virus and Threat Protection


     

    Virus & threat protection


    Virus & threat protection is divided into two parts:

    • Current threats
    • Virus & threat protection settings



    The image below only focuses on Current threats. 

     

     

    windows security module

     


    Current threats


    Scan options


    • Quick scan - Checks folders in your system where threats are commonly found.
    • Full scan - Checks all files and running programs on your hard disk. This scan could take longer than one hour.
    • Custom scan - Choose which files and locations you want to check.


    Threat history


    • Last scan - Windows Defender Antivirus automatically scans your device for viruses and other threats to help keep it safe.
    • Quarantined threats - Quarantined threats have been isolated and prevented from running on your device. They will be periodically removed.
    • Allowed threats - Allowed threats are items identified as threats, which you allowed to run on your device.


    Warning: Allow an item to run that has been identified as a threat only if you are 100% sure of what you are doing.


    Next is Virus & threat protection settings.

     

    windows security module



    Virus & threat protection settings


    Manage settings


    • Real-time protection - Locates and stops malware from installing or running on your device.
    • Cloud-delivered protection - Provides increased and faster protection with access to the latest protection data in the cloud.
    • Automatic sample submission - Send sample files to Microsoft to help protect you and others from potential threats.
    • Controlled folder access - Protect files, folders, and memory areas on your device from unauthorized changes by unfriendly applications.
    • Notifications - Windows Defender Antivirus will send notifications with critical information about the health and security of your device.



    Warning: Excluded items could contain threats that make your device vulnerable. Only use this option if you are 100% sure of what you are doing.


    Virus & threat protection updates


    Check for updates - Manually check for updates to update Windows Defender Antivirus definitions.  


    Ransomware protection


    Controlled folder access - Ransomware protection requires this feature to be enabled, which in turn requires Real-time protection to be enabled.



    Note: Real-time protection is turned off in the attached VM to decrease the chances of performance issues. Since the VM can't reach the Internet and there aren't any threats in the VM, this is safe to do. Real-time protection should definitely be enabled in your personal Windows devices unless you have a 3rd party product that provides the same protection. Ensure it's always up-to-date and enabled.  

    Tip: You can perform on-demand scans on any file/folder by right-clicking the item and selecting 'Scan with Microsoft Defender'.


    The below image was taken from another Windows device to show this feature.



    1) Specifically, what is turned off that Windows is notifying you to turn on?

    Ans - Real-time protection




    Firewall & network protection


    What is a firewall?

    Per Microsoft, "Traffic flows into and out of devices via what we call ports. A firewall is what controls what is - and more importantly isn't - allowed to pass through those ports. You can think of it like a security guard standing at the door, checking the ID of everything that tries to enter or exit".

    The below image will reflect what you will see when you navigate to Firewall & network protection.



    windows security module



    Note: Each network may have different status icons for you.

    What is the difference between the 3 (Domain, Private, and Public)?

    Per Microsoft, "Windows Firewall offers three firewall profiles: domain, private and public".


    • Domain - The domain profile applies to networks where the host system can authenticate to a domain controller.
    • Private - The private profile is a user-assigned profile and is used to designate private or home networks.
    • Public - The default profile is the public profile, used to designate public networks such as Wi-Fi hotspots at coffee shops, airports, and other locations.



    If you click on any firewall profile, another screen will appear with two options: turn the firewall on/off and block all incoming connections.



    windows security module


    Warning: Unless you are 100% confident in what you are doing, it is recommended that you leave your Windows Defender Firewall enabled.

    Allow an app through firewall



    windows security module


    You can view what the current settings for any firewall profile are. In the above image, several apps have access in the Private and/or Public firewall profile. Some of the apps will provide additional information if it's available via the Details  button. 


    Advance Setting

     


    windows security module


    Configuring the Windows Defender Firewall is for advanced Windows users. Refer to the following Microsoft documentation on best practices here.

    Tip: Command to open the Windows Defender Firewall is WF.msc.


    1) If you were connected to airport Wi-Fi, what most likely will be the active firewall profile?

    Ans - public network



    App & browser control


    In this section, you can change the settings for the Microsoft Defender SmartScreen.

    Per Microsoft, "Microsoft Defender SmartScreen protects against phishing or malware websites and applications, and the downloading of potentially malicious files".

    Refer to the official Microsoft document for more information on Microsoft Defender SmartScreen here.



    windows security module



    Check apps and file

    Windows Defender SmartScreen helps protect your device by checking for unrecognized apps and files from the web.



    windows security module


    Exploit protection


    Exploit protection is built into Windows 10 (and, in our case, Windows Server 2019) to help protect your device against attacks.



    windows security module



    Warning: Unless you are 100% confident in what you are doing, it is recommended that you leave the default settings.



    Device security


    Even though you'll probably never change any of these settings, for completion's sake, it will be covered briefly.



    windows security module


    Core isolation
     

    Memory Integrity - Prevents attacks from inserting malicious code into high-security processes.



    windows security module


    Warning: Unless you are 100% confident in what you are doing, it is recommended that you leave the default settings.

    The below images are from another machine to show another security feature that should be available in a personal Windows 10 device.


    Security processor


    windows security module


    Below are the Security processor details.


    windows security module


    What is the Trusted Platform Module (TPM)?

    Per Microsoft, "Trusted Platform Module (TPM) technology is designed to provide hardware-based, security-related functions. A TPM chip is a secure crypto-processor that is designed to carry out cryptographic operations. The chip includes multiple physical security mechanisms to make it tamper-resistant, and malicious software is unable to tamper with the security functions of the TPM".




    Disclaimer

     

    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.


  • windows Registry Editor Tool


     

    windows Registry Editor  Tool

     


    We're continuing with Tools that are available through the System Configuration panel.

    The Windows Registry (per Microsoft) is a central hierarchical database used to store information necessary to configure the system for one or more users, applications, and hardware devices.

    The registry contains information that Windows continually references during operation, such as:

    •     Profiles for each user
    •     Applications installed on the computer and the types of documents that each can create
    •     Property sheet settings for folders and application icons
    •     What hardware exists on the system
    •     The ports that are being used.




    Warning: The registry is for advanced computer users. Making changes to the registry can affect normal computer operations.

    There are various ways to view/edit the registry. One way is to use the Registry Editor (regedit).

     

     

    windows Registry Editor  Tool

     

     

    Refer to the following Microsoft documentation here to learn more about the Windows Registry. 

     

    1) What is the command to open the Registry Editor? (The answer is the name of  the .exe file, not the full path)

    Ans :- regedt32.exe

     

     

     

    Disclaimer

     

    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.



  • Windows Computer Management compmgmt

     

     

    Windows Computer Management compmgmt

     

     

    Windows Computer Management



    We're continuing with Tools that are available through the System Configuration panel.

    The Computer Management (compmgmt) utility has three primary sections: System Tools, Storage, and Services and Applications.



    Windows Computer Management compmgmt


    System Tools


    Let's start with Task Scheduler. Per Microsoft, with Task Scheduler, we can create and manage common tasks that our computer will carry out automatically at the times we specify.

    A task can run an application, a script, etc., and tasks can be configured to run at any point. A task can run at log in or at log off. Tasks can also be configured to run on a specific schedule, for example, every five mins.

    To create a basic task, click on Create Basic Task under Actions (right pane).

     

     

     

    Windows Computer Management compmgmt

     

    Next is Event Viewer.

    Event Viewer allows us to view events that have occurred on the computer. These records of events can be seen as an audit trail that can be used to understand the activity of the computer system. This information is often used to diagnose problems and investigate actions executed on the system.


     

    Windows Computer Management compmgmt

     

     

    Event Viewer has three panes.


    1. The pane on the left provides a hierarchical tree listing of the event log providers. (as shown in the image above)
    2. The pane in the middle will display a general overview and summary of the events specific to a selected provider.
    3. The pane on the right is the actions pane.



    There are five types of events that can be logged. Below is a table from docs.microsoft.com providing a brief description for each.


     

    Windows Computer Management compmgmt

     

     

    The standard logs are visible under Windows Logs. Below is a table from docs.microsoft.com providing a brief description for each.

     

     

    Windows Computer Management compmgmt

     

     


    Shared Folders is where you will see a complete list of shares and folders shared that others can connect to.

     

     

    Windows Computer Management compmgmt

     

     

    In the above image, under Shares, are the default share of Windows, C$, and default remote administration shares created by Windows, such as ADMIN$.


    As with any object in Windows, you can right-click on a folder to view its properties, such as Permissions (who can access the shared resource).

    Under Sessions, you will see a list of users who are currently connected to the shares. In this VM, you won't see anybody connected to the shares.

    All the folders and/or files that the connected users access will list under Open Files.

    The Local Users and Groups section you should be familiar with from Windows Fundamentals 1 because it's lusrmgr.msc.

    In Performance, you'll see a utility called Performance Monitor (perfmon).

    Perfmon is used to view performance data either in real-time or from a log file. This utility is useful for troubleshooting performance issues on a computer system, whether local or remote. 

     

     

    Windows Computer Management compmgmt

     

     

    Device Manager allows us to view and configure the hardware, such as disabling any hardware attached to the computer.

     

     

    Windows Computer Management compmgmt

     

     

    Storage  


    Under Storage is Windows Server Backup and Disk Management. We'll only look at Disk Management.

    Note: Since the virtual machine is a Windows Server operating system, there are utilities available that you will typically not see in Windows 10.  

     

    Windows Computer Management compmgmt

     

     

    Disk Management is a system utility in Windows that enables you to perform advanced storage tasks.  Some tasks are:

    •     Set up a new drive
    •     Extend a partition
    •     Shrink a partition
    •     Assign or change a drive letter (ex. E:)

        
        

    Services and Applications


     

    Windows Computer Management compmgmt

     

     

    Recall from the previous task; a service is a special type of application that runs in the background. Here you can do more than enable and disable a service, such as view the Properties for the service.

     

    Windows Computer Management compmgmt

     

     

    WMI Control configures and controls the Windows Management Instrumentation (WMI) service.

    Per Wikipedia, "WMI allows scripting languages (such as VBScript or Windows PowerShell) to manage Microsoft Windows personal computers and servers, both locally and remotely. Microsoft also provides a command-line interface to WMI called Windows Management Instrumentation Command-line (WMIC)."

    Note: The WMIC tool is deprecated in Windows 10, version 21H1. Windows PowerShell supersedes this tool for WMI.




    1) What is the command to open Computer Management? (The answer is the name of the .msc file, not the full path)

    Ans :- compmgmt.msc




    2) At what time every day is the GoogleUpdateTaskMachineUA task configured to run?

    Ans :- 6:15 am




    3) What is the name of the hidden folder that is shared?

    Ans :- sh4r3dF0Ld3r


     

     

    Disclaimer

     

    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.



  • Windows Fundamental MSConfig

     

    Windows Fundamental MSConfig

     

     

    System Configuration



    The System Configuration utility (MSConfig) is for advanced troubleshooting, and its main purpose is to help diagnose startup issues.

    Reference the following document here for more information on the System Configuration utility.

    There are several methods to launch System Configuration. One method is from the Start Menu.

     

     

    Windows Fundamental MSConfig

     

     

    Note: You need local administrator rights to open this utility.

    The utility has five tabs across the top. Below are the names for each tab. We will briefly cover each tab in this task.


    1.     General
    2.     Boot
    3.     Services
    4.     Startup
    5.     Tools

     

     

    Windows Fundamental MSConfig

     

     

    In the General tab, we can select what devices and services for Windows to load upon boot. The options are: Normal, Diagnostic, or Selective.

    In the Boot tab, we can define various boot options for the Operating System

     


    Windows Fundamental MSConfig


    The Services tab lists all services configured for the system regardless of their state (running or stopped). A service is a special type of application that runs in the background.  



    Windows Fundamental MSConfig


    In the Startup tab, you won't see anything interesting in the attached VM.  Below is a screenshot of the Startup tab for MSConfig from my local machine.



    Windows Fundamental MSConfig



    As you can see, Microsoft advises using Task Manager (taskmgr) to manage (enable/disable) startup items. The System Configuration utility is NOT a startup management program.

    Note: If you open Task Manager for the attached VM, you will notice that Task Manager doesn't show a Startup tab.

    There is a list of various utilities (tools) in the Tools tab that we can run to configure the operating system further. There is a brief description of each tool to provide some insight into what the tool is for. 



    Windows Fundamental MSConfig



    Notice the Selected command section. The information in this textbox will change per tool.

    To run a tool, we can use the command to launch the tool via the run prompt, command prompt, or by clicking the Launch button.




    1) What is the name of the service that lists Systems Internals as the manufacturer?

    Ans - PsShutdown




    2) Whom is the Windows license registered to?

    Ans - windows user



    3) What is the command for Windows Troubleshooting?

    Ans - C:\windows\system32\control.exe /name Microsoft.Troubleshooting




    4) What command will open the Control Panel? (The answer is  the name of .exe, not the full path)

    Ans - control.exe




    Disclaimer

     

    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.


  • Create Web Application for CRUD operation

     


     

     

    Create Web API for CRUD operation


    So ladies and gentlemen here we will create a new web application project in which GET, POST, PUT, and delete method will be used for CRUD operation.
     
    So first we make one, for this you have to go to the file --> New --> Project then write on name section (whatever you want) and without disturbing the rest, you just clicked on the OK button.

     





     
    and then you choose to MVC option in next tab and same as it as click on OK button.

     


     

     

    So, as you can see this our project empty project is ready to launch on localhost...let's run first before write any code.
     

     



    For this, Shortcut command press by keyboard


    ctrl + F5

    As you can see this here are displaying the project in browser by localhost

    URL http://localhost:59322/





     

     

     

    Add Models

     

    So before proceeding here on the left side you are able to see some options, with the help of which we will create controller class, model class.
     





    Wait, if your Solution Explorer not showing there, don't worry...follow to our steps.


    Click on view --> Click Solution Explorer, Server Explorer option etc.



    First we will create class and for this you have go to Models option and right click on this and go to Add --> class --> choose first option (Class) --> change the class name like in our case (class name is Student) and then click Add. button.

     

     


     

     

     




     

     


    After creating a class then we write some code for generating a table name or attribute name like StudentID, StudentName

    In Student.cs file -


    So, write this command in your code...as it as same and don't forget to add LINE no 5 code (System.ComponentModel.DataAnnotations;)


     

    [Key]
    public int StudentID { get; set; }
    public string StudentName { get; set; }
    
    
    

     



     

     

     

    NOTE - The get method returns the value of the variable name . The set method assigns a value to the name variable. The value keyword represents the value we assign to the property.
     

    Then go to IdentityModels.cs file write this command also.
     

     

    public DbSet <Student> Student { get; set; }
    
    

     


     



     

     

    Save all file (ctrl + s).
     

     


    Before diving into long sea..let's build first and create a migrations, add migrations and update-database.


    For this Click on Build --> Build Solution
     

     


     

     


     

     


    Then,

    Go to Tools --> NuGet Package Manager --> Package Manager Console
     

     



    enable-migrations 





    And at the same time you are able to see that the file is being created inside the migrations.
     

     


     

     

    add-migration init 

     

     


     

     


     

     

    update-database

     

     


     

     


    • The Enable-Migration command creates the Migrations folder, which contains a script to initialize the database. 
    •  
    • (init is a migration name)
    •  
    • Update the database for any kind of changes





    Now, after updating the database as you can see this in Server explorer section

    Data connection --> Tables --> Table name (in our case Students is table name).

     


     

     

     

    Add Web API Controller



    So before proceeding here on the left side you are able to see some options, with the help of which we will create controller class, model class.

    For create a Controller class right click on controller --> Add --> choose Controller option.
     

     


     

     

    Choose MVC 5 Controller - Empty and then click on Add button.





    This will open Add Scaffold popup as shown below.

     

     


     

     

    Attention Please in Add Controller popup tab, here Controller name is DefaultController. So, Remove "Default" word and type any name whatever you want (in our case we are going to write "Student") then click on Add button.





     

     

     


    In StudentController.cs file write some code for doing a CRUD operation... but first we are doing a Create operation.

    Type this command -




     

    [HttpPost]
    public ActionResult Create(Student s)
            {
             ApplicationDbContext db = new ApplicationDbContext();
             db.Student.Add(s);
             db.SaveChanges();
             return View();
            }
    
    
    

     


     

     


    If in case any error are there like this shown below, then tension we are here for your help.

    Simple mouse click on this red line error and as you can see that A yellow light bulb appear here so click on little arrow and choose "using WebApplication2.Models; (In your case this name may be different, don't worry)

     


     

    Hurray Error is gone :-) :-p


    and "using WebApplication2.Models;" line is added on StudentController.cs file. DONE





     

     


    Hurray Error is gone :-) :-p





    and "using WebApplication2.Models;" line is added on StudentController.cs file. DONE
     

     



    Now, we will create a Add view. So, for this you have to right click on "Create" --> Add view --> and choose the correct all option as it as same.







    then Click on Add button.



    This will open Add Scaffold popup as shown below.





    In solution explorer, there are appear Create.cshtml file.






    and finally we will run.

    ctrl + F5

    or

    Click on Middle top side Green color button...click on it.


     





    public ActionResult Display()
            {
                ApplicationDbContext db = new ApplicationDbContext();
                var lst = db.Student.ToList();
                return View(lst);
            }
            public ActionResult Details(int id)
            {
                ApplicationDbContext db = new ApplicationDbContext();
                var s = db.Student.Where(x => x.StudentID == id).SingleOrDefault();
                return View(s);
            }
    
    


    Please Be Patience We Will Update Very Soon :-)



    Disclaimer

     

     

    All tutorials are for informational and educational purposes only and have been made using our own routers, servers, websites and other vulnerable free resources. we do not contain any illegal activity. We believe that ethical hacking, information security and cyber security should be familiar subjects to anyone using digital information and computers. Hacking Truth is against misuse of the information and we strongly suggest against it. Please regard the word hacking as ethical hacking or penetration testing every time this word is used. We do not promote, encourage, support or excite any illegal activity or hacking.



  • WHAT WE DO

    We've been developing corporate tailored services for clients for 30 years.

    CONTACT US

    For enquiries you can contact us in several different ways. Contact details are below.

    Hacking Truth.in

    • Street :Road Street 00
    • Person :Person
    • Phone :+045 123 755 755
    • Country :POLAND
    • Email :contact@heaven.com

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

    Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation.