If you are working in School / Colleges and if you want to hack your friends & college mate PC then here is a trick


What we are going to use?

  1. Windows Os
  2. Cain And Abel

Procedure



Step 1:- Finding the target

First of all we need to find a computer  to hack into.
So if you are plugged into the LAN, or connected to the WAN, you can begin.
Open up Cain and Abel tool .
This utility has a built-in sniffer feature. A sniffer looks for all IP addresses in same LAN or WAN . 
Once you have opened up the program click on the sniffer tab, then click on the Start/Stop sniffer, and then click on the blue cross.




After doing all this another window will pop up, make sure “All host in my subnet” is selected
And then press ok.




It will begin to scan.




Then you will be able to see IP’s, computer names, and Mac addresses .
Now, make a note of the IP address of the computer you are want to access 
If you don’t know whether the IP address is a computer, router, modem, etc, no big deal .
During the next step we are going to do trial and error. 




Step 2:- Trial and error

Now, we don’t know if we have a computer’s IP or router’s IP , or whatever else is on the LAN or WAN. 
If you did get the IP of the target though, I still recommend you to read all steps in this section, as it could be helpful later on.
Click on the start menu and go to run, type in cmd, and press ok. 
This will open up the command prompt.
And the real game begins here . From here we will do most of the hacking.
Now I am going to tell you certain commands that are needed to be put into the command prompt.
I will put these commands in quotes, but do not put the quotes in the code when you enter it into the prompt.
I am doing this because I don’t want you to get confused . 
Let’s get back to the hacking.
Type  “ping (IP address of the target).”
For example in this tutorial, “ping 192.168.1.103.” 
This will tell us if the target is online or not.
If it worked, it will look something like below (note, I have erased out private information):




If it didn’t work, meaning that the target is offline, it will look something like this: 




If the target is not online,  switch to a different target, or better luck next time
If the target is online, then we can proceed further.

Step 4:– Gathering the information

Now, enter this command “nbtstat –a (IP address of target).”
For  example  “nbtstat –a 192.168.1.103.” 
This will let us know if there is file sharing enabled, and if there is, it will give us the:
currently logged on user, workgroup, and computer name. 




Step 5:- Getting In

Finally it’s time.
Until now we know:-that our target is online, our target has enabled file sharing, and our target’s computer name.
So it’s time to get in.
We will now locate the shared drives, folders, files, or printers.
Type in “net view (IP Address of Target)
For example : “net view 192.168.1.103” 




We have found our share name. In my case, under the share name is “C,” meaning that the only shared thing on the computer is C.
Then to the right, under Type, it says “Disk.” This means that it is the actual C DISK of the computer. The C DISK can be an entire hard drive.




As you can see, for my hack I have already used “K,” so I used “G” instead.
You can also do the same for multiple hacks.
If it worked, it will say “The command completed successfully.”
If not, you will have to check again your steps. 
Now open up “my computer” , and your newly created network drive should be there.
There you go you have got access to that drive and pc .  



Note:- Now, if you get disconnected from your WAN or LAN, you will not be able to access this drive, hence the name Network Drive as it works on network.
The drive will not be deleted after you disconnect though, you can get access to it again for that you just need to get connected to same WAN or LAN.
So if you are doing this for the files in that drive, I will recommend you to copy the files and folders into the hard disk of your computer, because you never know if the target disables the sharing setting. 



Commands which are used in this tricks:-


  1. PING
  2. NBTSTAT -a (IP Address of Target)
  3. NET VIEW (IP Address of Target)
  4. NET USE K: (IP Address of Target)(SHARENAME) –

Program which are used in this trick:-


  • Cain and Abel.







Thanks For Reading If You Like This Information And Found It Useful Please Subscribe For Email Alerts 
        
Feel Free To Ask Any Kind Of Help 





Comments

Popular posts from this blog

Crack Instagram Passwords Using Instainsane

Find Out Who’s Tracking You Through Your Android