0% found this document useful (0 votes)
210 views2 pages

Steps To Hack IP Address

This document outlines steps to potentially hack into another computer by obtaining its IP address and open ports, and using that information to telnet into the target system. It recommends using a port scanner to find open ports on the target, then using telnet with the IP address and open port to log in without authentication if no password is set. Finally, it suggests using command line tools to browse and manipulate files on the compromised system.

Uploaded by

Jiejhay Jiipie
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
210 views2 pages

Steps To Hack IP Address

This document outlines steps to potentially hack into another computer by obtaining its IP address and open ports, and using that information to telnet into the target system. It recommends using a port scanner to find open ports on the target, then using telnet with the IP address and open port to log in without authentication if no password is set. Finally, it suggests using command line tools to browse and manipulate files on the compromised system.

Uploaded by

Jiejhay Jiipie
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Steps to Hack IP Address:

1) Prepare the IP address of the Victim. (e.g : 101.23.53.70 )

2) Download and Install Advanced Port Scanner.

3) Open Advanced Port Scanner and Type the IP Address in the right column and Click Scan.

4) It will lists you all Opened Ports of the Victim’s PC or Router. (e.g : Port 91 )

5) After retrieving the IP address and the Opened Ports of the Victim, Open Command
Prompt (CMD)

and Type: telnet [IP ADDRESS] [PORT]

e.g : telnet 101.23.53.70 91

6) Now you’ll be asked to Enter Login Information, Just type Username and Password and hit Enter.
If no password is used just type the Username.

Done! Now you’ll get access to all Victim’s Files and Documents by browsing with CMD (use cd,
copy, delete, mv… to do all tricks.)

Enjoy

You might also like