Hacking World
Thursday, November 19, 2015
Wednesday, November 18, 2015
Monday, November 16, 2015
One with the IP address to hack Role..7.. File LMHOST
File LMHOST7. LMHOST.sam have all the Windows system files. We only need to addLMHOST file in LMHOST IP Basically, it works as a network, becauseAutomatically logging you. So, start the file or folder to be found. TypeLMHOST and press Enter. When it comes up, open it using a text program such as:Wordpad, but make sure you do not sign up to "always open files. If you do not see the file until LMHOST just can not go through, this extension "# This file is the Microsoft LAN Manager 2.x TCP / IP lmhosts Compliant# Files and offers the following extensions:## #PRE# #DOM:# #include# #BEGIN_ALTERNATE# #END_ALTERNATE# \ 0xnn (non-printing character support)## "#PRE" With the letter that the document will be followed by any entry# Name of the entry to be preloaded into the cache. By default, entries# Preloaded, but are parsed only after dynamic name resolution fails.#
One with the IP address to hack Role..6.. Use it to your advantage
Use it to your advantage6. Type Esta you have the host name only.NBTSTAT -A (keep the host name without the parentheses)You just have to type in the IP address.NBTSTAT -A (except for the IP address in parentheses)Now, hit enter and wait. Now one of two things is to beef up1. Host not found2. something like the following:--------------------------------------------NetBIOS Local Name TableName Type Status---------------------------------------------GMVPS01 <00> UNIQUE RegisteredWorkgroup <00> group registeredGMVPS01 <03> UNIQUE RegisteredGMVPS01 <20> UNIQUE RegisteredWorkgroup <1E> is registered to the group---------------------------------------------The computer to respond to the "host not found", then one of two things: EitherCase:1. hostname drunk.2. The host is not hackable.If you are number one, you're in great luck. Both of these systems are hackableNBTSTAT command. So try another system.If you got to the table above for each of you as I look at it carefully, untilPart of its purpose.- The name of the computer that shares the name of a specific part of the United States<00>, <03>, <20>, <1E> - to provide the services that are available to you on alerts HexidecimalShares that name.Class - are self-explanatory. In both cases, it is always turned on, or activated, or being.Status - is simply the name of the share and is enabled.Look at the top and look for the following line:GMVPS01 <20> UNIQUE RegisteredSee it?Good! This is important so listen up now. <20> means that Hexidecimanl CodeThat is in line with the number of hex file sharing is enabled on the shared name. IGMVPS01 that have file sharing enabled. So if you want to hack. HereHow to do it. (The hard part)
File LMHOST
One with the IP address to hack Role...5 IP via DC (direct connection) path
IP via DC (direct connection) path5. First. You're going to need to find his IP or host name. Either way will work. if youmIRC on the type / whois (nick) ... where (nick) people can get it by using the nicknamesWithout parentheses. You'll find a host name or IP address. Copy it. If you do notIt is not directed to, or after you connect to the computer, do not use mIRCOr you can use the IP address or host name of the figure is a sniffer. It is actually goodIt's the most sniffers- a-day without sniffer works now. So if you wantYou can directly connect to their computer. OK, a direct connection?When you:You can send a file directly to their computer are connected.If the AOL instant messenger allows you to connect directly to the user.ICQ when sending a file, or you can connect directly to a chat request acception.Any time you are sending a file. If you are directly connected. (Assuming you knowThe user is not using a proxy server.)Connects directly to the Yahoo voice chat.If you have one of these programs, in both cases, I suggest you get if you get a sniff, orRead the next statement.Allowing traffic to the site that have no way to send links to your site themeFigures, and you get a statistical test and then send a link to your site, you can log inLast visitor IP. It is a simple and easy method I use. It's not even something sillySmart hackers, because it catches them off guard. However, eleven straightTwo methods are used to connect I showed you earlier and get into DOS. ClassNetstat -n. Netstat is a program that is the name of the net figures are small. ItThe computer will show you are connected to the police. If you think you are (the same largeHacked by a Trojan horse, and you know that that is a port such as: Sub Seven:27374.)Connect your computer to your screen should look like this Country:-------------------------------------------------- ----------------------------------------------C: \ Windows \ Desktop> netstat -nActive connectionProto Local Address Foreign Address StateEstablished TCP 172.255.255.82:1027 205.188.68.46:13784Established TCP 172.255.255.82:1036 205.188.44.3:5190TCP CLOSE_WAIT 172.255.255.82:1621 24.131.30.75:66Established TCP 172.255.255.82:1413 205.188.8.7:26778Established TCP 172.255.255.82:1483 64.4.13.209:1863C: \ Windows \ Desktop>-------------------------------------------------- ----------------------------------------------The first line protocol (language) that is being used by two of the indicatedComputer.TCP (Transfer Control Protocol) Being used and widely used is the Esta.Local IP address shows your address, or IP address of the system you're on.Foreign address is the address of the computer connected to the police.This means - the type of connection being made to the State was established to youAs long as you have a computer program or as long as you stay connectedOr it is required to connect to another computer. CLOSE_WAIT meansThe attempt to connect to the bar and wait until it is needed or the connection to be re-introducedMade again. It is not that one of the last means to TIME_WAIT. MostTIME_WAIT run ads on AOL is that the United States is using.You know, because of the way the person is directly connected to your computerThis is:-------------------------------------------------- ----------------------------------------------C: \ Windows \ Desktop> netstat -nActive connectionProto Local Address Foreign Address StateEstablished TCP 172.255.255.82:1027 205.188.68.46:13784Established TCP 172.255.255.82:1036 205.188.44.3:5190TCP CLOSE_WAIT 172.255.255.82:1621 24.131.30.75:66Established TCP 172.255.255.82:1413 abc-123-ppp.webnet.comEstablished TCP 172.255.255.82:1483 64.4.13.209:1863C: \ Windows \ Desktop>-------------------------------------------------- ----------------------------------------------The fourth line is the host name instead of IP addresses are not included in the Notice.The other computer is connected to that, almost always. So here, now,If you have the host name:abc-123-ppp.webnet.comIf the host names and IP is one of the reasons it is not no problemIt works just the same. I am using as an example the host name abc-123-ppp.webnet.com.OK, so now if you want the remote system's IP and / or host name ofConnect with. Time to hack!Open your DOS commands. Open type NBTSTAT NBTSTAT. OK, thereShit again. Well, now you have this document tries to leanredRemote IP and / or host name to test it. The only thingYou'll need to know.Importantly, to read now !!!-a (adapter status) STI remote machine name table, given the list of names-A (Adapter status) Lists the remote machine name table, given the IP address.Remember this?It is time to use.-a host name will be-A To IPSometimes they die do not know?-a -a Command to read the following statement. It is what each of you thereTakes command.So which one is the best to use?Good!start time.
Use it to your advantage
One with the Host NameIP address to hack Role..4 IP address
IP addressIf you want to give the IP address, host name, then you can resolce 4. (Internet Protocol)The range of IP addresses. An IP address looks like this:201 123 101 123A wired connection to a computer is running, you can often tell youIP address number. The faster the connection, the first two numbers are usually low.Here is a connection cable IP.24.18.18.10IP dial-up connection to the server's good, too:208 148 255 255208 connecting cable, which is higher than the target of 24.Remember though, this will not be like all the IP addresses.Some companies make it a hacker to fool into believing this is the same IP addressDial-up server, a hacker like a T3 or OC -18'd expect ,. However, thisIf you will be using on the nbtstat command, which gives you an idea on the IP address.
Click IP via DC (direct connection) path
One with the Host NameIP address to hack Role..3 Host Name
Host Name3. Now, -A you the type of person that would mean that the host computerThat means you are trying to access. Just in case you have any idea what a host nameHere is an example of that.123-fgh-ppp.internet.comThere are many variations of these adresses. You can see a different address eachBe certain that your computer does not have a new ISP. Look at the difference.abc-123.internet.comghj-789.newnet.comThe past few marks, as you can see differnet host name, andThis is the sound of two computers from two different ISPs will be able to say it.Now, the same ISP, but the host name of the server to a different result.123-fgh-ppp.internet.com567-cde-ppp.internet.com
Click Host Name
Subscribe to:
Comments (Atom)




