Advertisement
Aluf

Hack Into A Computer Connected on LAN

May 19th, 2015
1,293
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.95 KB | None | 0 0
  1. Step 1:- Finding the target
  2. So first off we need to find a computer or the computer to hack into. So if your
  3. plugged in to the LAN, or connected to the WAN, you can begin. Open up Cain and
  4. Abel. This program has a built in sniffer feature. A sniffer looks for all IP addresses in the local sub net. Once you have opened up the program click on the sniffer tab, click the Start/Stop sniffer, and then click the blue cross.
  5.  
  6. http://1.bp.blogspot.com/-ggb-7ElZwtQ/VVrk0hE-DEI/AAAAAAAAAUQ/f0cYZQ51XoY/s1600/1-500x326.png
  7.  
  8. Another window will pop up, make sure “All host in my subnet” is selected, and then
  9. click ok.
  10.  
  11. http://1.bp.blogspot.com/-NLf-Oliu0sA/VVrk03vkc8I/AAAAAAAAAUU/vsJgCf1m6pI/s1600/2.png
  12.  
  13. It should begin to scan.
  14.  
  15. http://1.bp.blogspot.com/-TgpSbw6CUUc/VVrk0PA1v6I/AAAAAAAAAUI/AeGFU9DLLT8/s1600/3-500x172.png
  16.  
  17. Then IP’s, computer names, and mac addresses will show up
  18. Now remember the IP address of the computer you are going to be breaking into.
  19. If you can’t tell whether the IP address is a computer, router, modem, etc, that’s ok.
  20. During the next step we will begin our trial and error.
  21.  
  22. http://2.bp.blogspot.com/-KlT45iBFToY/VVrk1cGXOEI/AAAAAAAAAUc/XGQ1CMq_I70/s1600/4-500x212.png
  23.  
  24. Step 2:- Trial and error
  25. Now, we don’t know if we have our designated target, or if we have a computer or
  26. printer, or whatever else is on the LAN or WAN.
  27. If you did get the IP of the target though, I still recommend reading through this
  28. section, for it could be helpful later on.
  29. Click on the start menu and go to run, type in cmd, and click ok.
  30. This should bring up the command prompt.
  31. From here we will do most of the hacking.
  32. Now I will be referring to certain commands that need to be inputted into the
  33. command prompt.
  34. I will put these commands in quotes, but do not put the quotes in the code when you
  35. type it into the prompt.
  36. I am only doing this to avoid confusion.
  37. Let’s get back to the hacking.
  38. Type in “ping (IP address of the target).” For example in this tutorial, “ping
  39. 192.168.1.103.”
  40. This will tell us if the target is online.
  41. If it worked, it will look something like this (note, I have colored out private
  42. information):
  43.  
  44. http://2.bp.blogspot.com/-q58PgprX5sQ/VVrk25vTJJI/AAAAAAAAAUo/yV7wy52fvec/s1600/5-500x252.png
  45.  
  46. IF it didn’t work, meaning that the target is not online, it will look something like this:
  47.  
  48.  
  49. http://1.bp.blogspot.com/-Yu4hW-oeLas/VVrk3pmWSsI/AAAAAAAAAUw/IgGCu6p46dk/s1600/6-500x251.png
  50.  
  51.  
  52. If the target is not online, either switch to a different target, or try another time.
  53. If the target is online, then we can proceed.
  54. Step 4:- Gathering the information
  55. Now, input this command “nbtstat –a (IP address of target).” An example would be
  56. “nbtstat –a 192.168.1.103.”
  57. This will show us if there is file sharing enabled, and if there is, it will give us the:
  58. currently logged on user, workgroup, and computer name.
  59.  
  60. http://1.bp.blogspot.com/-c_bBp2IQL-M/VVrnxzJw4qI/AAAAAAAAAVc/Bp0LzQF5rAM/s1600/7-500x251.png
  61.  
  62. Step 5:- Getting In
  63. Finally it’s time.
  64. By now we know: that our target is online, our target has file sharing, and our target’s
  65. computer name.
  66. So it’s time to break in.
  67. We will now locate the shared drives, folders, files, or printers. Type in “net view
  68. (IP Address of Target)”
  69. An example for this tutorial would be: “net view 192.168.1.103”
  70.  
  71. http://2.bp.blogspot.com/-pp5YWdDUKVA/VVrnyaWt6WI/AAAAAAAAAVg/6gYSFqTkDgw/s1600/8-500x254.png
  72.  
  73. We have our just found our share name. In this case, under the share name is “C,”
  74. meaning that the only shared thing on the computer is C. Then to the right, under
  75. Type, it says “Disk.” This means that it is the actual C DISK of the computer. The C
  76. DISK can sometimes be an entire person’s hard drive.
  77.  
  78. http://3.bp.blogspot.com/-Vsn-k08sn3o/VVrnz3kKpdI/AAAAAAAAAV0/-G_OYPp8MIQ/s1600/9-500x253.png
  79.  
  80.  
  81. As you can see, for my hack I have already used “K,” so I used “G” instead.
  82. You may also do the same for multiple hacks.
  83. If it worked, it will say “The command completed successfully.”
  84. If not, you will have to go retrace you steps.
  85. Now open up “my computer” under the start menu, and your newly created network
  86. drive should be there.
  87.  
  88.  
  89. http://3.bp.blogspot.com/-Wvs6kSZAfjk/VVrnysW00RI/AAAAAAAAAVo/vB9saVHaOZM/s1600/10-500x553.png
  90.  
  91. Now, if you disconnect from the WAN or LAN, you will not be able to access this
  92. drive, hence the name Network Drive.
  93. The drive will not be deleted after you disconnect though, but you won’t be able to
  94. access it until you reconnect to the network.
  95. So if you are doing this for the content of the drive, I recommend dragging the files
  96. and folders inside of the drive onto your computer,
  97. because you never know if the target changes the sharing setting.
  98. Congratulations! You’re DONE!
  99. -Commands used in this tutorial:
  100. PING
  101. NBTSTAT -a (IP Address of Target)
  102. NET VIEW (IP Address of Target)
  103. NET USE K: (IP Address of Target)(SHARENAME)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement