latest Post

How can i hack someone with it's ip address?

First it is illegal to "hack" someone. But let's continue...

You would need a Trojan program, or an Administrative Remote program. One was called Sub7 Trojan. And it requires that you physically plant a file in the other persons computer. It has to be on their HDD, then it opens ports so you can get in with your program.

I used to test it on my roommate, and do the black screen MAtrix thing with the green text. It came with a programmable file that you could give any file extension you wanted. You could even modify its filesize. It would only be 1k, but you could make the computer think it was 2Mb or whatever. In this way you can tailor the file to be a word document of appropriate size, an image, or an MP3. These are sent all over the internet and people click on them and open them. The Sub7 file would do nothing when you clicked on it. But inside, it would have opened up the preprogrammed ports, Then, with the knowledge of their IP address, you could port in and control certain things.

Trojans that are coded by professional hackers are usually REAL pictures or audio files. And do their dirty work when you open it, but you never suspect it because the image displays fine and doesnt crash your system. They can be browsing your HDD for vital information, Usually the My Documents folder first, without your knowledge. Some people mistakenly believe that by closing that image or whatever, that the hacking will stop, but its too late. If the person wishes to connect to you again, they can seed hidden files with dummy trojans where you will never find them. They usually have different filenames and sizes, but when the person tries to connect to you via IP later, they can get in without you activating anything. ( note from river: 95% of home users have dynamic ip adresses A.K.A. some people may know it as dhcp...automatically obtain i.p. adress. Most users run of this and most routers supply this. The only way you can log multiple times into a user is if there running on a static ip or if the second time you go on...they haven't disconnected from the internet from the first time you got in )

Email trojans work great because people download the file to view it. Or save it, or send it to friends as a haha funny. Truely well-coded trojans open ports when the file is loaded onto your temporary internet files folder, or even triggers things when it is displayed on the page!

You cannot hack someone with only their IP.

About Ramesh

Ramesh
Recommended Posts × +

0 comments:

Post a Comment