Here is a quick new hack on how to intrude in the PC which is shutdowned at Cyber cafe.
1. As you all must have know these days all Cyber cafe owners have a program for administration to controlall PC¡¯s in local area network. So all files can be inter transmitted.
2. First of all press Ctrl+Alt+Del the taskmanager or any controlling application, will open. Then from APPLICATIONS select the program that is controlling all PC¡¯s & terminate it, This is for security reason. Now log of PC, & you ll get user names of the PC.
3. But some times, cyber cafes have security clients installed thathave restricted access to Task Manager,restart the computer & pressF8 continuously before windowss boots.
The Menu will open, select Safe Mode from it. And now you can copy files from networked PC¡¯s without any security layer.
Next step is where you¡¯ll need to cr@ck the hashes. SO go to your home PC , Download & install Saminside cr@cking tool.
And from some another Cyber cafe try to cr@ck the hashes of that PC. By same log off method explained below.
This where you actually perform hacking. Have a great time & tell us weather it worked for you.
1. As you all must have know these days all Cyber cafe owners have a program for administration to controlall PC¡¯s in local area network. So all files can be inter transmitted.
2. First of all press Ctrl+Alt+Del the taskmanager or any controlling application, will open. Then from APPLICATIONS select the program that is controlling all PC¡¯s & terminate it, This is for security reason. Now log of PC, & you ll get user names of the PC.
3. But some times, cyber cafes have security clients installed thathave restricted access to Task Manager,restart the computer & pressF8 continuously before windowss boots.
The Menu will open, select Safe Mode from it. And now you can copy files from networked PC¡¯s without any security layer.
Next step is where you¡¯ll need to cr@ck the hashes. SO go to your home PC , Download & install Saminside cr@cking tool.
And from some another Cyber cafe try to cr@ck the hashes of that PC. By same log off method explained below.
This where you actually perform hacking. Have a great time & tell us weather it worked for you.
No comments:
Post a Comment