Welcome To Just IT CluB
The best place where you can get free and cracked software and awesome tutorials include tip and trick that never seen on web before or much rare.

Sunday, December 1, 2013

How To Hack A Computer With Just A IP

Hello everybody! I am here to show you this magical tool called Metasploit that allows you to hack ANY unpatched computer with only it's IP. Lets begin...
Steps:-
1.) First you need to download Metasploit. The most up-to-date version is FREE at Click Here 
2.) You need PostgrSQL for your database. Download here: Click Here .Make sure you use all the defaults or Metasploit woun't work!
3.) Now lets get down to buisness... After installing both tools, open up the PostgrSQL admin gui (start -> all programs -> PostgreSQL 9.0 -> pgAdmin III). Then right-click on your server (in the left hand box) and click connect. Remember to keep this window open the whole time. You will also need the pass you chose to use in step 5...
Image has been scaled down 9% (605x419). Click this bar to view original image (660x457). Click image to open in new window.

4.) Time for some hacking! Go to start -> all programs -> Metasploit Framework, and then open the Metasploit gui. Let it load untill it look like this:
Image has been scaled down 9% (605x462). Click this bar to view original image (660x503). Click image to open in new window.
5.)Now, in the window type:

db_connect postgres:ThePassYouChose@localhost :5432
The first time you do this you will see lots of text flash buy. Don't wory, this is normal.

6.)Type db_host to make sure you are connected correctally.

7.)Now type this:

db_nmap 000.000.000.000

Make sure you put the ip of the computer you are trying to hack in the place of 000.000.000.000...

7.) Now we get to the fun part; the automatic exploitation. Just type db_autopwn -t -p -e -s -b , watch the auto-exploitation start, go play Halo for a while, and then come back...

8.) After the exploitation is done, type *******s -l to see what the scanner found. If all went well, you should see a list of exploits.

9.) Now we get to use the exploits to hack the computer! If you will notice, all of the exploits are numbered, and they all have obvious names (i. e., reverseScreen_tcp). In order to use an exploit, type this:

*******s -i ExploitNumber

__________________________________________________ _________

The features of Metasploit are mutch like a rat. Once you get into someone's computer, you can see their screen, controll their mouse, see what they type, see them, etc.  


Tutorial By Asad Rafiq

No comments:

Post a Comment

We do receive a lot of comments each day and those comments are moderated by the human being not automated robots. So, Please avoid doing spam and posting links in comments otherwise comment will not be published. We can't tolerate anymore. Thanks for understanding!