You might not be it might not be easy with that OS but i will share with you the process.
Before you start your 'attack', you need to do some information gathering. Some of the information requires a tiny bit of math, and programming. Trivial stuff.
His MAC address is composed of 6 Bytes in hexadecimal format. You need to convert this from hex to a floating point, this can be done with the following equation: REDACTED
Once you have converted the MAC address, you need to subtract the number from the last octet of the IP address to get your memory offset. i.e: If the floating point is 122 and the IP address is 10.0.0.200, the resulting number would be 200-122=78
Once you have your memory offset, you will need to determine the terminal velocity of his modem. This can be done using a cryptographic injection of the isolation buffer. The steps to do this will differ depending on your operating system.
If you are running Windows XP or below, in a command prompt run the following:
inject.library.dll 10.0.0.200 --windows /unix
On Windows 7 or Windows 7, the following can be used in Power Shell:
velocity.inject:::DLL internet 10.0.0.200 (buffer overflow)
On Linux, the command is as follows:
for i > u ( inject.buffer command IP 10.0.0.200 )
These commands should inject the modem buffer with the proper commands, and output the terminal velocity the modem is running at.
At this point, you will need to download a hacking tool such as ping, telnet, or ftp. You might need to try each tool because it depends on the operating system that his network is running. Generally, linksys network running cat5 are vulnerable to a ping attack, and netgear networks running cat6 are vulnerable to ftp attacks. Apple networks running wifi are vulnerable to telnet attacks.
Once you run your tools, you will be prompted to enter the memory offset to establish a connection. After you establish the connection, you will not have administrator access yet. You will need to send the terminal velocity that you identified earlier, and attach it to a neutral bogon assembly. This step can be tricky, but it's often times easier to just type the velocity in notepad and paste it over and over into the victims modem.
If the velocity attack is successful, you will know. Your desktop and icons might change, and this is an indication that you are in their computer. DON'T WORRY. They can't see what you are doing (this is the point of the memory buffer, remember). They see their windows, and you see yours. Once you are connected, you can browse their Facebook, play music through their speakers, and even start a fire by sending a bunch of sequential writes to their CPU.
Please note: This is provided that you are working in a test environment, or you are official sanctioned by the person or company to perform this penetration test. The rules and laws of your country apply, and I cannot be held responsible for the use of these hacking methods.