Category: Miscellaneous

  • Part 2: Finding the IP address of your Victim in your VMware Hacking Lab Network

    Part 2: Finding the IP address of your Victim in your VMware Hacking Lab Network

    This article is the continuation of Part 1 which is for the virtualbox. In case, you have missed it, here is the link: http://www.anonhack.in/2018/06/finding-the-ip-address-of-your-victim-in-your-hacking-lab-network/. This article will help you find the IP address if you use VMware instead of VirtualBox. The commands are same and so does everything but just VMware. Requirements: Kali OS [You can…

  • Part 1: Finding the IP address of your Victim in your VirtualBox Hacking Lab Network

    Part 1: Finding the IP address of your Victim in your VirtualBox Hacking Lab Network

    This article will give you ways to find the ip address of the vulnerable /victim machine in your hacking lab environment in your network. A reader of my blog recently asked me to write about CTF challenges from very basics. I am really glad to get a suggestion. So, here is what you asked for.…

  • Program to find factorial of a number using function in C language

    Below is the program to find factorial of a number using function in C language. The program has been compiled and executed in Dev C++. The function is a block of code that is specifically designed to do a certain task. Here, the function is taking an argument and calculating the factorial returning its resulting…

  • Program to display series and find sum of 1+3+5+…+n in C language

    Program to display series and find sum of 1+3+5+…+n in C language

    The series 1+3+5+..+n, is a series of odd number. We need to write a program to display this series as well as find the sum upto nth number. The n will be inserted by the user. The program has been compiled and executed under DEV c++. CODE: #include void main() { int i,n,sum=1; printf(“Enter any…

  • Program to show Call by Value and Call by Reference in C Language

    Program to show Call by Value and Call by Reference in C Language

    This article will illustrate the use of Call by Value and Call by Reference in C Programming language. C Language provide several features. Before, we talk about call by reference and call by value, let’s have a little talk about functions in C because both of them are used within the functions itself. A function…

  • Recovery guide for windows Laptop for Blue Screen of Death

    Recovery guide for windows Laptop for Blue Screen of Death

    This article is a recovering guide for when you can’t start windows and can’t recover the important files. I have this problem for a while now. My laptop had windows 8 installed in it. I did not upgrade it to windows 10 and stayed with windows 8.1 up-gradation. After sometime, I have been seeing blue…

  • BIOS settings to run Bootable LIVE USB

    BIOS settings to run Bootable LIVE USB

    This is a guide to change the BIOS settings to boot your live USB. The BIOS stands for Basic Input output system, which defines the basic settings for hardware that is used for initial boot up settings of the device. It defines from where the OS will boot first, also the virtualization capabilities can be…

  • Creating Bootable LIVE USB using win32DiskImager

    Creating Bootable LIVE USB using win32DiskImager

    Win32DiskImager can be downloaded from https://sourceforge.net/projects/win32diskimager/. Win32DiskImager is a wonderful tool to create a LIVE bootable USB Flashdrive. It is freely available for download. Win32DiskImager is similar to unetbootin but it is more reliable. It works great with any Operating system. In case you haven’t checked my last post for unetbootin you can visit here. Creating…

  • Creating a Bootable LIVE USB flash drive using Unetbootin on Windows

    Creating a Bootable LIVE USB flash drive using Unetbootin on Windows

    Bootable LIVE USB stick will help you run any Operating System on your PC. The Privileges will not be much but it will still give help you in a lot of ways. The Bootable USB drives is created with the help of normal USB drives. Depending on the operating system, you can use 4 GB…

  • OVERTHEWIRE:BANDIT WALKTHROUGH SERIES 23-25 LEVELS

    OVERTHEWIRE:BANDIT WALKTHROUGH SERIES 23-25 LEVELS

    This is overthewire series with bandit walkthrough from level 23 – 26. If you haven’t gone through the previous articles on OVERTHEWIRE Bandit then follow the links below! http://www.anonhack.in/2018/04/overthewire-bandit-walkthrough-series/ http://www.anonhack.in/2018/04/overthewirebandit-walkthrough-series-6-10-levels/ http://www.anonhack.in/2018/04/overthewirebandit-walkthrough-series-12-15-levels/ http://www.anonhack.in/2018/04/overthewirebandit-walkthrough-series-15-18-levels/ Level 22 – 23 Login into bandit22 with the password we obtained in the article above. The hint for this level says: A…

  • Program to print Transpose of a matrix in C language

    The following program print the transpose of the matrix in C. The transpose of a matrix makes the row to column and column to row. If the matrix is in the form a[3][2] then the transpose of such a matrix will be a[2][3]. About the Code: The code is written in two dimensional array taking…

  • How to hide a folder and file in windows

    How to hide a folder and file in windows

    This article will guide on how to hide your folder in windows. I am writing this article because a lot of people don’t know the customization tools that we have on windows. Windows provide us with a lot of features. When you share your PC with your siblings, family members etc., It is really hard…