A couple of lines at the command prompt are sufficient to reveal all the details of an administrator account on your pc .once a hacker has this information he is able to successfully log in. the next step is to discover all the login information of the different user accounts set up on the PC -and all this can be done using fairly simple networks administration tools.So how exactly does a hacker do this? Well,let’s slip into the role of a hacker and follow all the steps he takes to accomplish this nasty deed. Open the command prompt from
‘Start | Run | cmd.exe’
type in the following command and give a network or Internet address, like for example ping microsoft website
This will get you the IP address of your target. With the ‘ping’ command you can also discover whether the concerned computer is accessible. If yes, then try to gain an access via a hidden administrator account. You need to enter:
net use \\IP Address\ipc$ /user:administrator
in which you will need to input the IP address established earlier. For instance, if the IP address was ‘5220.127.116.115’ then input the command:
net use \\518.104.22.1685\ipc$ /user:administrator
If you receive the message, ‘the command was successfully executed’,it means that your spy mission was a success—you're in!
PsTools from Sysinternals will display the last bit of information needed. You can find the package from the official website website DownloadUnpack the. Unpack the downloaded ZIP file and copy the files ‘psexec’ and ‘psloggedon’ to the ‘C:\Windows\system32’ folder. Subsequently, enter the commands:
psexec \\IPAddress -uadministrator pslogged on \\IPAddress
in the prompt. If the computer is not sufficiently protected, it will list the names of all the users logged on to this computer
2).Discovering Windows Password:-
Naturally, discovering the username is only half the battle. If a hacker has successfully tapped into your system information, he will also try to find out your passwords. The easiest way to do that is to use the Windows search function. Search for files with ‘*.pwd’, ‘*.ped’, ‘*.psr’, ‘*.psx’ and ‘*.db’ extensions. These five file formats constitute the most popular formats used by password protection applications,for instance ‘Password Safe’. Naturally, file administration names like ‘key’ and ‘secmod’ are also common search terms. Open these files with WinHex www.x-ways.net If they are encrypted, then you can breathe a sigh of relief since it is harder for a hacker to decipher an encrypted file. If not, then not only will you see the passwords saved in these files, but the hacker will too.