how to hack pc by mac idPenetration Testing and Ethical Hacking Course

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here

Home Forums Courses Penetration Testing and Ethical Hacking Course how to hack pc by mac id

This topic contains 5 replies, has 5 voices, and was last updated by  JPMinty 4 years, 11 months ago.

Viewing 6 posts - 1 through 6 (of 6 total)
  • Author
    Posts
  • #15872

    Tanay Saksena
    Participant

    how to hack a pc which is on different network and is there any way to trace and hack pc if mac id is known??

    #16358

    JPMinty
    Participant

    There’s lots of ways but each involve a level of knowledge to vulnerabilities of your target. If this is for malicious purposes though you won’t get any help.
    You could reverse the IP from the MAC address, then find a vulnerability such as XSS or SQL Injection that allows you to enter or upload a payload to that address through a website or network, use that as a backdoor to get in and voila as long as it’s not found out and is running, you have access.
    It’s no simple task though without prior knowledge.

    #16365

    mr_clark
    Moderator

    You won’t be able to get the IP from MAC address if you’re on a different network.

    #16388

    sam
    Participant

    easy way to do is make target to browse a website where you have set payload or make them to install malware.

    #16477

    Multi Thinker
    Participant

    Tools Required For Attacking On Someone Through MAC address.
    First What is mac address?

    mac address is unique identity of computer

    MAC address hacking is posible as i have experienced hacking a Mikrotik OS through MAC Address.

    All you need to be in LAN OR you need his IP, AnD then You Need Armitage Or Metasploit Fired.

    Ok let us start.

    1. scan the IP using NMAP or Armitage > get info
    sudo nmap -sP -n <IP>/24

    2. if you are in lan you can use tool named netcut. ( i used this for Mikrotik Hacking )

    3. You Can Use Meterpreter reverse_tcp in metasploit

    4. or you can visit my profile and see Metasploit Article to know more.

    Thanks And don’t hesitate to ask more further.

    — Multi THinker

    #16733

    JPMinty
    Participant

    @mr_clark is right, I missed the point of it being on a different network.

Viewing 6 posts - 1 through 6 (of 6 total)

You must be logged in to reply to this topic.

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel