Shop PCMemoryStore.com Today! MacSpeech Dictate 1.5

Tuesday, December 2, 2008

Getting IP Address of victim computer to hack/access computer remotely

·

Contact Us

In my previous post Tutorial: How to hack remote computer using IP Address,, I have mentioned method used to hack victim computer provided you have his computer IP Address. I received immediate response from readers asking me to post the methods used to know IP address computer. Hence, i have mentioned over here the popular methods used to hack and find IP Address of victim computer so that you can apply hacking trick mentioned in my previous post mentioned above. The tutorial also mentions about obtaining IP Address of victim computer over msn.

Getting Ip Address:-

To see the ip all computers you are connected to (web servers, people attempting to hack into your computer).
Go to dos (start>run>type command) and run the netstat command. Type netstat /? for details.
Type netstat -r at the command prompt to see the ip of all computers you are connected to

In MSN (and other programs) when you are chatting to someone everything you type goes through the MSN servers first (they act as a proxy) so you see their ip rather than who you are chatting to. You can get round this by sending them a file as MSN doesn't send file through its proxy.







When you type the netstat -r (or -a for a different view) the ip's are under the foreign address table. The ports are separated by a : . Different programs use different ports, so you can work out which ip's are from which program.
Connecting to other computers and what ports are:--

Servers send information. Clients retrieve. Simple.
Windows comes with a built in program to connect to other computers called telnet.
To start Windows Telnet Start menu> Run> type Telnet. Click connect> remote system
Ports are doors into computers. Hosts are computer names
(ip number or a name that is translated into the ip automatically)
Different programs open different ports, but they always open the same ports so other computers know which port to connect to. You can get a port list listing all the different ports, but a basic one is:
11 :- Sends info on the computer
21 :- FTP (File transfer program)
23 :- Telnet (Login to the computers command line)
25 :- Smtp (Sends mail)
80 :- Http (Web pages)
There are thousands of different programs using different ports. You can get programs called port scanners which check a computer for all ports up to a certain number, looking for ways in. You can port scan a computer looking for ways-in.
Anyway, back to telnet.
Type http://www.yahoo.com as the host and port as 80 the click connect.
If nothing happens, you're in. Wow. You are connected to Yahoo's server.
You can now type http commands (you are connected to an http server, so it supports http commands). Ie. on an ftp server you can type open and it will do something. On an http server it will just wonder what the hell you are on about.
Type get / http/1.0 then press enter twice to get the file on the server at / (try /index.html) etc.)
Allowing dos and regedit in a restricted Windows

A very simple tactic I found after accidentally locking myself out of dos and regedit is to open notepad and type the following:
REGEDIT4
[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesWinOldApp]
"Disabled"=dword:0
[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem]
"DisableRegistryTools"=dword:0

Save it as something.reg then run it. Simple.

Making non deletable, unreadable folders

Tested on Windows 95/98:

By holding down alt, then typing numbers on the number pad (right of the keyboard) you can create special characters. If you hold down alt, then press 1, then let go, you got the ascii character 1. You try some random numbers. This goes all the way up to 255. Open a dos prompt, and type md (alt+1+9+4)some word. md is the dos command to make a directory, now try and open the directory in Windows, you can't. To open it, type ren (alt+1+9+4)some word some word (ren is the dos command to rename)

Proxies

Proxies are computers that you connect through, hiding your computer. Most aren't anonymous, they give away your ip. Some are. Good anonymous proxies: mail.uraltelecom.ru:8080 and 194.247.87.4:8080.
Different programs require different ways of using proxies. To do it in internet explorer 5 go to tools, internet options, connections, settings. In the above proxies they are in the format host:port

Password files:

If you lock yourself out of Windows stuff, all passwords are stored in files called *.pwl in C:windows. In Unix, passwords are normally stored at etc/passwd. This can be viewed using the cat command (prints a file to screen): cat etc/passwd. Make sure you're passwords are shadowed (not actually in etc/passwd). Also make sure they aren't in a file called shadow, especially not in a file called etc/shadow.
Unix passwords are encrypted far better than Windows one's (to be fair, Windows 95 isn't designed for users), but can still be cracked through a program called jon.

Securing your website:

Ftp Ftp is how you upload your web site, if someone finds out the password they can add/ delete anything. Brute forcing is the most common ftp attack, where a program guesses every possible combination (or from a list of words). An eight letter alpha-numeric word is almost impossible to crack, as the process is slow.
The real problem is with server side scripting. Pages other than plain html (ie. pages that perform commands on the host) are a security risk. The main problems are scripts that write to pages (guest books etc.). If when the guest book is viewed it has a .shtml extension, then it can execute commands.

So friends....i have tried my best to inform you about the methods used to hack computer remotely using victim computer by using IP Address. The tutorial thus explains all ways used to obtain IP Addresses of computer you want to hack remotely and access it data/database.


17 comments:

Anonymous said...
December 3, 2008 at 8:01 PM  

Retard! Now every idiot with a router will try and crack all their friends and get arrested. Why dont you publish a blog on how to not get cracked?

Anonymous said...
December 26, 2008 at 7:02 AM  

Anonymous i appricate 2 you.

Anonymous said...
April 25, 2009 at 11:53 AM  

Wat Rubbish !!!!!!!!!

Anonymous said...
April 29, 2009 at 10:42 AM  

very usefull

Anonymous said...
May 20, 2009 at 6:58 PM  

Hey , write to me danieljensen_1994@hotmail.com if u want to help me, i connected yahoo.com but what can i do next i typed get / http/1.0 and just a couple of numbers and letters appeared. i would like to learn how to do it

Anonymous said...
June 6, 2009 at 1:52 AM  

It's funny to see how people can have such different opinions about an article... That's why I don't criticise! But, in this case, I'll make an exception: it's useful AND it helps people getting hacked! 'Nough said! See ya

Anonymous said...
June 24, 2009 at 10:02 PM  

thanks ur the best

Anonymous said...
June 26, 2009 at 7:09 AM  

grrr you people who comment negatively, though the intention is good...i salute you for that...but allow me to remark you...why? because you entered this site, what do you expect. you dont belong here...

fateh said...
July 12, 2009 at 1:56 PM  

old trick hack me...

Anonymous said...
July 14, 2009 at 4:36 AM  

I agree with Anonymous from June 26th, this is just basic knowledge one has to assimilate in order to become 1337 someday.

Actually there are 3 types of people who read this:

1: the moral wanker: OMG this knowledge must be forbidden!!!!!one!!oneoneeleven

2: the n00b/lamer: CAN YOU PLEASE MAIL ME AT LAMER@N00bS.COM I DONT NO HOW TO DO THIS PLEASE HELP!!!!! TNX

3: the proto hacker: reads the article, may post a comment and then continues to look for more background information on his/her own. This type is - though rarely seen - easily recognized by advanced grammar and spelling skills.

Anonymous said...
August 18, 2009 at 12:24 AM  

The best way to not get hack is to know how to hack

Unknown said...
September 1, 2009 at 8:08 AM  

let me try it now! we all learn

Midrar Yousafzai said...
September 1, 2009 at 6:42 PM  

Good Job (midrar Yousafzai)

Anonymous said...
September 11, 2009 at 8:52 PM  

i keep losing connection to the host...
help?

hicham kazan said...
September 17, 2009 at 10:00 AM  

you are the best and continue to publish like these post you are the best bro

ECE admin said...
September 20, 2009 at 2:56 AM  

can i have your yahoo id to chat with u

Anonymous said...
April 8, 2010 at 1:11 PM  

hey plzz!! can u temme where to find the IP address??? when am chatting with my friends on yahoo msngr??? i know the step upto netstat -r
wat after that?????

Post a Comment

Related Articles


Related Article Widget by Hoctro

About Me


嗨,我是花,居住在印度兴奋的Windows,Linux中国的外籍人士和所有高科技的东西

Hi, I am Hua, a chinese expat residing in India excited about windows, linux and all things tech

Receive updates for free

Enter your email address:

Delivered by FeedBurner

Mobile Version

Bookmark

Bookmark and Share

Blog Archive

matchmaker.com gold membership valentine's