Skip to main content

Basics of Hacking :: How to Hack a PC

Getting Ip's:--




To see the ip all computers you are connected to (web servers, people attempting to hack into your computer).

Go to dos (start>run>type command) and run the netstat command. Type netstat /? for details.





Type netstat -r at the command prompt to see the ip of all computers you are connected to



In MSN (and other programs) when you are chatting to someone everything you type goes through the MSN servers first (they act as a proxy) so you see their ip rather than who you are chatting to. You can get round this by sending them a file as MSN doesn't send file through its proxy.

When you type the netstat -r (or -a for a different view) the ip's are under the foreign address table. The ports are seperated by a : . Different programs use different ports, so you can work out which ip's are from which program.





Connecting to other computers and what ports are:--



Servers send information. Clients retrieve. Simple.

Windows comes with a built in program to connect to other computers called telnet.

To start Windows telnet Start menu> Run> type Telnet. Click connect> remote system

Ports are doors into computers. Hosts are computer names

(ip number or a name that is translated into the ip automatically)

Different programs open different ports, but they always open the same ports so other computers know which port to connect to. You can get a port list listing all the different ports, but a basic one is:

11 :- Sends info on the computer

21 :- FTP (File transfer program)

23 :- Telnet (Login to the computers command line)

25 :- Smtp (Sends mail)

80 :- Http (Web pages)

There are thousands of different programs using different ports. You can get programs called portscanners which check a computer for all ports up to a certain number, looking for ways in. You can portscan a computer looking for ways-in.

Anyway, back to telnet.

Type www.yahoo.com as the host and port as 80 the click connect.

If nothing happens, you're in. Wow. You are connected to Yahoo's server.

You can now type http commands (you are connected to an http server, so it supports http commands). Ie. on an ftp server you can type open and it will do something. On an http server it will just wonder what the hell you are on about.

Type get / http/1.0 then press enter twice to get the file on the server at / (try /index.html) etc.)





Allowing dos and regedit in a restricted Windows



A very simple tactic I found after accidentally locking myself out of dos and regedit is to open notepad and type the following:

REGEDIT4

[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesWinOldApp]

"Disabled"=dword:0

[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesSystem]

"DisableRegistryTools"=dword:0

Save it as something.reg then run it. Simple.





Proxies



Proxies are computers that you connect through, hiding your computer. Most aren't anonymous, they give away your ip. Some are. Good anonymous proxies: mail.uraltelecom.ru:8080 and 194.247.87.4:8080.

Different programs require different ways of using proxies. To do it in internet explorer 5 go to tools, internet options, connections, settings. In the above proxies they are in the format host:port

Comments

One data breach, however seems particularly scary -- President Barack Obama's ride (when he's not flying in Air Force One) had its blueprints and details of its avionics package leaked.

Popular posts from this blog

SEO Optimizing A Website For Improved Value

SEO or search engine optimization is something that every web owner and creator should be aware of. Even if a website owner hires an expert to carry out the online marketing, understanding the very basics and how it really can improve a websites performance and popularity is important. Simply put, optimizing a website is important and is built around keywords that are valuable to a website and to the products or services it is trying to provide. By focusing on main keywords or key phrases for a business, and expanding on them over time, can improve the amount of visitors a website receives, in turn increasing profits or simply improving its popularity if it is an information website. SEO is valuable, and means a way of making a site appear at a higher ranking in search engines such as Google, Yahoo, AOL etc. Using this important type of online marketing can reap great benefits. It takes time to learn and time to complete, and is a constant job to keep a website performing well above co...

Email On Deck: A disposable email address that works

Today, Team Inforpioneer brings an interesting Email service for our reader which will definitely help our readers to improve their internet security and will benefit in some other ways.  Here is a short description of this service.  EmailOnDeck.com is the premier site for all things relating to temporary, disposable and throwaway email addresses. We want to help you avoid SPAM, protect your online privacy, and stop you from having to give away your personal email address to every company and person on the internet who insists on you giving it to them. We work hard and will continue to work hard to give you a disposable email address that works with any site or app. We hope to help give you back the control of deciding who you want to give your personal info to. Temporary emails are perfect for any transaction where you want to improve your online privacy. Use them when you buy or sell Bitcoins or trade cryptocurrency, at exchanges, or locally. They can be used for QA tes...

Cheap & Easy To Use VPN Services in China for 2019

Because of copyright issues, many domestic video sites prohibit foreign direct access to foreign IPs. Overseas users want to see these videos from abroad and need to obtain domestic IP with VPNs to bypass these copyright restrictions. Wall mom brings the best solutions for your VPN Services which are not only the best in the area but also have cheap and affordable prices. In this article,  Wall mom  brings some cheap and easy to use over the wall VPN recommendations for their users with the reviews which will surely help those who want a access to the sites which has the copyright restrictions.  They wrote in this articles that Only recommend foreign VPN, do not recommend domestic VPN Dare to operate in the domestic VPN service, the policy risk is particularly large, almost all shut down or run, it is difficult to issue a refund. Before GreenVPN was shut down, a large number of users flocked for a refund, and the refund was still good. Many domestic VPNs...