Archive for September, 2014

I have references on one computer that uses Google Drive mapped as a “K:” drive.  Some of the software that’s running on that computer saves it’s configuration files and details to the Google Drive area where it’s automatically sync’d to the cloud.  Since I don’t want to change all of the configs to point to a different drive letter, I’ll tell you about a secret DOS command “subst” which can be used to create a virtual drive in Windows Explorer for any of your desired folders.

For example, if you frequently use a folder “E:Wallpapers”, then you can create a virtual drive in Explorer which will directly go to this folder whenever you double click on it or access it from RUN or Command Prompt. It’ll save a lot of time.

Here is how to do it:

1. Open Command Prompt and provide following command:

subst drive_letter: folder_path

for example, if you want to create a virtual drive letter H: for a folder “E:Wallpapers”, then use following command:

subst H: E:Wallpapers


2. It’ll immediately create a virtual drive H: which will represent the “Wallpapers” folder:

Before using subst command:


After using subst command:


3. As you can see. A new drive letter H: has been created which directly goes to “E:Wallpapers” folder upon double-click.

4. If you want to delete this virtual drive, then provide following command:

subst drive_letter: /D

for example, we created H: drive in Step1, so our command to delete this virtual drive would be:

subst H: /D


5. You can view a list of all existing virtual drives by simply giving subst command without any parameter in Command Prompt.


A. Remember! You can’t use existing drive letters for creating virtual drives, e.g. if you have 2 partitions C: and D:, then you can’t use them for subst command.

B. If your folder path contains spaces, put the whole path in double-quotes (“”).

C. You should not use chkdsk, diskcomp, diskcopy, format, label and recover commands on virtual drives created using subst command as these virtual drives are not real and these commands either will not work or can cause problems for the actual drives where the folders reside.

Windows To Go is a feature only in Windows 8 that enhances the mobility of Windows. Like its name says, it puts the whole Windows 8 system with data onto a single USB storage device to make it as a complete mobile operating system that you can boot it up on any of Windows-ready computers, regardless of the running operating system.


In Windows 8.1, Microsoft enhances this cool feature to make it even better by enabling Windows Store access, allowing to download and install apps onto the Windows To Go drive right from the network. It truly makes Windows To Go a workable solution for mobile use.

Building a Windows To Go USB device for Windows 8.1 is also not so difficult. It’s done in the steps exactly like what we explained in Windows 8. In case you missed, let’s take look again.

Things we need

There are a few things we need to prepare before starting building Windows To Go drive.

  1. A 16GB or up USB devices, either flash drive or external hard drive. The larger storage the drive has, the better. It’s also worth mentioning that the performance on an external HD is much better than on a flash drive.
  2. A Windows 8.1 ISO image file. What we really need here is to access to a file named install.wimlocated in sources folder. You can mount the 8.1 Image file in Windows 8, browse through sources folder in Windows Explorer, and copy install.wim file to a convenient location, for example, c:temp folder.
  3. The ImageX.exe file from Windows 7 Automated Installation Kit. For your convenient, you can download from this link directly to save your time. Just right-click the link and choose Save As… to the same folder you have saved install.wim file earlier.
  4. Last, you will need a PC that runs Windows.

That’s all we need. And let’s start building your very first Windows To Go drive.

3 Steps to go

Step 1: prepare the USB drive to make it bootable

Open Command Prompt Window in Admin (press Win+X and select Command Prompt (admin) on Windows 8), type diskpart, and press enter.

diskpart>list disk

diskpart>select disk n  (make sure replacing n with the number shown from the last step)


diskpart>create partition primary

diskpart>format fs=ntfs quick




That’s it. You now have a device that’s ready to put Windows 8 image on.

Step 2: use ImageX to apply the image

In the same Command Prompt window that has the Admin rights, navigate to the location that stores both ImageX.exe and Install.wim files, and type the following command (Figure 1):

ImageX /apply install.wim 1 h:

Assume that H: drive is the drive for the USB device.

Figure 1 - use ImageX to apply image file to USB

This step may take at least 30 minutes to finish, depending on what kind of USB device you are using.

Step 3: apply the boot record

In the same Command Prompt window, type the following command to apply the Windows 8 boot record to the device (Figure 2):

bcdboot.exe h:windows /s h: /f all

Again, H: drive is the drive for the USB device.

Figure 2 - apply boot record

That’s it.

Now, reboot your computer and select Boot to USB from the boot option and complete the final setup to get your Windows To Go ready.

UEFI is nothing new but is first time introduced in Windows 8. If you want to install a clean copy of Windows 8 or Windows 8.1 on a UEFI enabled computer, you will need a UEFI bootable USB flash drive to start with. This is a tutorial to show you how to make such flash drive with and without the help of 3rd party tool.

Option 1: the manual process

1. Connect the USB flash drive to your computer, of course.

2. Open Command Prompt with Admin rights. Press Win+X and choose Command Prompt (Admin) from the list.

3. Type diskpart to start the diskpart built-in utility. And type list disk and make the note of the disk # for the USB drive.

4. Type in the following command to properly format the flash drive. Replace # with the actual # you got from step 3 above.

select disk #
create partition primary
format fs=fat32 quick

5. Now close the Command Prompt window, and open File Explorer, browser through to the location where saves the Windows 8 installation ISO image file.

6. Mount ISO file by right-clicking the ISO file and choosing Mount. If you don’t see Mount command from the context menu, go to Open With → Windows Explorer instead.

7. Select everything in the ISO file, and copy them into the formatted USB flash drive you prepared earlier (Figure 1).

Figure 1 - copying ISO content to USB flash drive

8. One more extra step if you are preparing for a 64-bit version of installation. You will need copy a file called bootmgfw.efi from inside install.wim file at sources folder to efibootfolder on USB flash drive, and rename it to bootx64.efi. Sounds tedious, isn’t it? So let’s put an easy way, you can simply download this file (direct download link) and copy to your efiboot folder.

That’s it. Now, you can boot off from this USB flash drive and start the fresh clean installation. If for some reason it doesn’t work, move to:

Option 2: a tool comes to rescue

Rufus, one of the 4 tools we mentioned to build bootable USB flash drive, is a small utility that creates bootable USB flash drive for Windows 7 or 8. What makes Rufus different is that it offers 3 different partition scheme to target the system type, such as those UEFI based computers. You can make a bootable drive that can directly boot off on a UEFI computer without turning the Secure Boot off. It’s free and portable.

To make a UEFI bootable USB drive,

1. Plug in your USB flash drive, of course.

2. Launch the program. Since it’s portable, you can simply just download and run it.

3. Check the option “Create a bootable disk using: ISO Image“, and click the icon next to it to pick up the ISO image file.

4. Select “GPT partition scheme for UEFI computer“.

Before you click Start button, check to make sure the settings are selected to similar like Figure 2.

Figure 2 - Rufus settings

5. Click Start, and sit back.

Google Hacks

| September 5th, 2014

Useful Google Hacks

Google is #1 ranked search engine in modern Internet. They are a giant who got access to your website, your mobile, your eCommerce site, your IRC site and god knows what else. That means they get a massive amount of information’s and data. Out of those there’s always the chance of leaked sensitive data such as server config, password file, backup file, proprietary materials such as eBooks, Music, PDF, Word Documents, Serial Number etc. In this post I will try to show how to use Google hacks to gather information and looks for exploitable information. If you find something important, please try to contact the owner and report the search string to Google rather than abusing it. I am not responsible how readers might or mights not use the information provided below.






Hacking Security Cameras

Now this is a known one, We’ve all tried it at some point. I am not even sure if this is allowed or not, but I definitely think IP cameras should be more secured so that people can’t look into your Baby Monitor or simple Home Security Cameras. Different vendors provided product specific patches in different times, be sure to spread the word so that you’re not the victim of unsolicited prying.

There exists many security cameras used for monitoring places like parking lots, college campus, road traffic etc. which can be hacked using Google so that you can view the images captured by those cameras in real time. All you have to do is use the following search query in Google. Type in Google search box exactly as follows and hit enter


Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls.

You now have access to the Live cameras which work in real-time. You can also move the cameras in all the four directions, perform actions such as zoom in and zoom out. This camera has really a less refresh rate. But there are other search queries through which you can gain access to other cameras which have faster refresh rates. So to access them just use the following search query.

intitle:”Live View / – AXIS”

Click on any of the search results to access a different set of live cameras. Thus you have hacked Security Cameras using Google.


Hacking Personal and Confidential Documents

Using Google it is possible to gain access to an email repository containing CV of hundreds of people which were created when applying for their jobs. The documents containing their Address, Phone, DOB, Education, Work experience etc. can be found just in seconds.

intitle:”curriculum vitae” “phone * * *” “address *” “e-mail”

You can gain access to a list of .xls (excel documents) which contain contact details including email addresses of large group of people. To do so type the following search query and hit enter.

filetype:xls inurl:”email.xls”

Also it’s possible to gain access to documents potentially containing information on bank accounts, financial summaries and credit card numbers using the following search query

intitle:index.of finances.xls

Hacking Google to gain access to Free Stuffs

Ever wondered how to hack Google for free music or eBooks. Well here is a way to do that. To download free music just enter the following query on Google search box and hit enter.

“?intitle:index.of?mp3 eminem“

Now you’ll gain access to the whole index of Eminem album where in you can download the songs of your choice. Instead of Eminem you can substitute the name of your favorite album. To search for the eBooks all you have to do is replace “Eminem” with your favorite book name. Also replace “mp3? with “pdf” or “zip” or “rar”.


Using specialized search strings in Google

If I remember correctly, recent Google update (from HTTP to HTTPS) and backend modification fixed some of the following issues. However, here goes:



For Example we can find:

  1. Credit Card Numbers
  2. Passwords
  3. Software / MP3’s

…… (and on and on and on) Presented below is just a sample of interesting searches that we can send to Google to obtain info that some people might not want us having.. After you get a taste using some of these, try your own crafted searches to find info that you would be interested in.

Try a few of these searches:

 intitle:”Index of” passwords modified
 “access denied for user” “using password”
 “A syntax error has occurred” filetype:ihtml
 allinurl: admin mdb
 “ORA-00921: unexpected end of SQL command”
 “Index of /backup”
 “Chatologica MetaSearch” “stack tracking:”
 Amex Numbers: 300000000000000..399999999999999
 MC Numbers: 5178000000000000..5178999999999999
 visa 4356000000000000..4356999999999999
 “parent directory ” /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
 “parent directory ” DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
 “parent directory “Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
 “parent directory ” Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
 “parent directory ” MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
 “parent directory ” Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

Notice that I am only changing the word after the parent directory, change it to what you want and you will get a lot of stuff.



Put this string in Google search:

?intitle:index.of? mp3

You only need add the name of the song/artist/singer.

 Example: ?intitle:index.of? mp3 jackson


Put this string in Google search:

inurl:microsoft filetype:iso

You can change the string to whatever you want, ex. Microsoft to adobe, ISO to zip etc…

“# -FrontPage-” inurl:service.pwd

FrontPage passwords.. very nice clean search results listing !!

 “AutoCreate=TRUE password=

This searches the password for “Website Access Analyzer”.

“http://:@www” domainname

This is a query to get inline passwords from search engines (not just Google), you must type in the query followed with the the domain name without the .com or .net

“http://:@www” bangbus or “http://:*@www”bangbus

Another way is by just typing

“sets mode: +k”

This search reveals channel keys (passwords) on IRC as revealed from IRC chat logs.

 allinurl: admin mdb

Not all of these pages are administrator’s access databases containing usernames, passwords and other sensitive information, but many are!


DC Forum’s password file. This file gives a list of (crackable) passwords, usernames and email addresses for DC Forum and for DCShop (a shopping cart program(!!!). Some lists are bigger than others, all are fun, and all belong to Googledorks. =)

intitle:”Index of” config.php

This search brings up sites with “config.php” files. To skip the technical discussion, this configuration file contains both a username and a password for an SQL database. Most sites with forums run a PHP message base. This file gives you the keys to that forum, including FULL ADMIN access to the database.

eggdrop filetype:user user

These are eggdrop config files. Avoiding a full-blown discussion about eggdrops and IRC bots, suffice it to say that this file contains usernames and passwords for IRC users.


This search gets you access to the etc directory, where many many many types of password files can be found. This link is not as reliable, but crawling etc directories can be really fun!

filetype:bak inurl:”htaccess|passwd|shadow|htusers”

This will search for backup files (*.bak) created by some editors or even by the administrator himself (before activating a new version). Every attacker knows that changing the extension of a file on a Web server can have ugly consequences.

Let’s pretend you need a serial number for Windows XP Pro.

In the Google search bar type in just like this –

“Windows XP Professional” 94FBR

the key is the 94FBR code.. it was included with many MS Office registration codes so this will help you dramatically reduce the amount of ‘fake’ porn sites that trick you.

or if you want to find the serial for Winzip 8.1 – “Winzip 8.1? 94FBR

If you managed to find something useful using these search methods, I suggest you try out this guide:

How to hack Remote PC (Windows 2003 server) with Metasploits

Metasploit is a powerful took which helps users to hack their system. It’s easy to use and it’s informative at the same time.


Using special search string to find vulnerable websites

Following search strings in Google will come up with bunch of results. You can try one at a time and run SQLmap to hack a vulnerable website. See complete guide here

inurl:newsitem.php?num= andinurl:index.php?id=

I have shown you this info to let you know that there is a real risk putting your info online. If you do want to buy stuff online make sure the site you are using is secure normally if a site is secure you will see a pop up saying you are now entering a secure part of the site or a symbol of a padlock at the bottom of your browser or just use pay pal, pay pal is very safe to use. But most of the time just use common sense if a site looks cheap it normally hasn’t got the protection to keep your info safe. I am not saying don’t buy stuff online because that is one of the best thing’s about the internet i am just saying be aware of websites that want your bank details and there is no symbol of a padlock at the bottom of your browser.

Thanks for reading. Please share.

Sources and Credits as due: