HOW TO HACK SOMEONE ELSE ON YOUR GROUP NETWORK - ULTIMATE BEGINNER HANDBOOK TO COMPUTER HACKING ESSENTIALS: LEARN ETHICAL HACKING, PENETRATION TESTING AND BASIC SECURITY: 50+ FREE RESOURCES TO HELP YOU MASTER THE ART OF HACKING (2015)

ULTIMATE BEGINNER HANDBOOK TO COMPUTER HACKING ESSENTIALS: LEARN ETHICAL HACKING, PENETRATION TESTING AND BASIC SECURITY: 50+ FREE RESOURCES TO HELP YOU MASTER THE ART OF HACKING (2015)

HOW TO HACK SOMEONE ELSE ON YOUR GROUP NETWORK

If you plan on becoming an Ethical Hacker, It's important never to engage in "black hat" hacking, so be sure that you ask for that person’s permission. Time to head back on to that wonderful Command Prompt for this one. The Command Prompt is where most basic hacking takes place and will often be the primary place where one where practice their skills on unsuspecting victims. Do note that this is only showing how to access a computer on your own network provided you don’t already have access to it.

To see if they are even on your network you have to type;

net view

This will tell you who is on the same network as you are. Do note that if you are on a hardline connection and if they are on a wireless connection, you will not be on the same network unless you are specifically connected through the Group Network. If you are both using the same connection, you should be on the same network unless you have one of the very unique modems that prevent this. However, most likely this is not one of your modems and you will be able to do this.

You will see something similar to;

\\Bob-PC

\\Nancy-PC

These are the actual names of the computers on your network. Next you will use the Tracert command and this command allows you to track the data to the point of destination, which is where their IP address is. So, let’s target Bob again (poor Bob);

tracert bob-pc

The command line will run this and let’s say we find his IP address, which looks like this;

Tracing route to bob-pc.lan [192.168.1.78]

With that IP address, we now begin to hack into his computer. Now, odds are we’ll need to Change our Directory, so then we type;

cd.. \..

This will bring us all the way to the C: drive and then we type;

cd Windows

This will allow you to access the Windows directory. Then you will want to grab so Network Binary Statistics on the Attributes from his ip address, so you type;

nbtstat -a 192.168.1.78

This will bring you the LAN and the WAN of your network to find that individual. So now that we have that, let’s go ahead and view his stuff to see what we want to use.

net view \\192.168.1.78

What will come up are the current “disks” on his computer and these are folders that are open to the internet by default. So, let’s go ahead and start going through their stuff, let’s say his “Documents” are there.

net use x: \\192.168.1.78 \documents

The disk will now show up in your My Computer area along with your other disks, like C:. The only way to prevent this from happening is to make sure that all the folders are private and to disable a few ports that are not necessary for you to be on the internet, but are there in case you ever determine you want to share information.