Professional Documents
Culture Documents
Dinesh Secreats
Dinesh Secreats
1X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
, WINDOWS XP HACKS
Windows IP Utilities
Submitted by Srikanth on Friday, 15 August 200817 Comments
The following are the IP utilities available in Windows that help in finding out the information
about IP Hosts and domains. These are the basic IP Hacking Commands that everyone must
know!
Please note that the the term Host used in this article can also be assumed as a Website for
simple understanding purpose.
1. PING
PING is a simple application (command) used to determine whether a host is online and
available. PING command sends one or more ICMP Echo messages to a specified host
requesting a reply. The receiver (Target Host) responds to this ICMP Echo message and returns
it back to the sender. This confirms that the Host is online and available. Otherwise the host is
said to be unavailable.
Syntax:
C:\>ping gohacking.com
2. TELNET
Telnet command is used to connect to a desired host on a specified port number. For example
Syntax:
C:\>telnet yahoo.com 25
C:\>telnet yahoo.com
NOTE: The default port number is 23. When the port number is not specified the default number
is assumed.
3. NSLOOKUP
Many times we think about finding out the IP address of a given site. Say for example
google.com, yahoo.com, microsoft.com etc. But how to do this? For this there are some websites
that can be used to find out the IP address of a given site. But in Windows we have an inbuilt
tool to do this job for us. It is nslookup. Yes this tool can be used for resolving a given domain
name into it’s IP address (determine the IP of a given site name). Not only this it can also be
used for reverse IP lookup. That is if the IP address is given it determines the corresponding
domain name for that IP address.
Syntax:
C:\>nslookup google.com
4. NETSTAT
The netstat command can be used to display the current TCP/IP network connections. For
example the following netstat command displays all connections and their corresponding
listening port numbers.
Eg: C:\>netstat -a
This command can be used to determine the IP address/Host names of all the applications
connected to your computer. If a hacker is connected to your system even the hacker’s IP is
displayed. So the netstat command can be used to get an idea of all the active connections to a
given system.
Popularity: 5% [?]
THIS NETBIOS HACKING GUIDE WILL TELL YOU ABOUT HACKING REMOTE
COMPUTER AND GAINING ACCESS TO IT’S HARD-DISK OR PRINTER. NETBIOS
HACK IS THE EASIEST WAY TO BREAK INTO A REMOTE COMPUTER.
The above is an example for operation using command prompt. “net view” is one of the netbios
command to view the shared resources of the remote computer. Here “219.64.55.112″ is an IP
address of remote computer that is to be hacked through Netbios. You have to substitute a vlaid
IP address in it’s place. If succeeded a list of HARD-DISK DRIVES & PRINTERS are shown. If
not an error message is displayed. So repeat the procedure 2 with a different IP address.
3. After succeeding, use the “net use” command in the command prompt. The “net use” is
another netbios command which makes it possible to hack remote drives or printers.
Example-1:
C:\>net use D: \\219.64.55.112\F
Example-2:
C:\>net use G: \\219.64.55.112\SharedDocs
Example-3:
C:\>net use I: \\219.64.55.112\Myprint
NOTE: In Examples 1,2 & 3, D:,G: & I: are the Network Drive Names that are to be created on
your computer to access remote computer’s hard-disk.
NOTE: GIVE DRIVE NAMES THAT ARE NOT USED BY ANY OTHER DRIVES
INCLUDING HARD-DISK DRIVES, FLOPPY DRIVES AND ROM-DRIVES ON YOUR
COMPUTER. THAT IS, IF YOU HAVE C: & D: AS HARD DIRVES, A: AS FLOPPY
DIVE AND E: AS CD-DRIVE, GIVE F: AS YOUR SHARED DRIVE IN THE
COMMAND PROMPT
F:,”SharedDocs” are the names of remote computer’s hard-disk’s drives that you want to hack.
“Myprint” is the name of remote computer’s printer. These are displayed after giving “net use”
command. “219.64.55.112″ is the IP address of remote computer that you want to hack.
4. After succeeding your computer will give a message that “The command completed
successfully“. Once you get the above message you are only one step away from hacking the
computer.
Now open “My Computer” you will see a new “Hard-Disk drive”(Shared) with the specified
name. You can open it and access remote computer’s Hard-Drive. You can copy files, music,
folders etc. from victim’s hard-drive. You can delete/modify data on victim’s hard-drive only if
WRITE-ACCESS is enabled on victim’s system. You can access files/folders quickly through
“Command Prompt”.
NOTE: If Remote Computer’s Firewall Is Enabled Your Computer Will Not Succeed In
Gaining Access To Remote Computer Through Netbios. That is Netbios Hacking Is Not
Possible In This Situation.(An Error Message Is Displayed). So Repeat The Procedure 2,3
With Different IP Address.