How to Hack any computer system or PC in 15 seconds

    This tutorial for education purpose only i'm not responsible for any thing.Spying into someone`s mobile without his/her permission is illegal. Please proceed in own risk.

    How to Hack any computer system or PC in 15 seconds

    Computer System PC Hacking

    Computer System / PC Hacking (Intrusion) in just 15 seconds, that’s right it can be done very easily. If you have some certain security flaws (Loop holes) then your computer system can be hacked in less than 15 seconds. To begin this tutorial I’d like you to follow the steps mentioned. Connect to the Internet using your dial up account if you are on dial up. If you are on dedicated service like High Speed connections (ie, Cable and DSL) then just proceed with the steps below.

    • Click Start button

    • Go to Run

    • Click Run

    • Type Winipcfg

    • Press Enter

    A following window will pop up like:

    How to Hack any computer system or PC in 15 seconds


    What you can see under IP address is a number that looks something like this.

    207.175.1.1 (Every system has its own unique IP Address)

    If you click  Dial Up Internet Access then you can find your IP address under PPP adapter section.

    If you have any dedicated access then you will find your IP address under the name of another adapter like (PCI Busmaster, SMC Adapter, etc.) You can see a list of it by clicking on the down arrow.  

    How to Hack any computer system or PC in 15 seconds


    Copy the IP address or write it down, then close that window by clicking (OK) and  follow the steps.

    • Click on Start button

    • Go to Run (Click on Run)

    • Type command then Click OK At this point you should see a screen that looks like this.

    How to Hack any computer system or PC in 15 seconds


    Type the following in the Dos Prompt

    • Nbtstat –A IP address

    For example: nbtstat –A 207.175.1.1

    (Please note that A must be typed in capital letters.)

    It will give you a read out which looks like this

    NetBIOS Remote Machine Name Table

    How to Hack any computer system or PC in 15 seconds


    The numbers in the <> are hex code values.  If you do not see a hex code stated in the list then that’s a good thing because If you  have a hex code <20>then you may face some issues and cause concern. Its confusing isn’t now that you’re probably confused about this so I’ll explain.

     A hex code of <20>means that you have file and printer sharing turned on and this is how a “hacker” can check to see if you have “file and printer sharing” turned on. If hackers are aware of the fact that you do have the “file and printer sharing” turned on then they would proceed to attempt to gain access to your computer system and hack it.

    (Note: To exit out of the DOS, just Type Exit and hit Enter)

    I’ll show you now that how information can be used to gain access (Hacked) to your system.

    A smart hacker will scan on a range of IP address for Computer systems with “File and Printer Sharing” turned on. Once they find that  a system with sharing turned on the next step would be to find out that what is being shared in system.

    This is how:

    Net view \\ <insert ip_address here>

    Hacker would then get a response that looks something like this.

    Shared resources at \\ip_address

     sharename Type Comment 
     MY DOCUMENT

    TEMP
      DISK


    DISK


    The command was completed successfully.

    This shows the hacker that his victim has their My Documents Folder shared and their Temp directory shared. Now the hacker follow the following command to  get access to those folders.

    Net use x: \\< insert IP address here>\temp

    If all goes well for the hacker, will then get a response (The command was completed successfully.)

    Now the hacker  has access to the TEMP directory of his victim.

    Q. What is the approximate time for the average hacker to do this attack?

    A. 15 seconds or less.

    Not a lot of time to gain access to your machine is it? How many of you had “File and Printer Sharing” turned on in your computer systems?

    Attention people: This is called a Netbios attack. If you are running a home network then the chances that you have the  file and printer sharing turned on. Of course this may not be the case for all of you but I’m sure there are quite a number people  who probably do and If you are sharing resources and are among them then please password protect the directories.

    Any shared directory you have on your system that exist within your network will have a folder. Which basically looks like this.

    How to Hack any computer system or PC in 15 seconds


    You can check to find which folders are shared through Windows Explorer.

    • Click On Start

    • Scroll Up to Programs At this point you will see a listing of all the different programs on your system Find Windows Explorer and look for any folders that look like the above picture.

    Once you have found these folders then password protect them.

    Netbios is one of the older methods of system attacks that occur. It is usually overlooked because most systems are protected against it Netbios Attacks has a massive growth and are performed by hackers to hack into computer system and PC.


    This tutorial for education purpose only i'm not responsible for any thing.Spying into someone`s mobile without his/her permission is illegal. Please proceed in own risk.

     

     Tags:

    How to Hack any computer system or PC in 15 seconds, How to hack PC, How to hack system