
But remember, this is only for educational purpose and hence damaging any victim’s computer is at your own risk.
Note: The hacker can be traceable and hence additional techniques are required to make yourself safe!
So here goes the requirements and the procedure to hack into a PC.
Requirements:
- Metasploit (Available at metasploit.org)
- Nmap (Port scanner available at nmap.org)
- Debian Linux OS (Learn more)
- IP of the victim’s computer.
Nmap is a port scanner used to scan a computer to locate the open ports. The ports are the path for the information that we need to steal. For a normal computer usually 30-40 ports are kept open.To find the number of ports open on your computer open command prompt (Start>Command prompt) and type
netstat -ano
and
hit enter, you will get a list of open ports in your computer. You
need to have a basic knowledge on ports and port numbers to perform this
attack.Using a tool such as Metasploit we can spoof into the PC and steal the information from the corresponding port using commands. Learn to use Metasploit at http://www.metasploit.com/learn-more/how-do-i-use-it/.
