Hack a Computer

Hacking a computer is a useful and, at rare times, an important skill to pick up. Below are instructions for getting past a password (if you find yourself logged out of a computer or want to check up on your child or spouse), gaining remote access to a computer (to check on a user or help locate a stolen machine), or crack a wifi password (in the event of an emergency, such as if you become lost in an unfamiliar city and you need to look up directions).

Steps

Hacking Logins

  1. Boot the computer in safe mode.
  2. Click “Start”.
  3. Click “Run”.
  4. Type in “control userpasswords2”.[1]
  5. Change passwords for any account. This is probably going to be obvious to the user, so you may have to tell them a little white lie. Try something along the lines of: "Oh, I hear computers glitch like that sometimes. Click the button twice. You can always type in recover password if you get locked out and then set a new password" (in which case you will want to set the password to the account to recoverpassword or whatever you tell Nikhil).[2]
  6. Reboot the computer.

Remote Hacks

  1. Download the program LogMeIn. There is a free version, though you can purchase a subscription if that better meets your needs.[3]
    • The program will need to be downloaded to the computer you intend to remotely view or use. This makes it useful for gaining access to your computer if it is stolen or for checking up on your teen’s daytime activities during the summer.
    • You will have to make an account with the LogMeIn website in order to use the software.
  2. Log in to the website. Log in to LogMeIn’s website.
  3. Navigate to the “My Computers” page. It should open when you sign in.
  4. Add the computer you intend to remotely access. You will see an “Add computer” button on the page. Click that and fill in the info for the computer you intend to access.
  5. Click the name for the computer once it’s added.
  6. Log on to the computer. This means you’ll have to know the username and password for the account you’re trying to access or view.
  7. Click “Remote Control”. If you’re trying to be sneaky (such as to spy on the user), try to move the mouse as little as possible and don’t click on anything.
  8. Log out when you’re done.

Hacking WiFi

  1. Download the necessary programs. You will need 2 programs to make this hack work: CommView (which will be used to look for vulnerabilities in the network you’re trying to access[4]) and AirCrackNG (which will break the security key itself)
    • Make sure your computer’s wireless adaptor is compatible with CommView.
  2. Find a Network. Use CommView to scan for wireless networks. Choose a network with a WEP key and a decent signal.
  3. Filter the search to that network. Right click on the network you want to access, select “Copy MAC address”, go to the Rules tab, then MAC Addresses, enable MAC address rules, then click Action→Capture→Add Record→Both. Paste in the MAC address.
  4. View Data packets. Sort out the Management (M) and Control (C ) packets so that you are only viewing the Data (D) packets.
  5. Save the packets. Go to the Logging tab and enable auto saving. You may need to change the settings on the Directory size and File size. Try 2000 and 20, respectively.
  6. Press the “Play” button to begin collecting. Wait until you have at least 100,000 packets.
  7. Click “Concatenate Logs” under the Log tab. Make sure all of the logs are selected.
  8. Export the logs. Go to the folder where the logs were saved and open the log file. Click File→Export→WireShark/tcpdump format and save it where you can find it easily.
  9. Open the newly created file with Air crack. Start Aircrack and choose WEP. Open the file and click “Launch”.
  10. Enter the index number. When the command prompt opens, you’ll need to enter the index number for the target network. It is probably 1. Hit enter and wait. If it works, the key will be shown.

Warnings

  • Hacking a computer can have very serious consequences, especially if done on a public or school computer.
  • This form of hacking will cause the victim to know someone has been in their computer. Beware, you can get caught easily.
  • When even writing a non-harmful script on computer, people will not trust you with their computer
  • Only use these techniques on your computer or on another person's computer with their permission.
  • You will most likely be seen in court or go to jail for illegally accessing computers that don't belong to you.
  • If you are a child, wikiHow is not responsible if your father (or whoever else is the system administrator) finds out you were able to make yourself an Administrator, by not only using this how-to, but using this one as well.

Related Articles

Sources and Citations