I am in a desperate need to hack into my friend’s laptop and acquire a word file. The best way to do this is when my friend is working on the computer while connected to the university’s network. However, in undertaking this project, I must remain anonymous to ensure that my friend cannot trace the hacking back to me. The idea of hacking in the first place is to ensure that my friend does not know that I have the file. Thus, it is ideal to keep my access to his computer invisible. In the case of this project, the host operating system is my computer while the guest operating system is my friend’s operating system inside the host’s computer virtual box. I will follow some steps in undertaking the project.
The first step is to install a virtual box on my computer. A virtual box provides a virtual part of the host CPU and memory to a guest operating system. It extends the computer making it capable of running several operating systems inside several virtual machines simultaneously. A virtual machine is a special environment created by the virtual box for the guest operating system. Thus, the virtual box creates many virtual machines for different guest operating systems.
The second step involves installation of Kali Linux on my computer, which is the Host operating system. Kali Linux is an operating system aimed at advanced penetration. It enables one to penetrate another system without detection. It enables the host operating system user to penetrate to the guest operating system and access any documents of interest. In the case of this project, the Kali Linux will be installed in the virtual box to act as a virtual machine. This is the environment through which the guest OS will be operating.
This step is meant to access the virtual private network (VPN) through the Kali Linux operating system (virtual machine). A VPN allows one to receive data across a public network as if the device being used is connected to the private network (Hoffman & Benton, 2015). In this case, any data received by the public network goes through the private network and the data source cannot trace back to the public network. With a VPN, my friend cannot trace the hack back to my IP address rather it will trace back to the virtual network. This will ensure that I remain anonymous assuming the virtual network owner does not reveal my personal details.
The fourth step involves running of the Nmap software. The software is accessed from the Kali Linux operating system and run over the virtual private network (VPN). This is a utility for network mapping to discover services and hosts on a network. It does this by sending crafted packets to the target system and then analyzes the responses. By using a specific IP address, the Nmap scans the network to identify which hosts are connected to the network. Assuming I am using the university network, I have access to the IP address. After scanning the network, I will be able to identify my friend’s operating system assuming I know the name associated with the computer.
The final step is meant to access the target PC that is my friend’s computer. After using Nmap to search for my friend’s IP address, it will ask for the username and password. Assuming I know my friend’s username and password, I will enter the credential and have access to the computer. If I do not know the credentials, then typing in words such as admin, administrator without the password will still work. By using the command prompt, it is possible to access all the files in the guest computer from documents to music files (Hoffman & Benton, 2015). After accessing the documents (word file in this case), I can then open and read or copy the document to my computer for future access.
The above steps will be successful assuming my friend has not installed well-configured firewalls and access to the computer is fully undetectable by use root kits. All the running processes in a computer can be viewed in the task manager. However, by using the root kit, one can remotely hide some running processes from the task manager. Some firewalls are configured to scan filters ports, and with such a firewall, it is hard to access my friend’s computer through the internet (Bellovin et al., 2014). Other operating systems such as Windows 10 have high configured windows firewall but can still be hacked.
By following the above steps, I will have access to the desired word document on my friend’s computer. The process is easy and requires less time. However, there are realistic assumptions that I have made including lack of a firewall in my friend’s computer. It is agreeable that many people do not go to great extents to protect their personal networks making them susceptible to hacking. Besides, people do not check to see if anyone is connected to their computers remotely at any time. Hackers conduct data fishing on people computers and can use it for blackmail.
Bellovin, S. M., Blaze, M., Clark, S., & Landau, S. (2014). Lawful hacking: Using existing vulnerabilities for wiretapping on the Internet. Nw. J. Tech. & Intell. Prop., 12, i.
Hoffman, P., & Benton, M. (2015). C++: The Crash Course to Learn C++ Programming and Computer Hacking (c plus plus, C++ for beginners, programming computer, hacking the system, how to… Coding, CSS, Java, PHP) Volume 9.
Do you need an Original High Quality Academic Custom Essay?