Saturday, June 4, 2016

Hacking Tutorial



HOW TO HACK SOMEBODIES’ SHAREDDOCS FOUND ON THE SAME NETWORK?


Learning of the good (bad) stuffs.
Well when it comes to what we want. We all want to hack, exploit and take what we want from those that we can’t. We are hackers right and we are the 21st ninjas, we do things our way. Well, am not suggesting or recommending to do bad things. Perhaps hackings now a time is considered to be illegal and harmful. This is not true, we are the leader in this century. Big companies like google even national securities hires hackers to strengthen their security. When coming to our concept, Hacking is more related with the networks, we can take online bank hacking, website hacking and other types of hacking they all need networks and internet would be the best way to do so. I don’t think we might be able to stay without internet connections for a second in the future even in now in the present. We all have things we want (need) to do online; we want to download files that we need, we want to check our e-mails, social accounts and the likes. Talking of our lesson here, this tricks works for users which are found on the same network with us (the network system may be WAN or LAN (it works on both)). Note:  this trick doesn’t have any effect on the user. So let’s get right into it;
NOTE: you may need to run command prompt as an administrator
>> click the start button then search for cmd then run as administrator if you are using windows 7, 8, 8.1 or 10 (start>run>type cmd if you are using windows xp).
>>now write net view on the command, then a list of users will be shown on the windows.

>>write ping (username), now what we did is gain our victims ip-address. If this doesn’t work then you can type in tracert (username), then select the ip-adress of the victim and copy it or remember it is needed letter in our progression.

>>now type in nbtstat –a (ip-adress of our user). Now after finishing press enter, you will see the users registrations if there is a number 20 upon the user registration then you can hack his files if there is no 20 then you can’t. for this case my victims ip-adress is in the picture below
 

>>after doing the above steps write net view \\ip-adress of the victim. This will show us the devices which are online.

>>lastly write net use G: \\ip-adress of our user\SharedDocs.

That is it, after finishing this commands then go to your computer then you will find the shared docs of your victim in your computer. If you want to hide the disk you have stolen then right click on computer>manage>disk management>change the value x: to none.
THAT IS IT THANKS FOR READING HOPE YOU LIKE IT!!

No comments:

Post a Comment