HOW TO HACK
SOMEBODIES’ SHAREDDOCS FOUND ON THE SAME NETWORK?
Learning of the good
(bad) stuffs.
Well when it comes
to what we want. We all want to hack, exploit and take what we want from those
that we can’t. We are hackers right and we are the 21st ninjas, we
do things our way. Well, am not suggesting or recommending to do bad things.
Perhaps hackings now a time is considered to be illegal and harmful. This is
not true, we are the leader in this century. Big companies like google even
national securities hires hackers to strengthen their security. When coming to
our concept, Hacking is more related with the networks, we can take online bank
hacking, website hacking and other types of hacking they all need networks and
internet would be the best way to do so. I don’t think we might be able to stay
without internet connections for a second in the future even in now in the
present. We all have things we want (need) to do online; we want to download
files that we need, we want to check our e-mails, social accounts and the
likes. Talking of our lesson here, this tricks works for users which are found
on the same network with us (the network system may be WAN or LAN (it works on
both)). Note: this trick doesn’t have
any effect on the user. So let’s get right into it;
NOTE: you may need
to run command prompt as an administrator
>> click the
start button then search for cmd then run
as administrator if you are using windows 7, 8, 8.1 or 10
(start>run>type cmd if you are using windows xp).
>>now write net view on the command, then a list of
users will be shown on the windows.
>>write ping (username), now what we did is gain our
victims ip-address. If this doesn’t work then you can type in tracert (username), then select the ip-adress of
the victim and copy it or remember it is needed letter in our progression.
>>now type in
nbtstat –a (ip-adress of our user). Now after finishing press enter, you will
see the users registrations if there is a number 20 upon the user registration
then you can hack his files if there is no 20 then you can’t. for this case my
victims ip-adress is in the picture below
>>after doing
the above steps write net view \\ip-adress of the victim. This will show us the
devices which are online.
>>lastly write
net use G: \\ip-adress of our user\SharedDocs.
That is it, after
finishing this commands then go to your computer then you will find the shared docs of your victim in your
computer. If you want to hide the disk you have stolen then right click on
computer>manage>disk management>change the value x: to none.
THAT IS IT THANKS FOR
READING HOPE YOU LIKE IT!!
No comments:
Post a Comment