Showing posts with label computer hacking. Show all posts
Showing posts with label computer hacking. Show all posts

Tuesday, July 5, 2016

LEARNING VB 2015

In previous lesson, we have learned how to build an interface in Visual Basic 2015 by customizing the default form. In this lesson, we shall continue to build the interface by adding controls to the form. There are numerous controls that we can add to the form. Among the controls, the most common ones are button, label, text box, list box, combo box, picture box, check box, radio and more.The controls can be made visible or invisible at runtime. However, some controls will only run in the background and cannot be seen at runtime, one such control is the timer.






3.1 Positioning the Toolbox

The Toolbox is usually docked at the right bottom corder of the Visual Basic 2015 IDE. If the toolbox is hidden when you start Visual Basic 2015,you can click View on the menu bar and then select Toolbox to reveal the tool box, as shown in Figure 3.1. You can also use shortcut keys Ctrl+Alt+x to bring out the toolbox.
vb2015_fig3.1Figure 3.1: Visual Basic 2015 IDE Toolbox
You can change the position of the tool box by dragging it to anywhere you like while its status is set to float. You can also dock the tool box by right-clicking on the tool box and choose dock from the pop-up menu  . The docked tool box that appears as tabbed document with the default form is as shown in Figure 3.2.
vb2015_fig3.2Figure 3.2: Toolbox appears as tabbed document

Further, you may also pin the tool box to the side bar or the bottom bar by clicking on the pin icon on the menu bar of the tool box.
How and where you want to position your tool box in Visual Basic 2015 IDE is entirely up to you but I strongly suggest that you place the tool box along side or at the bottom of the default form so that it is easy for you to add controls from the tool box into the form. You should never cover the form with the tool box because it will be difficult to add controls to the form.
3.2 Adding Controls to the Form and Changing Their Properties
Adding controls to the form is an easy task, what you need to do is drag a control from the tool box and drop it onto the form or draw it on the form. You can drag the control around the form and you can also resize it easily.
To demonstrate how to add controls and then change their properties, we shall design a picture viewer. First, change the title of the default form to Picture Viewer in its properties window. Next, insert a picture box on the form and change its background color to white. To do this, right click the picture box and select properties in the popup menu, then look for the BackColor Property in the properties window. Next , add two buttons to the form and change the text to View and Close in their respective properties windows. Now, we have designed a basic picture viewer using Visual Basic 2015. We shall add more features later.
The picture viewer is not functional until we write code to response to events triggered by user. We will deal with the programming part in the coming lessons.
The design interface is as shown in Figure 3.3
vb2015_fig3.3

Wednesday, December 23, 2015

Chat with Friends through Command Prompt

1) All you need is your friend's IP Address and your Command Prompt.

2) Open Notepad and write this code as it is.....!

@echo off
:A
Cls
echo MESSENGER
set /p n=User:
set /p m=Message:
net send %n% %m%
Pause
Goto A


3) Now save this as "Messenger.Bat".

4) Open Command Prompt.

5) Drag this file (.bat file) over to Command Prompt and press Enter.

6) You would then see something like this:



7) Now, type the IP Address of the computer you want to contact and press enter
You will see something like this:



8) Now all you need to do is type your message and press Enter.
Start Chatting.......!


DONE....ENJOY.~!!

RUN Commands

START >> RUN
Accessibility Controls
access.cpl
Add Hardware Wizard
hdwwiz.cpl
Add/Remove Programs
appwiz.cpl
Administrative Tools
control.exe admintools
Automatic Updates
wuaucpl.cpl
Bluetooth Transfer Wizard
fsquirt
Calculator
calc
Certificate Manager
certmgr.msc
Character Map
charmap
Check Disk Utility
chkdsk
Clipboard Viewer
clipbrd
Command Prompt
cmd
Component Services
dcomcnfg
Computer Management
compmgmt.msc
Date and Time Properties
timedate.cpl
DDE Shares
ddeshare
Device Manager
devmgmt.msc
Direct X Control Panel (if installed)
directx.cpl
Direct X Troubleshooter
dxdiag
Disk Cleanup Utility
cleanmgr
Disk Defragment
dfrg.msc
Disk Management
diskmgmt.msc
Disk Partition Manager
diskpart
Display Properties
control.exe desktop
Display Properties
desk.cpl
Display Properties (w/Appearance Tab Preselected)
control.exe color
Dr. Watson System Troubleshooting Utility
drwtsn32
Driver Verifier Utility
verifier
Event Viewer
eventvwr.msc
File Signature Verification Toolsigverif
Findfast
findfast.cpl
Folders Properties
control.exe folders
Fonts
control.exe fonts
Fonts Folder
fonts
Free Cell Card Game
freecell
Game Controllers
joy.cpl
Group Policy Editor (XP Prof)
gpedit.msc
Hearts Card Game
mshearts
Iexpress Wizard
iexpress
Indexing Service
ciadv.msc
Internet Properties
inetcpl.cpl
Java Control Panel (if installed)
jpicpl32.cpl
Java Control Panel (if installed)
javaws
Keyboard Properties
control.exe keyboard
Local Security Settings
secpol.msc
Local Users and Groups
lusrmgr.msc
Logs You Out Of Windows
logoff
Microsoft Chat
winchat
Minesweeper Game
winmine
Mouse Properties
control.exe mouse
Mouse Properties
main.cpl
Network Connections
control.exe netconnections
Network Connections
ncpa.cpl
Network Setup Wizard
netsetup.cpl
Nview Desktop Manager (if installed)
nvtuicpl.cpl
Object Packager
packager
ODBC Data Source Administrator
odbccp32.cpl
On Screen Keyboard
osk
Opens AC3 Filter (if installed)
ac3filter.cpl
Password Properties
password.cpl
Performance Monitor
perfmon.msc
Performance Monitor
perfmon
Phone and Modem Options
telephon.cpl
Power Configuration
powercfg.cpl
Printers and Faxes
control.exe printers
Printers Folder
printers
Private Character Editor
eudcedit
Quicktime (If Installed)
QuickTime.cpl
Regional Settings
intl.cpl
Registry Editorregedit
Registry Editor
regedit32
Removable Storage
ntmsmgr.msc
Removable Storage Operator Requests
ntmsoprq.msc
Resultant Set of Policy
rsop.msc
Resultant Set of Policy (XP Prof)
rsop.msc
Scanners and Cameras
sticpl.cpl
Scheduled Tasks
control.exe schedtasks
Security Center
wscui.cpl
Services
services.msc
Shared Folders
fsmgmt.msc
Shuts Down Windows
shutdown
Sounds and Audiommsys.cpl
Spider Solitare Card Gamespider
SQL Client Configuration
cliconfg
System Configuration Editorsysedit
System Configuration Utility
msconfig
System File Checker Utility
sfc
System Properties
sysdm.cpl
Task Manager
taskmgr
Telnet Client
telnet
User Account Management
nusrmgr.cpl
Utility Manager
utilman
Windows Firewall
firewall.cpl
Windows Magnifier
magnify
Windows Management Infrastructure
wmimgmt.msc
Windows System Security Tool
syskey
Windows Update Launches
wupdmgr
Windows XP Tour Wizard
tourstart
Wordpad
write
Try them out..


windows xp coding
...........................................................................................................................................
ALT+- (ALT+hyphen) Displays the Multiple Document Interface (MDI) child window's System menu ALT+ENTER View properties for the selected item
ALT+ESC Cycle through items in the order they were opened ALT+F4 Close the active item, or quit the active program
ALT+SPACEBAR Display the System menu for the active window
ALT+TAB Switch between open items
ALT+Underlined letter Display the corresponding menu
BACKSPACE View the folder one level up in My Computer or Windows Explorer
CTRL+A Select all
CTRL+B Bold
CTRL+C Copy
CTRL+I Italics
CTRL+O Open an item
CTRL+U Underline
CTRL+V Paste
CTRL+X Cut
CTRL+Z Undo
CTRL+F4 Close the active document
CTRL while dragging Copy selected item
CTRL+SHIFT while dragging Create shortcut to selected iteM
CTRL+RIGHT ARROW Move the insertion point to the beginning of the next word

CTRL+LEFT ARROW Move the insertion point to the beginning of the previous word
CTRL+DOWN ARROW Move the insertion point to the beginning of the next paragraph
CTRL+UP ARROW Move the insertion point to the beginning of the previous paragraph
SHIFT+DELETE Delete selected item permanently without placing the item in the Recycle Bin
ESC Cancel the current task
F1 Displays Help
F2 Rename selected item
F3 Search for a file or folder
F4 Display the Address bar list in My Computer or Windows Explorer
F5 Refresh the active window
F6 Cycle through screen elements in a window or on the desktop
F10 Activate the menu bar in the active program
SHIFT+F10 Display the shortcut menu for the selected item
CTRL+ESC Display the Start menu
SHIFT+CTRL+ESC Launches Task Manager
SHIFT when you insert a CD Prevent the CD from automatically playing
WIN Display or hide the Start menu
WIN+BREAK Display the System Properties dialog box
WIN+D Minimizes all Windows and shows the Desktop
WIN+E Open Windows Explorer
WIN+F Search for a file or folder
WIN+F+CTRL Search for computers
WIN+L Locks the desktop
WIN+M Minimize or restore all windows
WIN+R Open the Run dialog box
WIN+TAB Switch between open items


HIdden Run Commands
Hidden Bluetooth software in windowsXp:
>START
>RUN
>FSQUIRT
Restoring a Lost Desktop-


>Start
>Run
Type a period " . "
Then press Enter

R You Playing Game In Ur pc?

Want To Do It Advance?
Try This Trick
GoTo
-run
-type joy.cpl
DONE!

If ur PC is hanged then do this.


Press shift+ctrl+esc
n den click on 'END TASK'
ur PC is runing now


create folder without name

>select any folder
>rename it
>press alt & type 0160
>enter

Amazing trick for use


Windows Backup Utility if installed
go to run
type ntbackup
ok
Now use backup

Disable CD Autorun
1) Click Start, Run and enter GPEDIT.MSC
2) Go to Computer Configuration, Administrative Templates, System.
3) Locate the entry for Turn autoplay off and modify it as you desire.


Remove the Recycle Bin from the Desktop
If you don't use the Recycle Bin to store deleted files , you can get rid of its desktop icon all together.
Run Regedit and go to:
HKEY_LOCAL_MACHINE/SOFTWARE/Microsoft/Windows/CurrentVersion/explorer/Desktop/NameSpace

Click on the "Recycle Bin" string in the right hand pane. Hit Del, click OK.


Hide 'User Accounts' from users

Go to Start/Run, and type:
GPEDIT.MSC
Open the path
User Config > Admin Templates > Control Panel
doubleclick "Hide specified Control Panel applets"
put a dot in 'enabled', then click 'Show"
click Add button,
type "nusrmgt.cpl" into the add box

Turn off Welcome screen
Open User Accounts in Control Panel.
Click Change the way users log on or off

Hack Victim Computer

How To Hack & Access Same LAN Computers ?
If you are working in Office / Colleges and want to hack your friends & college mate PC then here is a trick.

First Step press win+ R

Go to Run> Type Cmd

now type command net view

It will be look as below


C:\>net view

Server Name Remark
-----------------------------------------------
\\xyz
\\abc



Here you can get all the names of all the computers machine names which connect with your LAN.

Now you got the name. Lets start hacking into the systems.

After you get server name now type tracert command for knowing IP of the victim machine.

Example: C:\> tracert xyz

Here you get the IP address of the XYZ computer machine.

Now go to windows start button and type Remote Desktop Connection

After click on Remote Desktop Connection you get below image..


Now type the IP address or computer name of victim machine.

Click on Connect <-|
It will also ask administrator password which is common as usual you known about.

After few second Victim machine shown in your Computer..
Now you can access that machine to open website, files, Software's, etc

Enjoy the trick..

MAKING A KEYGEN.

Tutorial on making of  Key Generators
Tools!
For tools you need a minimum of debugger like SoftIce for Windows (hence WinIce), and a C compiler with Dos libraries.
Content!
In this tutorial I will show how to make a key-gen for Ize and Swiftsearch. The protection that these programs use is the well known Enter-Name-and-Registration-Number method. After selecting ‘register’, a window pops up where you can enter your name and your registration number. The strategy here is to find out where in memory the data you enter is stored and then to find out what is done with it.
Part 1: Scanline Swiftsearch 2.0!
Swiftsearch is a useful little program that you can use to search on the web. I will explain step by step how to crack it.
step 1. Start the program :)
step 2: Choose register from the menus. You will now get a window where you can enter your name and your registration number.
step 3: Enter SoftIce (ctrl-d)
step 4: We will now set a breakpoint on functions like GetWindowText(a) and GetDlgItemText(a) to find out where in memory the data that we just entered is stored. The function that is used by this program is GetDlgItemTexta (trial and error, just try yourself :) so, in SoftIce type BPX GetDlgItemTexta and exit SoftIce with the g command.
step 5: Now type a name and a registration number (I used PANKAJMISHRA and 12345) and press OK, this will put you back in SoftIce. Since you are now inside the GetDlgItemTexta function press F11 to get out of it. You should see the following code:
lea eax, [ebp-2C] :<— we are looking for this location
push eax
push 00000404
push [ebp+08]
call [USER32!GetDlgItemTextA]
mov edi, eax :<— eax has the length of the string
and is stored in edi for later usage.
We see that EAX is loaded with a memory address and then pushed to the stack as a parameter for the function GetDlgItemTextA. Since the function GetDlgItemTextA is already been run we can look at EBP-2c (with ED EDP-2c) and see that the name we entered is there. Now we know where the name is stored in memory, normally it would be wise to write that address down, but we will see that in this case it wont be necessary.
So, what next? Now we have to allow the program to read the registration number we entered. Just type g and return and when back in SoftIce press F11. You should see the following code:
push 0000000B
lea ecx, [ebp-18] : <–So, ebp-18 is where the reg. number
push ecx : is stored.
push 0000042A
push [ebp+08]
call [USER32!GetDlgItemTextA]
mov ebx, eax : <–save the lenght of string in EBX
test edi, edi : <–remember EDI had the lenght of the
jne 00402FBF : name we entered?
We see that the registration number is stored at location EBP-18 , check it with ED EBP-18. Again, normally it would be wise to note that address down. Also we see that it is checked if the length of the name we gave was not zero. If it is not zero the program will continue.
Step 6: Ok, now we know where the data we entered is stored in memory. What next?
Now we have to find out what is DONE with it. Usually it would we wise to put breakpoints on those memory locations and find out where in the program they are read. But in this case the answer is just a few F10’s away. Press F10 until you see the following code :
cmp ebx, 0000000A :<–remember EPX had the length of the
je 00402FDE : registration code we entered?
These two lines are important. They check if the length of the registration code we entered is equal to 10. If not the registration number will be considered wrong already. The program wont even bother to check it. Modify EBX or the FLAG register in the register window to allow the jump. Continue Pressing F10 until you get to the following code (note that the adresses you will see could be different) :
:00402FDE xor esi, esi :<– Clear ESI
:00402FE0 xor eax, eax :<– Clear EAX
:00402FE2 test edi, edi
:00402FE4 jle 00402FF2
:00402FE6 movsx byte ptr ecx, [ebp + eax – 2C] :<– ECX is loaded with a letter of the name we entered.
:00402FEB add esi, ecx :<– Add the letter to ESI
:00402FED inc eax :<– Increment EAX to get next letter
:00402FEE cmp eax, edi :<– Did we reach the end of the string?
:00402FF0 jl 00402FE6 :<– If not, go get the next letter.
Well, we see that the program adds together all the letters of the name we entered. Knowing that ESI contains the sum of the letters, lets continue and find out what the program does with that value :
:00402FF2 push 0000000A
:00402FF4 lea eax, [ebp-18] :<– Load EAX with the address of the reg. number we entered
:00402FF7 push 00000000
:00402FF9 push eax :<– Push EAX (as a parameter for the following function)
:00402FFA call 00403870 :<– Well, what do you think this function does? :)
:00402FFF add esp, 0000000C
:00403002 cmp eax, esi :<– Hey!
:00403004 je 00403020
We see that a function is called and when RETurned ESI is compared with EAX. Hmm, lets look at what’s in EAX. A ‘? EAX’ reveals :
00003039 0000012345 “09”
Bingo. That’s what we entered as the registration number. It should have been what’s inside
ESI. And we know what’s inside ESI, the sum of the letters of the name we entered!
Step 7: Now we know how the program computes the registration code we can make a key-gen.
But we should not forget that the program checks also that the registration number has 10
digits.
A simple C code that will compute the registration number for this program could look like this:
#include <stdio.h>
#include <string.h>
main()
{
char Name[100];
int NameLength,Offset;
long int Reg = 0, Dummy2 = 10;
int Dummy = 0;
int LengtDummy = 1;
int Lengt , Teller;
printf(“Scanline SwiftSearch 2.0 crack by PANKAJMISHRA.\n”);
printf(“Enter your name: “);
gets(Name);
NameLength=strlen(Name);
/* the for lus calculates the sum of the letters in Name */
/* and places that value in Reg */
for (Offset=0;Offset<NameLength;Offset=Offset+1)
{
Reg=Reg+Name[Offset];
}
/* the while lus calculates the lenght of the figure in */
/* Reg and places it in Lengt */
while (Dummy != 1)
{
if ( Reg < Dummy2 )
{ Lengt = LengtDummy ; Dummy =1;
}
else
{ LengtDummy=LengtDummy + 1; Dummy2=Dummy2*10;
}
};
printf(“\nYour registration number is : ” );
/* First print 10-Lengt times a 0 */
Lengt=10-Lengt;
for (Teller=1;Teller<=Lengt;Teller=Teller+1) printf(“0”);
/* Then print the registration number */
printf(“%lu\n”,Reg);
}
Case 2 Ize 2.04 from Gadgetware
Ize from Gadgetware is a cute little program that will put a pair of eyes on your screen which will
follow your mousepointer. It has a register function where you can enter your name and a registration
number. The strategy in this case is still the same : Find out where in memory the entered information
is stored and then find out what is done with that information.
Step 1: Start Ize. Chose register and enter a name and a number. I used ‘PANKAJMISHRA’ and ‘12345’.
Sterp 2: Enter (CTRL-D) Softice and set a breakpoint on GetDlgItemTextA.
Step 3: Leave SoftIce and press OK. This will put you back in Softice. You will be inside the GetDlgItemTextA
function. To get out of it press F11. You should see the following code :
mov esi, [esp + 0C]
push 00000064
push 0040C3A0 :<–On this memory location the NAME we entered will be stored.
mov edi, [USER32!GetDlgItemTextA] :<–Load edi with adress of GetDlgItemTextA
push 00004EE9
push esi
call edi :<– Call GetDlgItemTextA
push 00000064 :<– (you should be here now)
push 0040C210 :<–On this memory location the NUMBER we entered will be stored
push 00004EEA
push esi
call edi :<– Call GetDlgItemTextA
We see that the function GetDlgItemTextA is called twice in this code fragment. The first call has
already happened. With ED 40C3A0 we can check that the name we entered is stored on that location.
To allow the program to read in the number we entered we type G and enter. Now we are inside the Get-
DlgItemTextA function again and we press f11 to get out of it. We check memory location 40C210 and
we see the number we entered is stored there.
Now we know the locations were the name and the number are stored,we note those down!
Step 4: Ok, what next? We now know where in memory the name and the number are stored. We need to find out
what the program does with those values. In order to do that we could set breakpoints on those memory
locations to see where they are read. But in this case it wont be necessary. The answer is right after the
above code :
push 0040C210 :<–save the location of the number we entered (as a parameter for the next call)
call 00404490 :<– call this unknown function
add esp, 00000004
mov edi, eax :<– save EAX (hmmmm)
We see a function being called with the number-location as a parameter. We could trace into the function and see what it does, but that is not needed. With your experience of the Swiftsearch
example you should be able to guess what this function does. It calculates the numerical value of the registration number and puts it in EAX. To be sure we step further using F10 untill we are past the call and check the contents of EAX (with ? EAX). In my case it showed : 00003039 0000012345 “09”.
Knowing that EDI contains our registration number we proceed:
push 0040C3A0 :<– save the location of the name we entered (as a parameter for the next call)
push 00409080 :<– save an unknown memory-location (as a parameter for the next call)
call 004043B0 :<–call to an unknown function
add esp, 00000008
cmp edi, eax :<–compare EDI (reg # we entered) with EAX (unknown, since the previous call changed it)
jne 004018A1 :<–jump if not equal
We see that a function is called with two parameters. One of the parameters is the location of the name
we entered. The other we dont know, but we can find out with ED 409080. We see the text ‘Ize’.
This function calculates the right registration number using those two parameters. If you just want to
crack this program, you can place a breakpoint right after the call and check the contents of EAX. It will
contain the right registration number. But since we want to know HOW the reg. # is calculated we will trace inside the function (using T). We will then try to find out HOW the contents of EAX got in there.
Step 5: Once inside the interesting function you will see that we are dealing with a rather long function. It wont be necessary for me to include the complete listing of this function, because we wont need all of it to make our key-gen.
But in order find out which part of the code is essential for the computation of the right registration number, you have to trace STEP by STEP and figure out what EXACTLY is going on!
Afther doing this i found out that the first part of the function computes some kind of “key”. Then this
“key” is stored in memory and in that way passed on to the second part of the function.
The second part of the function then computes the right registration number, based on this “key” AND
the name we entered.
The code that is essential and that we need for our key-gen is the following:
( Note that before the following code starts, the registers that are used will have the following values:
EBX will point to the first letter of the name we entered,
EDX will be zero,
EBP will be zero,
The “key” that we talked about earlier is stored in memory location 0040B828 and will
have 0xA4CC as its initial value. )
:00404425 movsx byte ptr edi, [ebx + edx] :<– Put first letter of the name in EDI
:00404429 lea esi, [edx+01] :<– ESI gets the “letter-number”
:0040442C call 00404470 :<– Call function
:00404431 imul edi, eax :<– EDI=EDI*EAX (eax is the return value of the the previous call)
:00404434 call 00404470 :<– Call function
:00404439 mov edx, esi
:0040443B mov ecx, FFFFFFFF
:00404440 imul edi, eax :<– EDI=EDI*EAX (eax is the return value of the previous call)
:00404443 imul edi, esi :<– EDI=EDI*ESI ( esi is the number of the letter position)
:00404446 add ebp, edi :<– EBP=EBP+EDI (beware that EBP will finally contain the right reg#)
:00404448 mov edi, ebx :<–these lines compute the lenght of the name we entered
:0040444A sub eax, eax :<–these lines compute the lenght of the name we entered
:0040444C repnz :<–these lines compute the lenght of the name we entered
:0040444D scasb :<–these lines compute the lenght of the name we entered
:0040444E not ecx :<–these lines compute the lenght of the name we entered
:00404450 dec ecx :<– ECX now contains the lenght of the name
:00404451 cmp ecx, esi
:00404453 ja 00404425 :<– If its not the end of the name , go do the same with the next letter
:00404455 mov eax, ebp :<– SAVE EBP TO EAX !!!!
:00404457 pop ebp
:00404458 pop edi
:00404459 pop esi
:0040445A pop ebx
:0040445B ret
_____
:00404470 mov eax, [0040B828] :<– Put “key” in EAX
:00404475 mul eax, eax, 015A4E35 :<– EAX=EAX * 15A4E35
:0040447B inc eax :<– EAX=EAX + 1
:0040447C mov [0040B828], eax :<– Replace the “key” with the new value of EAX
:00404481 and eax, 7FFF0000 :<– EAX=EAX && 7FFF0000
:00404486 shr eax, 10 :<– EAX=EAX >>10
:00404489 ret
The above code consists of a loop that goes trough all the letters of the name we entered. With each
letter some value is calculated, all these values are added up together (in EBP). Then this value is stored
in EAX and the function RETurns. And that was what we were looking for, we wanted to know how EAX got its value!
Step 6: Now to make a key-gen we have to translate the above method of calculating the right reg# into a
c program. It could be done in the following way :
(Note : I am a bad c programmer :)
#include <stdio.h>
#include <string.h>
main()
{
char Name[100];
int NameLength,Offset;
unsigned long Letter,DummyA;
unsigned long Key = 0xa4cc;
unsigned long Number = 0;
printf(“Ize 2.04 crack by PANKAJMISHRA\n”);
printf(“Enter your name: “);
gets(Name);
NameLength=strlen(Name);
for (Offset=0;Offset<NameLength;Offset=Offset+1)
{
Letter=Name[Offset];
DummyA=Key;
DummyA=DummyA*0x15a4e35;
DummyA=DummyA+1;
Key=DummyA;
DummyA=DummyA & 0x7fff0000;
DummyA=DummyA >> 0x10;
Letter=Letter*DummyA;
DummyA=Key;
DummyA=DummyA*0x15a4e35;
DummyA=DummyA+1;
Key=DummyA;
DummyA=DummyA & 0x7fff0000;
DummyA=DummyA >> 0x10;
Letter=Letter*DummyA;
Letter=Letter*(Offset+1);
Number=Number+Letter;
}
printf(“\nYour registration number is : %lu\n”,Number);
}
Final