Hack into your Friends Computer
()
About this ebook
Related to Hack into your Friends Computer
Related ebooks
Hack Computer System For Noobee Rating: 1 out of 5 stars1/5Learn Kali Linux 2019: Perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark Rating: 0 out of 5 stars0 ratingsHacking: Computer Hacking for beginners, how to hack, and understanding computer security! Rating: 5 out of 5 stars5/5Learning zANTI2 for Android Pentesting Rating: 0 out of 5 stars0 ratingsWireshark Essentials Rating: 0 out of 5 stars0 ratingsHacking for Beginners: Your Guide for Learning the Basics - Hacking and Kali Linux: Security and Hacking, #1 Rating: 5 out of 5 stars5/5Mastering Metasploit Rating: 0 out of 5 stars0 ratingsKali Linux Wireless Penetration Testing: Beginner's Guide Rating: 0 out of 5 stars0 ratingsWireshark for Security Professionals: Using Wireshark and the Metasploit Framework Rating: 5 out of 5 stars5/5Kali Linux Network Scanning Cookbook - Second Edition Rating: 0 out of 5 stars0 ratingsKali Linux, Ethical Hacking And Pen Testing For Beginners Rating: 0 out of 5 stars0 ratingsApplied Network Security Rating: 0 out of 5 stars0 ratingsEthical Hacking for All: Complete A to Z Tips and Tricks to Ethical Hacking Mastering Rating: 5 out of 5 stars5/5Metasploit Bootcamp Rating: 5 out of 5 stars5/5Mastering Metasploit - Second Edition Rating: 5 out of 5 stars5/5Nmap: Network Exploration and Security Auditing Cookbook - Second Edition Rating: 0 out of 5 stars0 ratingsPractical Ethical Hacking from Scratch Rating: 5 out of 5 stars5/5Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming Rating: 3 out of 5 stars3/5Kali Linux – Assuring Security by Penetration Testing Rating: 3 out of 5 stars3/5Become An Ethical Hacker That Can Hack Computer Systems And Secure Them Like Security Experts Rating: 0 out of 5 stars0 ratingsPenetration Testing Bootcamp Rating: 5 out of 5 stars5/5Cybersecurity Blue Team Toolkit Rating: 2 out of 5 stars2/5Protect Your Personal Information Rating: 0 out of 5 stars0 ratingsCertified Ethical Hacker C.E.H v11 Exam Prep And Dumps Rating: 0 out of 5 stars0 ratingsAn Introduction to Hacking and Crimeware: A Pocket Guide Rating: 0 out of 5 stars0 ratingsHackerTools Crack With Disassembling Rating: 2 out of 5 stars2/5
Security For You
CompTIA CySA+ Study Guide: Exam CS0-003 Rating: 2 out of 5 stars2/5Cybersecurity For Dummies Rating: 5 out of 5 stars5/5Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers Rating: 4 out of 5 stars4/5Black Hat Python, 2nd Edition: Python Programming for Hackers and Pentesters Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar Rating: 4 out of 5 stars4/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5CompTIA A+ Complete Study Guide, 2-Volume Set: Volume 1 Core 1 Exam 220-1201 and Volume 2 Core 2 Exam 220-1202 Rating: 0 out of 5 stars0 ratingsThe Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5CompTIA PenTest+ Certification For Dummies Rating: 0 out of 5 stars0 ratingsIAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsHacking Point of Sale: Payment Application Secrets, Threats, and Solutions Rating: 5 out of 5 stars5/5How to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 5 out of 5 stars5/5CISSP For Dummies Rating: 4 out of 5 stars4/5CompTIA Linux+ Study Guide: Exam XK0-005 Rating: 0 out of 5 stars0 ratingsThe Art of Selling Cybersecurity Rating: 0 out of 5 stars0 ratingsCybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5CISSP:Cybersecurity Operations and Incident Response: Digital Forensics with Exploitation Frameworks & Vulnerability Scans Rating: 0 out of 5 stars0 ratingsCCNA Wireless Study Guide: IUWNE Exam 640-721 Rating: 5 out of 5 stars5/5Codes and Ciphers Rating: 5 out of 5 stars5/5IT Governance – An international guide to data security and ISO 27001/ISO 27002, Eighth edition Rating: 5 out of 5 stars5/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratings
0 ratings0 reviews
Book preview
Hack into your Friends Computer - Magelan Cyber Security
Introduction
1
shared (You’d be amazed at some peoples stupidity!!!), this shows up as a result such as
\\80.5.7.2\C or similar. Simply copy & paste this link into the address bar of Windows Explorer, and hit enter! This is a screenshot of Netbrute in operation: For more comprehensive information, use a utility such as Languard Network Scanner. This returns a wealth of information such as domain names, login names, and more. Here is a shot of this in use:
2
Need I say more? If you find a system where the root directory of C: is shared, then on Windows 9.X systems, you’ll be able to access the whole of the hard drive. On Windows NT/2000 systems, you will have only access as according to NTFS file access permissions. Here is a screenshot of Windows Explorer pointed at the root directory:
3
You can even map it to a network drive (use tools > map network drive), it’s as easy as that!
For best results, I recommend choosing systems with ‘better than modem’ connections. If you don’t know where to start, try your own IP address. To get this, do the following:
•
For Windows 9.X, go to start > Run and type ‘Winipcfg’ to get your IP address.
•
For Windows NT/2000, got to start > programs > accessories > commend prompt, and type ‘ipconfig’.
This will return your IP address. If you are using a dialup connection, you will need to connect first. For ‘always on’ cable connection, omit this step. Then run your scan over the subnet; e.g. if your IP address is 164.99.34.212 then try a scan from 164.99.34.1 to 164.99.34.254. This should be enough to get you started. Have fun…
IP Scanning
This simple scan simply pings a range of IP addresses to find which machines are alive. Note that more sophisticated scanners will use other protocols (such as an SNMP sweep) to do the same thing. This is a very simple technique which requires little explanation. It is however, useful for the domain name to be returned also.
4
Port Scanning
This section introduces many of the techniques used to determine what ports (or similar protocol abstraction) of a host are listening for connections. These ports represent potential communication channels. Mapping their existence facilitates the exchange of information with the host, and thus it is quite useful for anyone wishing to explore their networked environment, including hackers. Despite what you have heard from the media, the Internet is NOT exclusively reliant on TCP port 80, used by hypertext transfer protocol (HTTP). Anyone who relies exclusively on the WWW for information gathering is likely to gain the same level of proficiency as your average casual surfer. This section is also meant to serve as an introduction to the art of port scanning, in which a host system can be persuaded to yield up it’s secrets. To accomplish this, you need to obtain a port scanner. There are many available both for free or for a small fee.
It should have all these features:
•
dynamic delay time calculations: Some scanners require that you supply a delay time between sending packets. Well how should I know what to use? You can always ping them, but that is a pain, and plus the response time of many hosts changes dramatically when they are being flooded with requests. For root users, the primary technique for finding an initial delay is to time the internal ping
function. For non-root users, it times an attempted connect() to a closed port on the target. It can also pick a reasonable default value. Again, people who want to specify a delay themselves can do so with -w (wait), but you shouldn’t have to.
•
Retransmission: Some scanners just send out all the query packets, and collect the responses. But this can lead to false positives or negatives in the case where packets are dropped.
This is especially important for negative
style scans like UDP and FIN, where what you are looking for is a port that does NOT respond.
•
Parallel port scanning: Some scanners simply scan ports linearly, one at a time, until they do all 65535. This actually works for TCP on a very fast local network, but the speed of this is not 5
at all acceptable on a wide area network like the Internet. It is best to use non-blocking i/o and parallel scanning in all TCP and UDP modes. Flexible port specification: You don’t always want to scan all 65535 ports! Also, the scanners which only allow you to scan ports 1 - N often fall short of my need. The scanner should allow you to specify an arbitrary number of ports and ranges for scanning. For example, ‘21-25,80-113’ is often useful if you are only probing the most frequently running services.
•
Flexible target specification: You may often want to scan more then one host, and you certainly don’t want to list every single host on a large network! It is useful to scan, say a subnet at once, e.g. 131.111.11.0 – 131.111.11.254.
•
Detection of down hosts: Some scanners allow you to scan large networks, but they waste a huge amount of time scanning 65535 ports of a dead host! Annoying! You are advised to choose a scanner which allows timeout intervals to be adjusted.
•
Detection of your IP address: For some reason, a lot of scanners ask you to type in your IP address as one of the parameters. You don’t want to have to ‘ifconfig’ and figure out your current IP address every time you connect. Of course, this is better then the scanners I’ve seen which require recompilation every time you change
