TGS Forum
Hello Guest,

You are currently viewing our boards as a guest, which gives you limited access to view most discussions and access our other features.

By joining this community for FREE, you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content, & many other special features.

Registration is fast, simple & absolutely free, so please, join our community today!

PortalHomeFAQRegisterLog in

Share | 

 How to hack into an Ethernet connection through the Internet

Go down 
Grade - 2
Grade - 2

Points : 113
Posts : 56
Join date : 2011-08-12
Age : 26
Location : Greater Noida

PostSubject: How to hack into an Ethernet connection through the Internet   Thu Sep 22, 2011 2:38 am

The methods to hack into an Ethernet are numerous. One of the most basic methods is to gain access to the target's hard drives. This method does not require a high level of skill and yet is very effective. As long as you have a working knowledge of DOS, you are capable of hacking a computer that is not properly protected (ie.: the Windows default passwords are still operational).

If a loophole is discovered, a hacker can easily re-write, copy, delete and otherwise modify the files stored on your hard drive, The hacker may also gain access to the rest of the Ethernet by going through the aforesaid computer. In the Windows 98 series and Windows ME, there aren't many such loopholes; however, in Windows NT, Windows 2000 and Windows XP, there are many such loopholes. In all three of these operating systems, there exist DOS commands to view all files stored on the computer, even ones that are not normally being shared.
An example of this is to run the Command Prompt (click Run from the Start Menu and then run cmd) and then type "net share". A list of the drives follows and through this it is possible to gain access to all of your drives. Fortunately, it is not possible to directly access the drives yet.

You must provide a valid username and password to gain access to them. Unfortunately, in all three of these operating systems, when the OS is installed, the default username is administrator and the password is left blank or set to a default password that is easy to obtain, allowing for easy access if this default setting has not been changed.

How to gain access to a computer

The first step requires that you have a program called X Scan and the computer you are trying to hack must have either Windows 2000 or Windows XP. Open X Scan and select the NT-server option and then enter the IP address of the target computer(s).. X Scan will then scan all of the computers to determine which ones have weak points (ie.: default passwords) and then display a list of all of the computers where such weak points were found.
It will also list all of the usernames that were found to use simple passwords; however, we are only interested in the usernames that have administration power. For example, say we found a computer with the IP address of with a username called "administrator" that has no password, The first thing is to try an IPC connection (IPC$). Start up the Command Prompt and then type "net use \\\IPC$ "" /user:".
For this example, the IP address is, the username is administrator and the password is blank, so the command for us would be: net use \\\IPC$ "" /user:administrator (Do NOT omit the quotation marks, they are necessary). After you press enter, a message should appear that reads "The command completed successfully". You are now connected to the target computer and unless your target was expecting this, he/she will not notice since it does not display anything to the user of the target computer.

Now, for the second step, you must detect the drives on the target computer. To do this, you must turn his drives from private to shared. We will demonstrate by detecting the C drive of the example computer. In Command Prompt, type "net use \\\$".

For eample, if we wanted to view his C drive as our own G drive, we would type: net use G \\\c$. Once again, a message should be displayed stating that "The command completed successfully". Also, you should notice that a new drive (G) is now present on your computer. In reality, this drive is the C drive of the target. Any changes you do to this G drive will be done to his C drive. This would allow for the planting of Trojans, viruses and other harmful programs. You cannot name this virtual drive with the same name as a drive that already exists on your own computer.
If you do not what drives you have, just enter "*" in the place of the drive letter and the computer will automatically pick the most suitable drive letter (net use * \\\c$).
To disconnect from the drive, type "net use \\\$ /del" (for our example, this is: net use \\\c$ /del).

Thus, the two lessons you should learn from this (other than how to hack), is how to prevent hacking by changing default passwords and downloading updates whenever they are available. You should also delete the drives from the net share by typing "net share" in the Command Prompt followed by net use \\\ /del.

You should also turn off the Guest account to make it a bit harder for hackers to gain access to your computer. You can do this by typing "net user guest delete" in the Command Prompt. If you want to start using it again, just type "net user guest".
Back to top Go down
How to hack into an Ethernet connection through the Internet
Back to top 
Page 1 of 1

Permissions in this forum:You cannot reply to topics in this forum
TGS Forum :: Hacking Section :: Hacking Tutorials-
Jump to:  
Create a forum on Forumotion | © phpBB | Free forum support | Contact | Report an abuse |