I'm a genious, listen to me
Ite, I know alot about hacking for I learned from a ******, but times have changed, and its more effcient to use a program to connect to some*'s computer. These programs I do not know, and can anyone plz tell me some of those programs? Now, I shal teach you somthing about Microsoft.
Microsoft is evil, and if u don't believe me, then heres your proof. When u install Windows, your C drive is automatically Shared to anyone on the internet. If u connect to some*'s computer by using one of their shared folders, their C drive will be saved as c$ or $c That means, you can use that as your 'bridge' to their computer, or as I learned it was called. Now, if your sdealling with some* stupid, and u want to hack theri computer, use Remote Manager; this is a program which is automatcially installed with Windows. Imput your victums ip in there, and htey get a screen taht says would u like to connect to so and so; if t heir supid, their probably say yes, and you'll have full access to their computer. Also, if u want to get into some*'s computer by using their login name and passoword, Windows hides a user account from ev eryone that is named Admin, or Administrator. The password will always be password. If you get a screen asking for a login name or passowrd, try those combinations, or use Websnort to get weak packets whcih will tell you their ip. Websnort is a Linux Program, so just use a boot disk of Linux to use websnort and get some*'s passoword. Any questions or comments, plz email me at [email]DarkenLight@comcast.net[/email]
Peaces
Kris
I'm a genious, Listen to me
[QUOTE=Unregistered]Whoever said this can u help me, when u said after ur directly connected with the person, which i got aim and i can direct connect,then where is the Ms-DOS?If you can help me thanx.[/QUOTE]
If you don't know how to get onto Ms-DOS, you definently won't be able to do any of the other stuff required for hacking. Ms-Dos is a command prompt menu; you imput commands, and it does those specific commands. To get to Ms-Dos, you go to Start:run and in the little box that pops up, type in cmd. A black screen will pop up; this is MS-DOS.
Now, using MS-DOS to find ips:
Ty pe in [b]netstat -n[/b] into the box, and a bunch of Ips wiht ports will appear. Find the specific person you are looking for by using the port numbers. If you want to find someone's ip while ur talking to them on AIM, find the AIM ports, and one of them will be that person's ip. Compair and contrast wiht that you usually get, and you'll be able to zero them out.
Now, to find some*'s ip in a chatroom:
In aim, there is no way that you can find some*'s ip in a chatroom becuase there is simply becuase you aren't connected to them, but your connected to somewhat of a server. The ip you will find in netstat -n won't be of the people in the chatroom, but the ip of the chatroom itself. I do believe tho, the host of the chatroom will have the same ip as the chatroom itself. Now, on Yahoo Messenger, if your in a chatroom, and someone uses voice communication, Yahoo opens up specific ports on your computer. In other words, your directly connected to the person speaking. Netstat -n their @$$ and you'll have their ip. As for MSN Messenger, use MSN X becuase u can directly connect to others.
Now, for many of you who want to 'hack' some*'s computer, i will give you a simple and limited methoid which really isn't hacking their computer, but exploiting it. The ping attack that i'm going to teach you people only works on computers wiht Windows NT *.0 or *.5, Win *8, Win *5, all Linux's, All Macs. You go into command prompt, and you type in ping (thier ip). What will happen, is your computer will send specific packets to their computer, and their computer will respond to your computer. Now, the byte rate of this ping is *2 bytes. What you want to do, is overflow th eir computer wiht packets and cause their computer to stall and shutdown. to do this, use the command: ping (thier ip) -l 65500 -f
Now, what will happen, is your computer will send a huge packet that the other computer can't handle. You usually want to do this on a remote computer. Now, without the -f at the end of the ping command, your computer would fragment the 65500 byte package into smaller bytes; that means that their computer will get a couple smaller packets, and they won't be overloaded, so add the -f at the end. Hope this helped some of ye. Just email me wiht ?s and Comments. Peaces
[email]DarkenLight@comcast.net[/email]
Kris
Hey man - i will wait for that when you email me
Hi guys and girls!
Its Stefanie Cierpka.
I AM SEX TEACHER - I AM TEACHING SEX
AT HOME FOR FREE.
ALSO I CAN SEND YOU MY NUDE FOTOS FOR FREE.
My full contact information is below:
Germany,
06526 Sangerhausen,
Am Beinschuh, 40
Tel.
004* *464 *445*6 (house)
004* *6* 84*66*6 (mobile)
Stefanie Cierpka
[email]Blindflantsch@aol.com[/email]