PDA

View Full Version : Hack Your Victums computer with just with an IP



CpLover
07-23-2013, 12:03 AM
Hack Your Victums computer with just with an IP
First of all i want to tell that am not a pro hacker.
Just a student in hacking.
This is is a tutorial for educational purpose only.

1.) First you need to download Metasploit.
Simpley go to Penetration Testing Software | Metasploit (http://www.metasploit.com). it is free now.
Second step is You need PostgrSQL for your database.

Download here: PostgreSQL: The world's most advanced open source database (http://www.postgresql.org/).
Third Step is after installing both apps.open up the PostgrSQL admin gui go to start -> all programs -> PostgreSQL 9.0 -> pgAdmin III. Then right-click on your server (in the left hand box) and click connect. Remember to keep this window open the whole time. You will also need the pass you chose to use in step 5...

http://dc249.4shared.com/img/2Q4uOL-t/s3/0.8316834805710821/pgadmin.bmp

4.) Time for some hacking! Go to start -> all programs -> Metasploit Framework, and then open the Metasploit gui. Let it load untill it look like this:
4.) Time for some hacking! Go to start -> all programs -> Metasploit Framework, and then open the Metasploit gui. Let it load untill it look like this:
5.)Now, in the window type:

db_connect postgres:ThePassYouChose@localhost:5432

The first time you do this you will see lots of text flash buy. Don't wory, this is normal.

6.)Type db_host to make sure you are connected correctally.

7.)Now type this:
db_nmap 000.000.000.000

Make sure you put the ip of the computer you are trying to hack in the place of 000.000.000.000...

7.) Now we get to the fun part; the automatic exploitation. Just type db_autopwn -t -p -e -s -b , watch the auto-exploitation start, go play Halo for a while, and then come back...

8.) After the exploitation is done, type *******s -l to see what the scanner found. If all went well, you should see a list of exploits.

9.) Now we get to use the exploits to hack the computer! If you will notice, all of the exploits are numbered, and they all have obvious names (i. e., reverseScreen_tcp). In order to use an exploit, type this