How to Hack a Computer
Hacking a computer is a useful and, at times, important skill to pick up. Below are instructions for getting past a password (if you find yourself logged out of a computer or want to check up on your child or spouse), gaining remote access to a computer (to check on a user or help locate a stolen machine), or crack a wifi password (in the event of an emergency, such as if you become lost in an unfamiliar city and you need to look up directions
Method 1 of 3: Getting Past a Log In Password
-
1Boot the computer in safe mode.Ad
-
2Click “Start”.
-
3Click “Run”.
-
4Type in “control userpasswords2”.[1]
-
5Change passwords for any account. This is probably going to be obvious to the user, so you may have to tell them a little white lie. Try something along the lines of: "Oh, I hear computers glitch like that sometimes. You can always type in recoverpassword if you get locked out and then set a new password" (in which case you will want to set the password to the account to recoverpassword or whatever you tell this person).[2]
-
6Reboot the computer.
Method 2 of 3: Getting Remote Access
-
1Download the program LogMeIn. There is a free version, though you can purchase a subscription if that better meets your needs.[3]
- The program will need to be downloaded to the computer you intend to remotely view or use. This makes it useful for gaining access to your computer if it is stolen or for checking up on your teen’s daytime activities during the summer.
- You will have to make an account with the LogMeIn website in order to use the software.
-
2Log in to the website. Log in to LogMeIn’s website.
-
3Navigate to the “My Computers” page. It should open automatically when you sign in.
-
4Add the computer you intend to remotely access. You will see an “Add computer” button on the page. Click that and fill in the info for the computer you intend to access.
-
5Click the name for the computer once it’s added.
-
6Log on to the computer. This means you’ll have to know the username and password for the account you’re trying to access or view.
-
7Click “Remote Control”. If you’re trying to be sneaky (such as to spy on the user), try to move the mouse as little as possible and don’t click on anything.
-
8Log out when you’re done.
Method 3 of 3: Cracking a Wifi (WEP) Password
-
1Download the necessary programs. You will need 2 programs to make this hack work: CommView (which will be used to look for vulnerabilities in the network you’re trying to access[4]) and AirCrackNG (which will break the security key itself)
- Make sure your computer’s wireless adaptor is compatible with CommView.
-
2Find a Network. Use CommView to scan for wireless networks. Choose a network with a WEP key and a decent signal.
-
3Filter the search to that network. Right click on the network you want to access, select “Copy MAC address”, go to the Rules tab, then MAC Addresses, enable MAC address rules, then click Action→Capture→Add Record→Both. Paste in the MAC address.
-
4View Data packets. Sort out the Management (M) and Control (C ) packets so that you are only viewing the Data (D) packets.
-
5Save the packets. Go to the Logging tab and enable auto saving. You may need to change the settings on the Directory size and File size. Try 2000 and 20, respectively.
-
6Press the “Play” button to begin collecting. Wait until you have at least 100,000 packets.
-
7Click “Concatenate Logs” under the Log tab. Make sure all of the logs are selected.
-
8Export the logs. Go to the folder where the logs were saved and open the log file. Click File→Export→WireShark/tcpdump format and save it where you can find it easily.
-
9Open the newly created file with Aircrack. Start Aircrack and choose WEP. Open the file and click “Launch”.
-
10Enter the index number. When the command prompt opens, you’ll need to enter the index number for the target network. It is probably 1. Hit enter and wait. If it works, the key will be shown.Ad
Video
Warnings
- When even writing a non-harmful script on computer, people will not trust you with their computer
- Hacking a computer can have very serious consequences, especially if done on a public or school computer.
- You will most likely be seen in court or go to jail for illegally accessing computers that don't belong to you.
- Only use these techniques on your computer or on another person's computer with their permission.
- This form of hacking will cause the victim to know someone has been in their computer. Beware, you can get caught easily.
Sources and Citations
- ↑ http://answers.microsoft.com/en-us/windows/forum/windows_7-security/what-has-replaced-the-control-userpasswords2/3247dd60-cdaf-4d3b-81c0-7460a44afc05
- ↑ http://wiki.ljackson.us/Control_Userpasswords2
- ↑ http://download.cnet.com/LogMeIn-Free/3000-7240_4-10317491.html
- ↑ http://download.cnet.com/CommView/3000-2085_4-10042988.html
No comments:
Post a Comment