HOW TO HACK A DEVICE USING ITS IP

How To Hack Remote Pc Using IP Address

How to hack remote pc using IP Address






What is an IP address :

Basically IP address (Internet Protocol address) is a unique numerical value that is assigned to any computer or printer on a computer network that uses an internet protocol for communication purpose. Protocol is basically rules( for Network its rules for communication). 

IP address serves for two basic purposes :

Host or network interface identification.Location Addressing.

How Hackers Use Your IP Address to Hack Your Computer :

Here you will see How Hackers Use Your IP Address to Hack Your Computer  & How to Stop It .IP address is the identity of device or machine which is connected to internet .It means every device which connects to internet requires IP .IP address can be of computer , smartphone ,website and other internet supportive devices.One can hide IP using VPN or proxies .Now you are thinking about How it is possible to hack a system with IP addresses ? Actually its about open ports .There are different different ports assigned fordifferent services like FTP , media  sharing , HTTP and many more including TCP/UDPports.And hackers use to take advantage of open ports to hack into system by exploit a service on a port and then they unauthorized access in our systems.First we will scan open ports using port scanner tool like Nmap(network mapper) , advance IP scanner or any other but i recommend Nmap.Nmap comes preinstalled in Kali LINUX but you can also download and run it in windows form its official website .After scanning open port i will show you how hacker gains unauthorized access to our systems.

 What is Nmap ?

Nmap (Network Mapper) is versatile free Hacking tool for network exploration or security auditing.Nmap is a security scanner used to discover hosts and services on a computer network, thus creating a“map” of the network.Nmap is widely used by ProEthical Hackers to detect network vulnerability and provide ultimate security to IT industries. It is the best port scanner with a lot of functions .Mostly Nmap used to scan open ports of remote computer.It a free open source software for Windows and LINUX.

Requirements to Hack remote computer using IP address :

Nmap port mapper.PC running on windowsLets scan open ports using Nmap.

Step 1 :

First ,get the IP address[ xxx.xxx.xxx.xxx ] you wanna to scan.If you don’t know target’s IP ,then read my post How to Find someones IP address .Bonus : You can also use scan any websites IP addess by ping.To find IP address of website ,openCMD as administrator and type ” ping [website_name] ”,then hit enter.Here i’m pinging google ,so command will be ” ping www.wikitechy.com ” .After then you will see IP address of website in first line of CMD(as i highlighted in image).

Step 2 :

Install and open port scanner , the recommend nmap because nmap is the best for me in port scanning but use can consider other port scanning tools like advance port scanner etc.

Step 3 :

Now just type thetarget’s IP in nmap Port Scanner and Click Scan.

Step 4 :

Afterscanning,nmap will show you list of all open.Ports of target’s IP address[ xxxx ] .Open ports are like closed door without locks, you can go inside and outside easily.Note downopen portssomewhere we need them.

Step 5 :

Now we have target’s IP address and port .OpenCMD(command prompt) and enter those IP and port with telnet utility.[/signinlocker]To run command ,type : ” telnet [IP ADDRESS] [PORT] “(without quotes). See also : Top penetrating testing OS for Hacker.In my case,command will be ” telnet 10.24.144.23  23 “

Step 6 :

 Now telnet will ask for credentials such as username and password .Just type Username and Password ,then hit Enter.If you don’t know username and password , try some guesses like  ” admin ” , ” administrator ” or ” username “ without any password and hit enter.

How to access target’s PC after successful connection :

To gain access in PC , use CMD(command prompt) .Sorry no GUI ,you have to access all files music , database from CMD .Don’t worry it’s not as such difficult ,use CMD commands like ” cd “to change directory.

Now How Can I Protect Myself :

First ,install a Firewall program or use windows firewall but we recommend  Comodo firewall, it’s really incredible and ability to filter ports .It has pre-configured settings, so user just install it and start using (ready to serve).Don’t worry about price it’s free.

Conclusion :

It’s like a open door From above demo ,you learned about ports scanning , open ports and it’s uses, also basic knowledge aboutHacking remote PC by hackers.If you have any security related questions ,feel free to ask.

What is an IP address of the Victim or another Computer:

4 ways to get the IP address of the Victim or another Computer:

1. Using PHP notification Script

2. Using Blogs and Websites

3. Using Read Notify service

4. Sniffing during Gmail and Yahoo chat sessions

As we are here to learn concepts so i will first explain what is an IP address and what’s its importance. So friends very basic question What is anIP address? Why its important for hackers and security professionals?

1. Using PHP notification Script

Using this Notification script you can get the IP address in just seconds. Steps of using this PHP script:

Download the PHP notify script and extract files.Now you will get two files IP.html and index.php . You need to upload these two files to any free web hosting server.Now you will need to send the link of index.php to the victim whose password you want to get. to get the link click onindex.php shown in above snapshot. Now a new window will open copy the link in the address bar and send to thevictim whose IPaddress you want.Now when the victim opens the above link nothing will open but his Ip address is written into the ip.html file. So open the ip.html file to get his IP address.That’s all this method… I hope you liked it.

2. Using Blogs and Websites :

This method is for those who have their blogs or websites. Normal users can also do this as blog is free to make. Make a new blog and useany stats service like histats or any other stats widget. Just add a new widget and put histats code there and save template. And send the link of your blog to your friend and get his IP.

3. Using Read Notify service :

This is an email based service. Steps to use Read Notify service :

First open the Read Notify website : RCPT.Now register on this website and then it will send you confirmation mail. Verify your account.Once your account is activated.

Do the following steps use this service :

Compose your email just like you usually would in your own email or web email program.The end of your recipients email address (don’t worry, that gets removed before your recipients receive the email).

Some things to remember :

Don’t send to and from the same computer.If your email program ‘auto-completes’ email addresses from your address book, you’ll need to keep typing over the top of the auto-completed.If you are cc-ing your email to other readers, you must add tracking to all of them

4.  Sniffing Yahoo and Gmail Chat sessions :

With the help ofSniffers like ethereal, wire-shark etc we can sniff the Gmail, and yahoo chat sessions while we are chating to any our friend andextract the IP address from there. I will explain this trick in detail in my next article as its a long article in itself.

5. Bonus Method for Online Gamers :

We can also get the IP address from online games like counter strike, age of empires in Game ranger etc.. Many counter strike servers use amx mode. Just view which people are connecting and whats their IP addess as plugins show the IP address of people connecting to the game server.  If you have more access to counter strike server you can use status command in console. Just go to console and type “status”(without quotes) and press enter there you can see all players details his steam ID and much more depending upon server.Easy steps to hack a victims Computer using his/her IP Address Almost  everyone will be eager in knowing  othersprivacy related data and information. Hacking  is the right platform to know others privacy related data without the knowledge of the victim.

No comments:

Post a Comment