Hacking into PC or SmartPhone using IP Address | Beginners guide

First of all, you need to know the difference between the two types of IP addresses, i.e., Static IP and dynamic IP.

Most of the people don’t have a static IP. Only some big organizations or companies have a static IP address. On the other hand, almost every ordinary person has a dynamic IP connection. Dynamic IP means that every time you disconnect and reconnect to the internet, your system is assigned a completely new IP address.
Whereas in static IP, it doesn’t matter how many times you reconnect to the internet, your IP would be the same every time.

If you are planning to attack someone who has a static IP connection, you can move on. But if the victim has a dynamic IP connection, you can not guess the validity of that IP.

In this case, if the victim disconnects and reconnects to the internet, then you have to obtain the IP address once again. So I think you got the differences between the two types of IP addresses by now.

Now back to the question. Even if you have the victim’s IP address, it’s not going to help you unless there is a backdoor in the victim’s system. By backdoor, I mean an open port that can listen to and reply back to your data packets. This can even be done if there is a vulnerable application present in the victim’s system. The best example of a backdoor is something known as the trojan horse or RAT standing for remote administration tools. So I think you’ve got the answer to your question.

7 Likes