PDF download Download Article
Fake your hacking skills to impress (or scare) your friends
PDF download Download Article

Do you want people to think you're a computer genius and master hacker? Because hacking requires extensive computer knowledge, when people see what they think is hacking, they're usually impressed. You don't have to do anything illegal to make people think that you're hacking—you can even fake hacking using nothing but the Windows Command Prompt (CMD) or a web browser. Read on for tips on looking like a hacker using basic terminal commands and simulators.

Things You Should Know

  • Use Command Prompt (cmd) on Windows or Terminal on a Mac to run non-harmful but intimidating commands that simulate hacking.
  • On Windows, you can create a batch script that makes it look like you're hacking into a system and downloading files in real time.
  • Websites like GeekTyper and Hacker Typer display realistic-looking hacker interfaces in your browser.
Method 1
Method 1 of 4:

Using Command Prompt or Terminal

PDF download Download Article
  1. Open Command Prompt (PC) or Terminal (Mac).
    • On Windows, you can do so by typing cmd into the Windows search bar and clicking Command Prompt in the search results.
    • On a Mac, click the Launchpad, type terminal , and click Terminal in the search results. [1]
  2. Nothing says "I'm a hacker" more than bright green or blue text on a black background. To change your CMD or Terminal color:
    • Windows: Type color 0A and press Enter for green text on a black background. You can also type color //? to see a full list of color options.
    • Mac: Click the Terminal menu and go to Settings > Profiles . Select the Homebrew profile for a black background with green and blue text.
    Advertisement
  3. Use the Command Prompt or Terminal to imitate hacking . There are many commands you can use that look impressive but won't damage your computer and are not illegal.
    • Windows commands: Type any of the following commands and hit Enter right after. Type each command in relatively quick succession to make your simulated hacking seem more complex:
      • tree
        • For a longer version of this command, try tree \ . If you get tired of seeing the text scroll by, press Ctrl + C to stop it.
      • dir \
      • ipconfig /all
      • ping -t google.com : The ping command checks to see if a device is reachable on a network, but the common person doesn't know that). Google is used as an example here, but you can use any website or IP address .
        • This command will keep running until you stop it. To stop it, press Ctrl + C .
    • Mac commands: If you have a Mac, you can use the following safe commands to fill your screen with what looks like hacking. Type the following commands into your Terminal and press Return after each:
      • top
      • ps -ely
      • ls -R /
      • ping google.com : You can replace google.com with any hostname or IP address. If you want to stop the command, press Ctrl + C .
  4. You can open a few Command Prompt or Terminal windows and use combinations of commands to make it seem as though you are performing several highly complex, unrelated processes at once.
  5. Advertisement
Method 2
Method 2 of 4:

Making a Batch File in Windows

PDF download Download Article
  1. In this method, we'll create a batch file that contains a simulated hacking experience in which you can pretend you're gaining access to a computer and downloading all of its files. Batch files contain text that gives your computer a series of commands. But don't worry, you don't need to know how to code to write this simple program in Notepad—we have code you can copy!
  2. The following code will open a window with green font, entitled "HACK THE PLANET." To change the title, you can change the entry following "title" in your Notepad file to your preference. The rest of the code will perform a series of (legal) commands like ping , arp , and dir with fake hacker-like messages.
    • Paste this code into your Notepad file:
      @echo off
      color a
      title HACK THE PLANET
      echo Scan the network? Y/N
      PAUSE >nul
      arp -a
      ping -n 10 8.8.4.4
      echo Secure connection available. Hack into computer and download all files? Y/N
      PAUSE >nul
      echo Hacking into system... please wait…
      timeout /t 5 >nul
      echo Successfully connected to system. Downloading all files... this may take a while.
      timeout /t 5 >nul
      dir /s "C:\Program Files"
      echo All files downloaded and decrypted.
      echo Cover your tracks? Y/N
      PAUSE >nul
      echo Deleting hack history...
      timeout /t 5 >nul
      cls
      echo Press X to disconnect from the hacked system.
      PAUSE >nul
  3. Click the File menu, select Save as , and name your file hack.bat . This will change your file from a text document to a batch file.
    • Saving the file to your desktop makes it easiest to run.
  4. Double-click your .bat file in its containing folder to open a window that will look, for all intents and purposes, like you are performing some complex computer process, like a hacker.
    • If you installed Windows on a drive other than your C drive, you might get an error when you run this script. If so, replace the "C" in "C:\Program Files" with the proper drive letter. You can also change this path to any folder you want, such as a fake folder that contain files with names like "Passwords" or "Private Information."
  5. Advertisement
Method 3
Method 3 of 4:

Using Websites

PDF download Download Article
  1. Visit https://www.geektyper.com for a great simulated hacker experience. This site utilizes perhaps the most realistic hack-mimicking simulator. After arriving at the site homepage, choose a theme, then proceed to type to prompt hacker-like text. [2] You can even click folders to run elaborate, albeit fake, processes.
    • Choose a theme, then move between the keystroke-generated fake hacker text and processes by clicking folders and windows.
  2. Go to https://hoacks.com/ in your web browser. This website creates hacker-like text at a rate that is sure to shock those watching. [3] One issue you may have with using this site to trick your friends is that it produces fake hacker code too quickly, which may ruin the effect.
  3. Point your web browser to https://pranx.com/hacker to load this hacker simulator. This is a great website to run in the background while you do other things to simulate hacking. You'll see a fake computer desktop with windows containing falling Matrix-style text, scary-looking code, and programs like Bitcoin Miner and Nuclear Plant (don't worry, they're not real).
  4. Each of these sites has a slightly different feel and generates different styles of fake code/hacker text. You can alternate between open windows quickly by holding the Alt key and using Tab to cycle through your options. Type a few keystrokes into each window before Alt + Tab -ing to a new fake-hacking browser window for improved effect. If the tabs are open on the same window, press Ctrl + Tab .
    • Try different arrangements of open windows, or you can leave a few open in the background to make it look like you're a master hacker.
  5. Advertisement
Method 4
Method 4 of 4:

Using Linux (Ubuntu & Debian)

PDF download Download Article
  1. Press Ctrl + Alt + T to do so.
  2. This installs a fake hacking program called Hollywood on your Linux system. Hollywood is an intimidating-looking hacking simulator that is sure to impress your friends. [4]
  3. For best results, make your Terminal window full-screen.
  4. Advertisement

Community Q&A

Search
Add New Question
  • Question
    Why would I want to do this?
    Community Answer
    You could do this to pull a prank on your friends or make them think you're a cool hacker!
  • Question
    Can I use fake hacking websites for movies or videos to make it look like I'm hacking?
    Community Answer
    I don't see why not. Film audiences are generally pretty uneducated about hacking, so they'll believe anything you show them.
  • Question
    What is mean by @echo off?
    Akhosh T.A
    Community Answer
    This prevents the prompt and contents of the batch file from being displayed. It is mainly used in Windows command Prompt.
Ask a Question
      Advertisement

      Tips

      Submit a Tip
      All tip submissions are carefully reviewed before being published
      Name
      Please provide your name and last initial
      Thanks for submitting a tip for review!

      Warnings

      • People familiar with computer systems and code will quickly be able to figure out whether you're actually doing something or simply putting on a show. Choose the audience for your "hacking" wisely.
      • Some adults might really think you are hacking, so be careful and don't get in trouble.
      Advertisement

      About This Article

      Thanks to all authors for creating a page that has been read 1,259,668 times.

      Is this article up to date?

      Advertisement