Hi friends, its so long that I have posted to this site. Today I am going to tell you two methods for finding IP address of the targeted user.
Method-1 : Through Chat
If you want to check for ip address of particular person on
facebook any other social site just invite them for a chat. After that your browser will be connected to that system. When chat is ON, open command prompt type the below command
Netstat –an
This will show you the connected ip addresses. Now search for suspicious IP address that is not local connection. Local connections normally start from 192.168.1.1 ranging to 192.168.1.255
Other netstat commands:
-a Displays all connections and listening ports.
-e Displays Ethernet statistics. This may be combined with the -s option.
-n Displays addresses and port numbers in numerical form.
-p proto Shows connections for the protocol specified by proto; proto may be TCP or UDP.
-s option to display per-protocol statistics, proto may be TCP, UDP, or IP.
-r Displays the routing table.
-s Displays per-protocol statistics. By default, statistics are shown for TCP, UDP and IP
-p option may be used to specify a subset of the default.
Method-2: Hosting page
-> First of all create an online hosting account. There are many sites availabe like 000webhost.com, t35.com, 100mb.com and so on.
-> After that upload any file on it. This file may be any web page or image even. Suppose you uploaded image.
-> Send the image link to your friend through facebook, orkut, email or any other thing.
-> Once the user will go through that image link, a file named log.txt will be generated by hosting server and will be saved nearby your uploaded file. This log.txt file will contain IP
address of the user who clicked on the link to see image.
Now question arises, what to with IP address. An ip address can be very useful. You can trace the location of the victim system throgh IP address. IP address is used in different types of hacking. With an ip address open port can be searched, through which you can have
access to targeted computer and do whatever you want on it to. This is called system hacking with open port.
Keep on reading my site. Enjoy hacking.
No comments:
Post a Comment
We appreciate your valuable comments.