• November 27, 2024

How To Hack Another Computer Through Internet Ip Address

Hack 58 Control Another PC with Remote Access

Hack 58 Control Another PC with Remote Access

Hack 58 Control Another PC with Remote Access
You can control a computer�virtually
moving its mouse and typing on its keyboard�over the Internet,
using either Windows XP’s built-in features or a
third-party program.
When you are
at work, wouldn’t it be nice if you could log onto
your home computer to check your email or find a file you took home?
How about using your home or office desktop computer from your laptop
on the road? You can use a remote control program to use another
computer over the Internet, viewing its screen on your screen and
giving commands via your mouse and keyboard. Windows XP comes with a
feature called Remote Desktop, or you can use a third-party program.
Windows Messenger [Hack #78] also enables people who
are chatting to share control of each other’s
computers.
The computer you will control is called the remote
server,
and the computer you are actually sitting in front of is the
remote client. Windows XP comes with a remote
client program (Remote Desktop Connection), and Windows
XP Professional comes with a remote server (Remote Desktop) that
works with one client at a time�that is, one computer can
“take over” your computer remotely
(with luck, it’ll be you doing the takeover! ).
Remote Access Server (RAS) on Windows NT
or 2000 servers and the
Routing and Remote
Access utility on Windows Server 2003 both act as remote servers that
allow multiple remote clients to connect.
Windows XP Home Edition can’t act as a remote
server; if you need to be able to access a Home Edition system
remotely, you need to upgrade to Windows XP Professional or use a
third-party program. We recommend VNC, the small, free, open source
program from the University of Cambridge Department of Engineering
(information and free downloads are available at).
5. 18. 1 Configuring the Windows XP Remote Server
If you want to be able to
control your Windows XP Professional system remotely, set it up as a
remote server. Using an administrator user account, choose Start
Control Panel Performance and Maintenance
System (or press the Windows-Break key), click the Remote
tab, select the checkbox in the Remote Desktop section of the tab to
enable incoming connections (“Allow users to connect
remotely to this computer”), and click the Select
Remote Users if you want to control which user accounts can be used
by remote clients. (Windows automatically allows connections from the
current user, along with all user accounts in the local
Administrators and Remote Desktop Users groups. )
Normally, remote clients connect to the server via a local area
network or a permanent Internet connection. However, you can also
configure the remote server to accept incoming phone calls if you
have a dial-up modem. Create a dial-up connection that accepts
incoming calls by running the New Connection Wizard (click
“Create a new connection” from the
task pane in the Network Connections window). Choose
“Set up an advanced connection” as
the Network Connection Type, choose “Accept incoming
connections, ” choose your modem, choose whether to
accept VPN connections [Hack #49], and choose
which user accounts the incoming connection can connect to.
Firewalls usually refuse
remote access connections [Hack #46] and [Hack #48], so if you want your remote
server to be accessible from the Internet, you need to open a port in
your computer’s firewall [Hack #50]. Remote Desktop uses port
3389. If you use Windows XP’s built-in firewall,
display the Network Connections window, right-click the Internet
connection, choose properties from the shortcut menu, click the
Advanced tab, and click Settings to display the Advanced Settings
dialog box. Click the Remote Desktop checkbox; if the Service
Settings dialog box appears, just click OK.
If you want to change the Remote Desktop server port to a number
other than 3389 (perhaps to decrease the likelihood of hackers
breaking through it), see the Microsoft Knowledge Base article
Q187623 (at, type the
article number in the “Search the Knowledge
Base” box).
When you connect from your remote client (described later in this
hack), you need to provide a domain name or
IP address. If your
computer connects via a dial-up, DSL, or cable connection, its IP
address changes each time you connect, and the computer
doesn’t have a domain name. One solution is to have
someone at the remote server display the Network Connections window,
right-click the Internet connection, choose Status from the shortcut
menu, click the Support tab, and call, IM, or email you with the IP
address that appears. However, this solution is no good if no one is
available to do this. Instead, you can sign up for a dynamic DNS
service
[Hack #59] at or. The dynamic DNS service
at gives you a free domain name in the form (they offer
several dozen domain names to which you can add your name).
provides a subdomain at for $25 per year.
You install a small utility on your computer that automatically tells
the dynamic DNS whenever your computer’s IP address
changes.
One final configuration note: when a client connects to your server
via Remote Desktop, the user logs into one of the Windows XP user
accounts. You can’t log into accounts that have no
password. Choose which account you plan for remote user(s) to log in
with, and give it a password.
5. 2 Setting Up the Remote Client
To set up the remote client software that
comes with Windows XP, connect to the Internet and then choose Start
All Programs Accessories
Communications Remote Desktop Connection. (If
it’s not there, you need to install it from your
Windows CD. ) In the Remote Desktop Connection window, type the domain
name or IP address of the server computer and click Connect. Log on
with the Windows XP user account and password for the remote server.
Your computer screen now shows what’s on the screen
of the server computer. A connection bar appears as a button on the
screen, showing the IP address of the remote server, along with
Minimize, Restore, and Maximize buttons you can use to resize the
remote client window.
Once you’re connected, you can cut and paste
information from the remote client window to other windows. You can
also use local files in your remote session; your local disk drives
appear in My Computer (Windows Explorer). When you print from the
remote client, the print job goes to your default local printer, not
the printer on the server.
�Margaret Levine Young
How Hackers Use Your IP Address to Hack Your Computer ...

How Hackers Use Your IP Address to Hack Your Computer …

Your IP (Internet Protocol) address is your unique ID on the internet. It’s synonymous with your home address. Anyone in the world can contact your computer through its
IP address, and send a retrieve information with it.
I’m sure at one time or another you’ve heard that hackers can hack your computer via your IP address. This is one of the reasons proxies and anonymity services exist, to protect people from learning your IP address. So how are hackers using just an address to get into your computer and make your life hell? Open ports. Your computer runs services like media sharing on what are called ports. A port is just an opening that a service uses as a communications endpoint. There are 65, 535 total allocated ports in TCP/UDP. To exploit a service on a port, a hacker would banner grab for the software and version to scour sites like Packet Storm for exploits to run against the ‘s Null Byte is going to demonstrate a simple “port scan” on local computer using Nmap, and teach how a hacker would exploit these services, as well as how to guard ourselves against it. This will be done under Linux, but Nmap is available for all platforms. If you can’t figure out how to install it in Windows with the GUI installer (yeah, right), follow along using 1 Download & Install NmapBold words are commands that must be entered in a terminal emulator.
First, we must download Nmap, which is going to be our tool that we use for port scanning and information gathering: wget, extract the archive: tar -zxvf
Change to the newly made directory: cd This is the standard installation procedure:. /configure
make && sudo make installNmap should now be installed! Step 2 Scan for a TargetLet’s scan a local computer. I’m going to use a website as an example, rather than a local computer. This is because my firewall is absolutely crazy, and filters out scans. Don’t scan a remote computer with the intentions of doing bad deeds. This is for educational purposes by mapping out your local network:
sudo nmap -sP 192. 168. 1. 0/24That should return a list of hosts that are up for a port scan! Step 3 Scan Your Individual TargetOut of the returned list of targets, pick one that you would like to scan for services. Let’s do a full scan of all the TCP/UDP ports: sudo nmap -p 1-65535 -T4 -A -v
You should get something that looks like the following image:As you can see, this target has MANY open ports. SSH piques my interest, so let’s move on to banner grabbing to learn the software version or our choice of 4 Banner GrabbingFor this, you can use the regular ol’ telnet client. Telnet comes with Windows and most Linux distros: telnet
From this, I would learn which software version the service is running, then see if I can find a way to exploit Can I Protect Myself? Luck for all of you lovely people, I recently made a tutorial on iptables, which will filter out unwanted connections. Also, disable any unnecessary programs that connect to the internet (remote administration, media sharing, etc). Windows users, install Comodo firewall, it’s incredible and uses a simple point and click installation, and will filter ports for you. It has great default settings and it is by powtac
Via How Hackers Use Your IP Address to Hack Your Computer & How to Stop It on
Read more posts on WonderHowTo »
How a Hacker Might Exploit Your IP Address

How a Hacker Might Exploit Your IP Address

A hacker is simply an online vandal, if you think about it. What do vandals do but damage things that don’t belong to them, for no good reason other than to do it. A hacker wants to worm his way into a network of his choosing to do serious (or not-so-serious) damage, such as stealing email addresses or your personal data.
Hacking is mostly focused on causing trouble for big companies and government agencies. But anything is fair game, and that’s why some junior hackers will stoop so low as to hack the IP addresses of our computers, just to mess things up for a bit.
Your network identifier: an IP address.
As you likely know, every computer that is connected to a network or the Internet has its own IP address. Everyone on the Internet has to have an IP address to send emails, look up information or buy online. It’s as simple as this: When you’re connected, you have an actively working IP address. And depending on where you are, your IP address can change.
A lot of Internet chatter that says our IP addresses can reveal our identities is not accurate. As experts have pointed out, if our IP addresses were truly the gateway to all of our personal and private information, then the entire Internet would be one big mess. But fortunately, our IP addresses alone do not make us easy targets.
Unfortunately, that doesn’t mean hackers will leave IP addresses alone. Remember—hackers simply like to mess things up, so they’ll still see what disruption they might be able to cause.
But just how would the hacker get into your computer anyway?
Ports: like doors to your home.
In the world of TCP/IP, the interface between the networks and your programs occurs through a system of electronic channels called ports. Each of these ports has a unique number that identifies it. So, in a sense, the ports are pipelines in the computer through which data can flow to and from a particular application and the network protocol software.
Each IP address has ports associated with it. Those ports are an important part of your computer system: Several programs (applications) might be running on the same computer, and the built-in network software on your computer needs to have a way of knowing what incoming packet of data is intended for what application. It needs to know, for example, how to send incoming emails to your email program.
That’s how that happens.
A building with rooms.
So we have IP addresses, ports and programs. Think of them as an address on your computer, a doorway into a room, and a room itself. With this picture in mind, look at your port as a back door that allows entry into your house…your computer. Completing the analogy, the room is a single application (program) you’re running.
If you’re connected to the Internet and running a program, a related port (identified by a number) will be open. That’s good for you, but it could allow someone who knows your IP address (an outsider, a hacker) access into your connection, with some ability to engage or affect the program you’re running.
Behind the door.
Fortunately, each room/program is somewhat self-contained and doesn’t have connecting doors to the other “rooms” in your computer. So, even if a hacker gets your IP address, sneaks into your port through the big back door and gets into your program, that’s as far as they can go.
Is there a way to block the door? Yes. That’s where a firewall comes into the picture. It essentially blocks intruder activity from getting through the ports.
Making your IP address invisible.
One way to keep hackers at bay is to hide your true IP address. One way to do this is to set up a personal Virtual Private Network (VPN). With a VPN, your online requests are routed through a vast network of computers, and you use a temporary VPN to communicate online. A hacker would not see your true IP address and wouldn’t be able to connect to your computer.
For more information, see our pages on hiding an IP address and Virtual Private Networks.
Related Articles
What is Hacking?
What is Malware?
Building a Better Password

Frequently Asked Questions about how to hack another computer through internet ip address

Leave a Reply

Your email address will not be published. Required fields are marked *