Sunteți pe pagina 1din 32

Method 1 of 3: Getting Past a Log In Password

1.

1
Boot the computer in safe mode.
Ad

2.

2
Click Start.

3.

3
Click Run.

4.

4
Type in control userpasswords2.[1]

5.

5
Change passwords for any account. This is probably going to be obvious to the user,
so you may have to tell them a little white lie. Try something along the lines of: "Oh, I
hear computers glitch like that sometimes. You can always type in recover password if
you get locked out and then set a new password" (in which case you will want to set the
password to the account to recoverpassword or whatever you tell this person). [2]

6.

6
Reboot the computer.

Method 2 of 3: Getting Remote Access

1.

1
Download the program LogMeIn. There is a free version, though you can purchase a
subscription if that better meets your needs.[3]
o

The program will need to be downloaded to the computer you intend to


remotely view or use. This makes it useful for gaining access to your computer if it is
stolen or for checking up on your teens daytime activities during the summer.

You will have to make an account with the LogMeIn website in order to use

o
the software.

2
Log in to the website. Log in to LogMeIns website.

3
Navigate to the My Computers page. It should open automatically when you sign in.

4
Add the computer you intend to remotely access. You will see an Add computer
button on the page. Click that and fill in the info for the computer you intend to access.

5
Click the name for the computer once its added.

6
Log on to the computer. This means youll have to know the username and password
for the account youre trying to access or view.

7
Click Remote Control. If youre trying to be sneaky (such as to spy on the user), try
to move the mouse as little as possible and dont click on anything.

8
Log out when youre done.

Method 3 of 3: Cracking a Wifi (WEP) Password

1.

1
Download the necessary programs. You will need 2 programs to make this hack
work: CommView (which will be used to look for vulnerabilities in the network youre
trying to access[4]) and AirCrackNG (which will break the security key itself)
Make sure your computers wireless adaptor is compatible with

o
CommView.

2
Find a Network. Use CommView to scan for wireless networks. Choose a network with
a WEP key and a decent signal.

3
Filter the search to that network. Right click on the network you want to access, select
Copy MAC address, go to the Rules tab, then MAC Addresses, enable MAC address
rules, then click ActionCaptureAdd RecordBoth. Paste in the MAC address.

4
View Data packets. Sort out the Management (M) and Control (C ) packets so that you
are only viewing the Data (D) packets.

5
Save the packets. Go to the Logging tab and enable auto saving. You may need to
change the settings on the Directory size and File size. Try 2000 and 20, respectively.

6
Press the Play button to begin collecting. Wait until you have at least 100,000
packets.

7
Click Concatenate Logs under the Log tab. Make sure all of the logs are selected.

8
Export the logs. Go to the folder where the logs were saved and open the log file. Click
FileExportWireShark/tcpdump format and save it where you can find it easily.

9
Open the newly created file with Air crack. Start Aircrack and choose WEP. Open the
file and click Launch.

10
Enter the index number. When the command prompt opens, youll need to enter the
index number for the target network. It is probably 1. Hit enter and wait. If it works, the
key will be shown.
Ad

We could really use your help!

Can you tell us about

relationships?

Yes
No
Can you tell us about

makeup and style?

Yes
No
Can you tell us about

Minecraft?

Yes
No
Can you tell us about

weight loss?

Yes
No
Warnings

Hacking a computer can have very serious consequences, especially if done on


a public or school computer.

This form of hacking will cause the victim to know someone has been in their
computer. Beware, you can get caught easily.

When even writing a non-harmful script on computer, people will not trust you
with their computer

Only use these techniques on your computer or on another person's computer


with their permission.

You will most likely be seen in court or go to jail for illegally accessing computers
that don't belong to you.

If you are a child, wikiHow is not responsible if your father (or whoever else is the
system administrator) finds out you were able to make yourself an Administrator, by not
only using this how-to, but using this one as well.

Related wikiHows
Sources and Citations
1.

http://answers.microsoft.com/en-us/windows/forum/windows_7-security/whathas-replaced-the-control-userpasswords2/3247dd60-cdaf-4d3b-81c0-7460a44afc05

2.

http://wiki.ljackson.us/Control_Userpasswords2

3.

http://download.cnet.com/LogMeIn-Free/3000-7240_4-10317491.html

4.

http://download.cnet.com/CommView/3000-2085_4-10042988.html

Related wikiHows

How to

Hack Into Any Live Webcam

How to

Hack

How to

Hack a PlayStation Portable

How to

Hack Windows

How to

Learn a Programming Language

How to

Create Hacker Proof Password

How to

Hack Into Any Live Webcam

How to

Hack

How to

Hack a PlayStation Portable

How to

Hack Windows

How to

Learn a Programming Language

How to

Create Hacker Proof Password

Article Info
Categories: Computers and Electronics | Internet Security
In other languages:
Espaol: Cmo hackear una computadora, Portugus: Como Hackear um
Computador, Italiano: Come Violare un Computer, Franais: Comment hacker un
ordinateur, : , Deutsch: Einen Computer
hacken, Nederlands: Een computer hacken

Discuss

Print

Email

Edit

Send fan mail to authors

Thanks to all authors for creating a page that has been read 1,236,030
times.
Did this article help you?

S-ar putea să vă placă și