November 1, 2010

How to hack remote computer using IP address

Literally, hacking is accessing something or somebody in internet without their permission or interest. While, speaking in summary, hacking is very easy job, it is like instead of using front door, finding the hidden door of a house and hijacking the precious things. Among all the hacking, hacking via IP address is one of the most common yet powerful beginning.

You may want to hack the website and put your advertisement there or grab some database information In this type of hacking, you are playing with the web server's computer instead of the administrator's computer. Because, www.website.com is hosted in separate web server rather than personal computer.

Another can be accessing your friend's computer from your home. Again this is IP based and this is possible only when your friend's computer is online. If it is off or not connected to internet then remote IP hacking is totally impossible.

Well, both of the hacking has the same process. Let's summarize what we must do.

  1. Confirm the website or a computer you want to hack.
  2. Find or trace their IP address.
  3. Make sure that IP address is online
  4. Scan for open ports
  5. Check for venerable ports
  6. access through the port
  7. Brute-force username and password
Now let me describe in brief in merely basic steps that a child can understand it.

First, getting the IP address of victim.
To get the IP address of the victim website, ping for it in command prompt.

For example,
ping www.google.com
will fetch the IP address of Google.com



This is how we can get the IP address of the victims website.

How about your friend's PC? You can't do www.yourfirend'sname.com, can you? Finding your friend's IP address is little tough job, and tougher it is if he has dynamic IP address that keeps changing.

One of the widely used method to detect IP address of your friend is by chatting with him.

You might find this article helpful

Now you got the IP address right? Is it online?

To know the online status just ping the IP address, if it is online it will reply.

If the IP address is online, scan for the open ports. Open ports are like closed door without locks, you can go inside and outside easily.

Use Advanced Port Scanner to scan all open and venerable ports.



Now you've IP address and open port address of the victim, you can now use telnet to try to access them. Make sure that you've telnet enabled in your computer or install it from Control panel > Add remove programs > add windows components.

Now open command prompt and use telnet command to access to the IP address. Use following syntax for connection.

telnet [IP address] [Port]



You'll be asked to input login information.



If you can guess the informations easily then it's OK. Or you can use some brute-forcing tools like this one.

In this way you'll able to hack remove computer using only IP address



10 comments:

Michel said...

thankx you save my day ...... thankx alot

Anthony said...

Ok, what website do I need to go onto to scan open ports?

Manish Sharma said...

very nice information.

Unknown said...

I thank you for this useful and complete post, I was looking for post like this. I like your blog.
changing static ip address

love sms said...

Nice Articles Very Good Site .Thnaks For Sharing Comment.
Love SMS

poetry sms said...

PageRank is probably one of the most important algorithms ever developed for the Web.
PageRank is not simply based upon the total number of inbound links.
The basic approach of PageRank is that a document is in fact considered the more important the more other documents link to it,
but those inbound links do not count equally.
good points here about Trust now being a major factor in search engine results,
that goes with what Rand and others have been saying too.
this also settles for me the value of a natural approach to gaining backlinks and not getting a huge bunch of them,
or a large # of high pr backlinks in a short period of time - it rather undermines the Trust factor.
I do wonder what you think of bing and how Trust does/will play a role in their results.
it seems to me from a rather preliminary and cursory look at some results and comparing those to over at google and yahoo,
that bing ofter relies more on the keyword/s being the actual url,
which seems to me a rather poor way to rank sites/pages.Great Experience, will recommend them to everyone.Thanks For Sharing.
Poetry SMS

Latest SMS said...

If you Want to Browse Latest Romantic sms about Miss you SMS & Break up SMS then visit our website web2sms.pk

Love sms said...

I taught junior high students with learning disabilities and helped them
overcome their reading problems, but they still could not spell well.
I have to admit that I am a culprit of a few of these.
It's funny that I didn't realize until now that I was making a mistake!
Thanks for the post. Here's to a better-spelled 2012.

Good Morning SMS said...

Well that is very well written article on hacking remote computer. I am searching for methods to unlock locked computer. I forgot the password of my office computer and now I am not able to recover it. I do not want to install a new window. Please guide me to crack the password.

Nikhil Sharma said...

valentine day date sheet
valentine day wallpaper
valentine songs
valentine gift
valentine ideas
valentine card for boyfriend
valentine card for wife
hug day messages and images for girlfriend and boyfriend
kiss day messages images
promise day msgs,wishes and images
teddy day wishes,msgs for girlfriend and boyfriend
chocolate day msgs ,images sms for girlfriend
propose day msgs images wishes
rose day msg,sms,wishes for girlfriend

Google