Firstly I Will Tell You What Is Internet Protocol (IP) :HACK REMOTE COMPUTERS

 The Internet Protocol is the principal communications protocol used for relaying datagram (packets) across an
internetwork using the Internet Protocol Suite. Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet.HACK REMOTE COMPUTERS


  • The information in this guide is provided for instructional and educational purposes only. There is no guarantee that these instructions will work under your specific and unique circumstances
  • Use these instructions at your own risk. We shall not hold any responsibility or liability for whatever happens to you or your device arising from your use of the info in this guide.
  • Read and understand the whole guide first before actually performing the instructions.


IP is the primary protocol in the Internet layer of the Internet Protocol Suite and has the task of delivering
data-grams from the source host to the destination host solely based on their addresses. For this Purpose, IP defines addressing methods and structures for data-gram encapsulation


Literally, hacking is accessing something or somebody in internet without their permission or interest. While, speaking in summary, hacking is very easy job, it is like instead of using front door, finding the hidden door of a house and hijacking the precious things. Among all the hacking, hacking via IP address is one of the most common yet powerful beginning.
You may want to hack the website and put your advertisement there or grab some database information In this type of hacking, you are playing with the web server’s computer instead of the administrator’s computer. Because, www.website.com is hosted in separate web server rather than personal computer.
Another can be accessing your friend’s computer from your home. Again this is IP based and this is possible only when your friend’s computer is online. If it is off or not connected to internet then remote IP hacking is totally impossible
Well, both of the hacking has the same process. Let’s summarize what we must do.
  • Confirm the website or a computer you want to hack.
  • Find or trace their IP address.
  • Make sure that IP address is online
  • Scan for open ports
  • Check for venerable ports
  • access through the port
  • Brute-force username and password  


Now let me describe in brief in merely basic steps that a child can understand it.
First, getting the IP address of victim.
To get the IP address of the victim website, ping for it in command prompt.
For example,
ping www.google.com


will fetch the IP address of Google.com
This is how we can get the IP address of the victims website.
How about your friend’s PC? You can’t do www.yourfirend’sname.com, can you? Finding your friend’s IP address is little tough job, and tougher it is if he has dynamic IP address that keeps changing.
One of the widely used method to detect IP address of your friend is by chatting with him.
If u know the ip address? Is it online? To know the online status just ping the IP address, if it is online it will reply.
If the IP address is online, scan for the open ports. Open ports are like closed door without locks, you can go inside and outside easily.
Advanced Port Scanner to scan all open and vulnerable ports.
Now you’ve IP address and open port address of the victim, you can now use telnet to try to access them. Make sure that you’ve telnet enabled in your computer or install it from Control panel > Add remove programs > add windows components.
Now open command prompt and use telnet command to access to the IP address. Use following syntax for connection.
telnet [IP address] [Port]

You’ll be asked to input login information.
If you can guess the informations easily then it’s OK.
In this way you’ll able to hack
remove computer using only IP address
Let us know if you face any problem with this tutorial in our comment box:


Leave a Reply

Your email address will not be published. Required fields are marked *