If you are working in School / Colleges and if you want to hack your friends & college mate PC then here is a trick
What we are going to use?
- Windows Os
- Cain And Abel
Procedure
Step 1:- Finding the target
First of all we need to find a computer to hack into.
So if you are plugged into the
LAN, or connected to the WAN, you can begin.
Open up Cain and Abel tool .
This
utility has a built-in sniffer feature. A sniffer looks for all IP addresses in
same LAN or WAN .
Once you have opened up the program click on the sniffer tab,
then click on the Start/Stop sniffer, and
then click on the blue cross.
After doing all this another window will pop up, make sure
“All host in my subnet” is selected
And
then press ok.
It will begin to scan.
Then you will be able to see IP’s, computer names, and Mac
addresses .
Now, make a note of the IP address of the computer you are
want to access
If you don’t know whether the IP address is a computer, router,
modem, etc, no big deal .
During the next step we are going to do trial and error.
Step 2:- Trial and error
Now, we don’t know if we have a computer’s IP or router’s IP
, or whatever else is on the LAN or WAN.
If you did get the IP of the target though, I still
recommend you to read all steps in this section, as it could be helpful later
on.
Click on the start menu and go to run, type in cmd, and
press ok.
This will open up the command prompt.
And the real game begins here . From here we will do most of
the hacking.
Now I am going to tell you certain commands that are needed
to be put into the command prompt.
I will put these commands in quotes, but do not put the quotes
in the code when you enter it into the prompt.
I am doing this because I don’t want you to get confused .
Let’s get back to the hacking.
Type “ping (IP
address of the target).”
For example in this tutorial, “ping 192.168.1.103.”
This will tell us if the target is online or not.
If it worked, it will look something like below (note, I
have erased out private information):
If it didn’t work,
meaning that the target is offline, it will look something like this:
If the target is not online, switch to a different target, or better luck
next time
If the target is online, then we can proceed further.
Step 4:– Gathering the information
Now, enter this command “nbtstat –a (IP address of target).”
For example “nbtstat –a 192.168.1.103.”
This will let us know if there is file sharing enabled, and
if there is, it will give us the:
currently logged on user, workgroup, and computer name.
Step 5:- Getting In
Finally it’s time.
Until now we know:-that our target is online, our target has
enabled file sharing, and our target’s computer name.
So it’s time to get in.
We will now locate the shared drives, folders, files, or
printers.
Type in “net view (IP Address of Target)”
For example : “net view 192.168.1.103”
We have found our share name. In my case, under the share
name is “C,” meaning that the only shared thing on the computer is C.
Then to the right, under Type, it says “Disk.” This means
that it is the actual C DISK of the computer. The C DISK can be an entire hard
drive.
As you can see, for my hack I have already used “K,” so I
used “G” instead.
You can also do the same for multiple hacks.
If it worked, it will say “The command completed
successfully.”
If not, you will have to check again your steps.
Now open up “my computer” , and your newly created network
drive should be there.
There you go you have got access to that drive and pc .
There you go you have got access to that drive and pc .
Note:- Now, if you get disconnected from your WAN or LAN, you will not be able to access this drive, hence the name Network Drive as it works on network.
The drive will not be deleted after you disconnect though,
you can get access to it again for that you just need to get connected to same
WAN or LAN.
So if you are doing this for the files in that drive, I will
recommend you to copy the files and folders into the hard disk of your
computer, because you never know if the target disables the sharing setting.
Commands which are used in this tricks:-
- PING
- NBTSTAT -a (IP Address of Target)
- NET VIEW (IP Address of Target)
- NET USE K: (IP Address of Target)(SHARENAME) –
Program which are used in this trick:-
- Cain and Abel.
Comments
Post a Comment