Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword
Like this
18Activity
0 of .
Results for:
No results containing your search query
P. 1
hack xp

hack xp

Ratings: (0)|Views: 332|Likes:
Published by api-3753590

More info:

Published by: api-3753590 on Oct 15, 2008
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less

03/18/2014

pdf

text

original

Is is possible to hack windows XP of my friends computer

XP Hacking with Windows XP so you have the newest, glitziest, "Fisher
Price" version of Windows: XP.
How can you use XP in a way that sets you apart from the boring millions of
ordinary users?
The key to doing amazing things with XP is as simple as D O S. Yes, that\u2019s right,
DOS as in MS-DOS, as in Microsoft Disk Operating System.

Windows XP (as well as NT and 2000) comes with two versions of DOS.
Command.com is an old DOS version. Various versions of command.com come
with Windows 95, 98, SE, ME, Window 3, and DOS only operating systems.
The other DOS, which comes only with XP, 2000 and NT, is cmd.exe.

Usually cmd.exe is better than command.com because it is easier to use, has
more commands, and in some ways resembles the bash shell in Linux and other
Unix-type operating systems. For example, you can repeat a command by using
the up arrow until you back up to the desired command. Unlike bash, however,
your DOS command history is erased whenever you shut down cmd.exe. The
reason XP has both versions of DOS is that sometimes a program that won\u2019t run
right in cmd.exe will work in command.com

Note: m not comparing bash to dos DOS is your number one Windows gateway
to the Internet, and the open sesame to local area networks. From DOS,
without needing to download a single hacker program, you can do amazingly
sophisticated explorations and even break into poorly defended computers.

****************You can go to jail warning: Breaking into computers is against the
law if you do not have permission to do so from the owner of that computer.
For example, if your friend gives you permission to break into her Hotmail
account, that won't protect you because Microsoft owns Hotmail and they will
never give you permission.

******************************You can get expelled warning: Some kids have been
kicked out of school just for bringing up a DOS prompt on a computer. Be sure
to get a teacher's WRITTEN permission before demonstrating that you can hack
on a school computer.

****So how do you turn on DOS? Click All Programs -> Accessories -> Command
Prompt that runs cmd.exe. You should see a black screen with white text on it,
saying something like this: Microsoft Windows XP [Version 5.1.2600](C)
Copyright 1985-2001 Microsoft Corp. C:\>Your first step is to find out what

commands you can run in DOS. If you type "help" at the DOS prompt, it gives
you a long list of commands.

However, this list leaves out all the commands hackers love to use. Here are
some of those left out hacker commands. TCP/IP commands: telnet, net stat,
nslookup, tracert, ping, ftp, NetBIOS commands (just some examples):nbt stat
netuse netview net localgroupTCP/IP stands for transmission control
protocol/Internet protocol. As you can guess by the name, TCP/IP is the
protocol under which the Internet runs. Along with user datagram protocol
(UDP). So when you are connected to the Internet, you can try these commands
against other Internet computers. Most local area networks also use TCP/IP.
NetBIOS (Net Basic Input/Output System) protocol is another way to
communicate between computers. This is often used by Windows computers,
and by Unix/ Linux type computers running Samba. You can often use NetBIOS
commands over the Internet (being carried inside of, so to speak, TCP/IP). In
many cases, however, NetBIOS commands will be blocked by firewalls. Also ,
not many Internet computers run NetBIOS because it is so easy to break in using
them. I will cover NetBIOS commands in the next article to XP Hacking. The
queen of hacker commands is telnet. To get Windows help for telnet, in
thecmd.exe window give the

command: C:\>telnet /?Here's what you will
get: telnet [-a][-e escape char][-f log file][-l user][-t term][host[port]]-a

Attempt automatic logon. Same as --l option except uses the currently
loggedon user's name.-e Escape character to enter telnet cclient prompt.-f File
name for client side logging-l Specifies the user name to log in with on the
remote system support the TELNET ENVIRON option.-t Specifies terminal type.
Supportedd term types are vt100, vt52, ansi and vtntonly.host Specifies the
hostname or IP address of the remote computer to connect to.port Specifies a
port number or service name.****************Newbie note: what is a port on a
computer? A computer port is sort of like aseaport. It's where things can go in
and/or out of a computer. Some ports areeasy to understand, like keyboard,
monitor, printer and modem. Other ports arevirtual, meaning that they are
created by software. When that modem port ofyours (or LAN or ISDN or DSL) is
connected to the Internet, your computer hasthe ability to open or close any of
over 65,000 different virtual ports, and hasthe ability to connect to any of
these on another computer - if it is runningthat port, and if a firewall doesn?t
block it.********************************Newbie note: How do you address a
computer over the Internet? There are twoways: by number or by
name.****************The simplest use of telnet is to log into a remote computer.
Give the command:C:/>telnet targetcomputer.com (substituting the name of
the computer you want totelnet into for targetcomputer.com)If this computer
is set up to let people log into accounts, you may get themessage:login:Type
your user name here, making sure to be exact. You can't swap between

lowercase and capital letters. For example, user name Guest is not the same as
guest.****************Newbie note: Lots of people email me asking how to learn
what their user nameand password are. Stop laughing, darn it, they really do. If
you don't know youruser name and password, that means whoever runs that
computer didn't give you anaccount and doesn't want you to log
on.****************Then comes the message:Password:Again, be exact in typing in
your password.What if this doesn't work?Every day people write to me
complaining they can't telnet. That is usuallybecause they try to telnet into a
computer, or a port on a computer that is setup to refuse telnet connections.
Here's what it might look like when a computerrefuses a telnet connection:C:\
>telnet 10.0.0.3Connecting To 10.0.0.3...Could not open connection to the
host, on port 23. Aconnection attempt failed because the connected party did
not properly respondafter a period of time, or established connection failed
because connected hosthas failed to respond.Or you might see:C:\ >telnet
hotmail.comConnecting To hotmail.com...Could not open connection to the
host, on port23. No connection could be made because the target machine
actively refused it.If you just give the telnet command without giving a port
number, it willautomatically try to connect on port 23, which sometimes runs a
telnet server.**************Newbie note: your Windows computer has a telnet
client program, meaning it willlet you telnet out of it. However you have to
install a telnet server beforeanyone can telnet into port 23 on your
computer.*************If telnet failed to connect, possibly the computer you were
trying to telnetinto was down or just plain no longer in existence. Maybe the
people who runthat computer don't want you to telnet into it.Even though you
can't telnet into an account inside some computer, often you canget some
information back or get that computer to do something interesting foryou. Yes,
you can get a telnet connection to succeed -without doing anythingillegal --
against almost any computer, even if you don't have permission to login. There
are many legal things you can do to many randomly chosen computerswith
telnet. For example:C:/telnet freeshell.org 22SSH-1.99-OpenSSH_3.4p1That
tells us the target computer is running an SSH server, which enablesencrypted
connections between computers. If you want to SSH into an accountthere, you
can get a shell account for free at http://freeshell.org/ . You canget a free SSH
client program from http://winfiles.com/ .***************You can get punched in
the nose warning: Your online provider might kick you offfor making telnet
probes of other computers. The solution is to get a localonline provider and
make friends with the people who run it, and convince themyou are just doing
harmless, legal explorations.*************Sometimes a port is running an
interesting program, but a firewall won't let youin. For example, 10.0.0.3, a
computer on my local area network, runs an emailsending program, (sendmail
working together with Postfix, and using Kmail tocompose emails). I can use it
from an account inside 10.0.0.3 to send emailswith headers that hide from
where I send things.If I try to telnet to this email program from outside this
computer, here's whathappens:C:\>telnet 10.0.0.3 25Connecting To
10.0.0.3...Could not open connection to the host, on port 25. No connection
could be made because the target machine actively refused it.However, if I log

Activity (18)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Saut Isak liked this
Idris Khan liked this
abhijeetlimgire liked this
Sanjay Jhony liked this
seenuvasan1985 liked this
seenuvasan1985 liked this
Imran Khan liked this
sheenam89 liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->