How to get into someone else's "computer": the simplest methods

click fraud protection

Today a lot is said about breaking other people's computers.However, according to many experts in the field, it would be better to say than "how to hack someone else's" PC ", and" how to obtain unauthorized access to it. "About any destructive actions in this case and can be no question.Let's consider a simple method with which to solve the problem of how to get into someone else's "computer."

Fictional prejudice

Unfortunately, today, many people are beginning to emerge more and more fear that they can hack computer terminals or "hack."Frankly, this is complete nonsense.Who do you need?It is clear even when computers or servers kept confidential.Then yes.Many people are not averse to profit by it.

Home hack computer systems mainly amateur bully who simply have nothing to do.Sometimes, though, there are also those who can steal passwords to access sites or codes of bank cards (provided that they are stored in the home terminal in the clear).But this is rare.Analyzing

to how to get into someone else's "PC", it can be said (as strange as it sounds), it can make even a child with the appropriate tools and the ability to use them.Consider the most primitive methods.

What is the basis hacking "companies»

In most cases, the simplest but most effective method.In principle, the problem itself is to get into someone else's "PC", limited to the production of IP-address of a computer terminal and one of the open ports of the victim.What it is, in most cases, many fans did not elect anyone in particular, but simply scanning a predetermined range of IP-addresses of vulnerable computer systems, so just for fun or testing their strength.

why those too afraid for their data, it is better to take care of security, install the appropriate software.

Using Shared Resource Scanner

So, you're wondering about how to go to someone else's "computer."For starters, you can apply one of the easiest ways, consists in the use of tools Shared Resource Scanner 6.2.

Before starting work on the command line (menu "Run"), for example, in Windows XP, you must enter the command winipcfg, to know your own IP-address.A window will appear with your address.It needs to be remembered.

Open the program and in the upper entry field its own IP to change the last two digits "1".In the field below prescribes the same IP, only the last two digits of the change in the line 255. TimeOut (waiting time expiration) must contain the value "80".It is necessary to click Start scan.

Once the application window will appear computers allocated to different characters.Thin font - protected terminal, bold - poorly protected, bold red - no protection at all.It is necessary to identify the computer in red bold and click "Open."On-pa!On the screen of your "computer" drives, and there were logical partitions of another's computer.

Use online sniffer and XSpider

somewhat more complicated, but more efficient method is to use online sniffer.To do this, create an account on a specific site (for ethical reasons not specified at what exactly), and then, for example, load any picture.After that sniffer is given a link to a content redirection (redirect) on the loaded image (here be sure to tick the line "in the log records the IP").

now or site, or with anonymous electronic mailbox, send a letter to the victim with the content type "on your e-mail sent to so-and-so.Click here to see. "

now the victim can only click on the link and you will be in the hands of the desired IP.

The scanner XSpider 7.5, create a new profile and go to the tab "port scanner."Downstairs next to «default.prt» push another button to the right, and in a new window - click "New".Bottom line is "Add Port."This add "4889" and "3389".

Then, as described above, create another profile.After that, the port is added to "23".Now enter the acquired IP of the victim and start scanning.If at least one of the ports open, trying to connect.If the password is requested, enter the default "12345678".Everything on the victim's computer can do.they want.

For reference: 4889 - Port Radmin, 3389 - Remote Desktop (Remote Desktop), 23 - Telnet.

program Lamescan

Now a few words about one more way for you to learn how to get into someone else's "computer."Please use the program VNC-scanner GUI 1.2 for the presence of IP-addresses to open port 4899 or 3389.

Now in Annex Lamescan enter the desired address and select a password.You can think of yourself, you can download a list of the most commonly used passwords from the Internet.Once a match is found, we can rejoice.

Ethical considerations

In conclusion, we note that this article is not an incentive to action.It is rather a general educational material, in any case not carrying harm users.And for those who are going to do it, it is worth thinking about the legality of such actions and ethical considerations.