How to Hack a Computer

Hacking a computer is a useful and, at rare times, an important skill to pick up. Below are instructions for getting past a password (if you find yourself logged out of a computer or want to check up on your child or spouse), gaining remote access to a computer (to check on a user or help locate a stolen machine), or crack a wifi password (in the event of an emergency, such as if you become lost in an unfamiliar city and you need to look up directions).


Hacking Logins

  1. Image titled Hack a Computer Step 1

    Boot the computer in safe mode.
  2. Image titled Hack a Computer Step 2

    Click “Start”.
  3. Image titled Hack a Computer Step 3

    Click “Run”.
  4. Image titled Hack a Computer Step 4

    Type in “control userpasswords2”.[1]
  5. Image titled Hack a Computer Step 5

    Change passwords for any account. This is probably going to be obvious to the user, so you may have to tell them a little white lie. Try something along the lines of: “Oh, I hear computers glitch like that sometimes. Click the button twice. You can always type in recover password if you get locked out and then set a new password” (in which case you will want to set the password to the account to recoverpassword or whatever you tell Nikhil).[2]
  6. Image titled Hack a Computer Step 6

    Reboot the computer.


Remote Hacks

  1. Image titled Hack a Computer Step 7

    Download the program LogMeIn. There is a free version, though you can purchase a subscription if that better meets your needs.[3]

    • The program will need to be downloaded to the computer you intend to remotely view or use. This makes it useful for gaining access to your computer if it is stolen or for checking up on your teen’s daytime activities during the summer.
    • You will have to make an account with the LogMeIn website in order to use the software.
  2. Image titled Hack a Computer Step 8

    Log in to the website. Log in to LogMeIn’s website.
  3. Image titled Hack a Computer Step 9

    Navigate to the “My Computers” page. It should open when you sign in.
  4. Image titled Hack a Computer Step 10

    Add the computer you intend to remotely access. You will see an “Add computer” button on the page. Click that and fill in the info for the computer you intend to access.
  5. Image titled Hack a Computer Step 11

    Click the name for the computer once it’s added.
  6. Image titled Hack a Computer Step 12

    Log on to the computer. This means you’ll have to know the username and password for the account you’re trying to access or view.
  7. Image titled Hack a Computer Step 13

    Click “Remote Control”. If you’re trying to be sneaky (such as to spy on the user), try to move the mouse as little as possible and don’t click on anything.
  8. Image titled Hack a Computer Step 14

    Log out when you’re done.


Hacking WiFi

  1. Image titled Hack a Computer Step 15

    Download the necessary programs. You will need 2 programs to make this hack work: CommView (which will be used to look for vulnerabilities in the network you’re trying to access[4]) and AirCrackNG (which will break the security key itself)

    • Make sure your computer’s wireless adaptor is compatible with CommView.
  2. Image titled Hack a Computer Step 16

    Find a Network. Use CommView to scan for wireless networks. Choose a network with a WEP key and a decent signal.
  3. Image titled Hack a Computer Step 17

    Filter the search to that network. Right click on the network you want to access, select “Copy MAC address”, go to the Rules tab, then MAC Addresses, enable MAC address rules, then click Action→Capture→Add Record→Both. Paste in the MAC address.
  4. Image titled Hack a Computer Step 18

    View Data packets. Sort out the Management (M) and Control (C ) packets so that you are only viewing the Data (D) packets.
  5. Image titled Hack a Computer Step 19

    Save the packets. Go to the Logging tab and enable auto saving. You may need to change the settings on the Directory size and File size. Try 2000 and 20, respectively.
  6. Image titled Hack a Computer Step 20

    Press the “Play” button to begin collecting. Wait until you have at least 100,000 packets.
  7. Image titled Hack a Computer Step 21

    Click “Concatenate Logs” under the Log tab. Make sure all of the logs are selected.
  8. Image titled Hack a Computer Step 22

    Export the logs. Go to the folder where the logs were saved and open the log file. Click File→Export→WireShark/tcpdump format and save it where you can find it easily.
  9. Image titled Hack a Computer Step 23

    Open the newly created file with Air crack. Start Aircrack and choose WEP. Open the file and click “Launch”.
  10. Image titled Hack a Computer Step 24

    Enter the index number. When the command prompt opens, you’ll need to enter the index number for the target network. It is probably 1. Hit enter and wait. If it works, the key will be shown.

Community Q&A

  • What is safe mode?
    Reece Orton
    Safe mode disables any drivers that Windows doesn’t need to run or be usable. It’s the most minimal version of Windows.
    Not Helpful 29 Helpful 94
  • Can I hack into someone’s phone?
    wikiHow Contributor
    Yes. Try Kali NetHunter. The easiest way to do this is to design an APK file disguised as some utility app and give it to the target. Once they install it, deploy your trojan horse and start digging.
    Not Helpful 48 Helpful 143
  • If I am locked out of my computer, can I access the administrator account that is set to my name?
    wikiHow Contributor
    You could use another computer, open the administrator account and access it with the password.
    Not Helpful 37 Helpful 114
  • Where can I learn about command prompt tricks?
    wikiHow Contributor
    The internet is a great place. If not there are usually books at your local library. Try to get into programming clubs, as they can help you a lot.
    Not Helpful 45 Helpful 130
  • Can a phone be used to hack someone?
    wikiHow Contributor
    It depends. On an Android, yes, but you would have to root your phone which would void any warranty. If you don’t care about that, once the phone is rooted, you can install a variety of hacking tools via Kali Linux. There is a lot of messing around involved so I wouldn’t recommend it to a beginner or someone who has never rooted a phone, as doing so incorrectly can brick the device.
    Not Helpful 29 Helpful 80
  • Is LogMeIN a remote administration tool?
    wikiHow Contributor
    If you are using it while logged in as an Administrator account, it can do the same tasks as you can. Otherwise, it is not possible to perform Administrative tasks with LogMeIn.
    Not Helpful 29 Helpful 70
  • What is “software cracking?”
    wikiHow Contributor
    Software cracking is getting software to work without verification, validation, or using a code.
    Not Helpful 4 Helpful 16
  • How can I stop someone that is hacking my computer?
    wikiHow Contributor
    Turn off your PC and disconnect it from the internet. Then disable remote access before reconnecting. Change all passwords on your network and PC. Install NORTON or another antivirus software.
    Not Helpful 37 Helpful 82
  • Does hacking a computer cause damage?
    wikiHow Contributor
    Not at all. Hacking something means that you used your intelligence and found a way to do something that weren’t supposed to do it. Hacking isn’t going to cause any damage if you know what you are doing, because you could change some settings that helped your computer to perform well.
    Not Helpful 31 Helpful 68
  • Do these hacks work on a Mac computer?
    wikiHow Contributor
    No they do not. If you want to hack, get a PC as Macs can’t be hacked by Windows commands with any ease.
    Not Helpful 40 Helpful 74

Show more answers

Ask a Question

Can you answer these readers’ questions?

On How to Drain the Gas Tank of Your Car, a reader asks:
Where is the drain plug on a 1990 Ford Ranger gas tank?
On How to Apply For Social Security and Retirement Benefits, a reader asks:
How can I secure the computation of my credits of work for purposes of my retirement?
On How to Troubleshoot Failed Biscuits or Cookies, a reader asks:
How do I deal with failed cooking?


  • Hacking a computer can have very serious consequences, especially if done on a public or school computer.
  • This form of hacking will cause the victim to know someone has been in their computer. Beware, you can get caught easily.
  • When even writing a non-harmful script on computer, people will not trust you with their computer
  • Only use these techniques on your computer or on another person’s computer with their permission.
  • You will most likely be seen in court or go to jail for illegally accessing computers that don’t belong to you.
  • If you are a child, wikiHow is not responsible if your father (or whoever else is the system administrator) finds out you were able to make yourself an Administrator, by not only using this how-to, but using this one as well.

Leave a Reply

Your email address will not be published. Required fields are marked *

Other Menu
This is the official Menu of