Batch file are mainly used to do repeat tasks. Instead of typing in a commands over and over again to do a certain task, you can create a batch file that does it all automatically by performing a bulk set of commands.
So why should hackers know batch programming? Well I’ll give you a few ideas and you can decide on your own:
Attacks:
- DNS Poisoning
- Packet Flooders
- Dictionary attacks
- Creating Viruses
- Service Disabler
- Clearing Logs
Annoyance:
- Bombers (Fork, Broadcast)
- Message Annoyers
- Flooders (user, folders)
- Extension changer (ex. html -> exe)
- Keystroke re-mapper
Note: Do Not Use Any eBook Of This Blog To Harm Anyone. This Is Only For Educational Purpose. I Will Not Be Responsible For Anything Done By You.
Size: 3.79 MB
Size: 3.79 MB
Blinking Lights on Keyboard
c programming examples
background-color: #565656;