How to Use Command Prompt to Hack Another Computer and the Alternative Way

home_icon Created with Sketch. Home > Computer Monitoring > How to Use Command Prompt to Hack Another Computer and the Alternative Way
Megan Evans

Updated: May 17, 2021 12:26 pm

3 min read

You may have many reasons to drive you to hack other people's computers. Undoubtedly, hacking another computer will bring you some benefits, if your starting points are good. At this moment, maybe you’re a boss, you’ve found that the company’s confidential documents have been leaked, and you want to check the employee’s computer to see if someone has stolen the company’s documents through the computer. You have to find out the truth about this situation.

But how to remotely access another computer without permission? There are more than a few ways in which this can be done. This article will speak in-depth about how to hack a computer on the same network using cmd. After that there is also an alternative way to introduce to you. Now, let’s get to know each one by one.


1. Set Up the Remote Desktop Previously

Before you go on to know how to use command prompt to hack another computer, you will have to set up this particular feature on target’s computer system. To do this, you will need a business or Pro version of Windows. Pay attention to get the target’s computer first including access their computer’s account and password if you choose this method to use. Here are the steps to set up a remote desktop on someone’s computer.

Step 1: From the Windows button, go to the “Start” menu.

Step 2: Click on the gear icon which symbolizes the “Settings”.


Step 3: Click on “System” and then on “Remote Desktop”.

Step 4: Switch on “Enable Remote Desktop”.


If you are using the older version of Windows, you need to follow the steps given below.

Step 1: From “Control Panel”, go to “System and Security”.

Step 2: Click on “Allow Remote Access” under “System”.

Step 3: From the “Remote” tab, select the radio button present near “Allow remote connections to this computer”.


You can use either of these two methods to set up remote desktop connections on your computer system depending on the Windows version installed in the system.

2. The Steps to Use CMD to Access Another Computer

Once you have followed the above steps, you can use cmd to remotely control on another computer to access their computer system. Here are the steps to know how to remotely access another computer without permission using cmd.

Step 1: Press “Windows” and “r” key together.


Step 2: Key in “cmd” and hit “Enter”.


Step 3: Key in “mstsc” to launch remote desktop connection app.


You can also directly access the computer by using additional terms as follows.

This will take you directly to the login screen of the target’s computer.

Instead of “computername” you can even key in your computer system’s public IP address. If you do not know the IP address of the target’s computer, you can search for “What’s my IP” on Google through target’s browser.

3. The Limitations of Using CMD To Hack a Computer

There are certain limitations to hacking a computer using command prompt. Some of the main limitations are listed below.

1. If the target’s computer have not earlier configured a remote desktop computer system, you cannot hack into the system using this method.

2. For this method to work, the target’s computer needs to be on and not in sleep or hibernation mode.

3. This method of hacking into others’ computer system fails if you do not remember the name and account of target’s computer.

4. The Alternative Way to Remotely Access Another Computer without Permission

Due to the limitations listed above, there is a need to find an alternative method to remotely access others’ computer system. One of the best ways in which you can do this is by using MoniVisor. This is a highly recommended computer system monitoring tool that can be used to easily monitor all the activities and access any file stored in target’s computer system.

Features of MoniVisor

  • Social media activity monitoring, such as Whatsapp, Facebook (Messenger), Twitter, Skype.

  • Download history and internet activity tracking

  • Email conversation monitoring. Support to check the content of each email.

  • Auto-screenshot of computer system screen silently.

  • Keystroke recording including the deleted keystrokes.

  • App activity tracking. Exactly know the last use time of a specific app.

  • Login activity monitoring.

Steps to use MoniVisor

Step 1: Create a valid MoniVisor account using your email ID.

create account

Monitor Now View Demo

Step 2: Follow the step instructions and configure your computer settings accordingly. You need to install an extension on the browser if you want to monitor the target’s social media and email. Once you successfully configure following our website guide, the app will be hidden and the data of target’s computer will update automatically.

setup system

Step 3: Login using your credentials to the online dashboard from any other device to view all the activities.

online dashboard

5. The Advantages of Using MoniVisor

There are many advantages of using MoniVisor, an advanced monitoring tool, when it comes to accessing the files on others’ system remotely. A few such advantages are listed below.

No need to physically access the computer apart from the initial setup.

You can access others’ computer from almost any device with a stable internet connection.

You can monitor all the activities on the computer apart from accessing the required files remotely. With only one installation, the target’s updated data can be automatically uploaded remotely.

You don’t need to know professional knowledge of computer technology.


As an employer, the two methods provided in this article can help you to monitor employees’ computers. As a parent, you can use these ways to check your children. In such cases, the above two methods can prove to be very useful. However, the first method described in this article comes with a lot of limitations.

This is overcome by the method offered by MoniVisor and this is the reason it is highly recommended when it comes to accessing files on someone’s computer system remotely.

Sign up now


By Megan Evans

Posted on Mar 23, 2021 ( Updated: May 17, 2021 )

A certified content marketing specialist with great passion for Internet and online safety. She is bent on educating the audience about cyber safety tips and tricks.

Generally rated 4.9 (170 participated)


Rated Successfully!


You have already rated this article!