Hacking Into a Computer [With Pictures]
NetBIOS Hacking
For this tutorial, I used Microsoft’s Windows XP Home Edition OS.
-What is it?-
NetBIOS Hacking is the art of hacking into someone else’s computer through your computer. NetBIOS stands for “Network Basic Input Output System.” It is a way for a LAN or WAN to share folders, files, drives, and printers.
-How can this be of use to me?-
Most people don’t even know, but when they’re on a LAN or WAN they could possibly have their entire hard drive shared and not even know. So if we can find a way into the network, their computer is at our disposal.
-What do I need?-
Windows OS
Cain and Abel >>>Get it here:
Part 1, Finding the target.
-----------------------------------------------------------------------------------------------
So first off we need to find a computer or the computer to hack into. So if your plugged in to the LAN, or connected to the WAN, you can begin. Open up Cain and Abel. This program has a built in sniffer feature. A sniffer looks for all IP addresses in the local subnet. Once you have opened up the program click on the sniffer tab, click the Start/Stop sniffer, and then click the blue cross
Another window will pop up, make sure “All host in my subnet” is selected, and then click ok.
It should begin to scan.
Then IP’s, computer names, and mac addresses will show up. Now remember the IP address of the computer you are going to be breaking into. If you can’t tell whether the IP address is a computer, router, modem, etc, that’s ok. During the next step we will begin our trial and error.
Part 2, Trial and Error
------------------------------------------------------------------------------------------------
Now, we don’t know if we have our designated target, or if we have a computer or printer, or whatever else is on the LAN or WAN. If you did get the IP of the target though, I still recommend reading through this section, for it could be helpful later on. Click on the start menu and go to run, type in cmd, and click ok. This should bring up the command prompt. From here we will do most of the hacking. Now I will be referring to certain commands that need to be inputted into the command prompt. I will put these commands in quotes, but do not put the quotes in the code when you type it into the prompt. I am only doing this to avoid confusion. Let’s get back to the hacking. Type in “ping (IP address of the target).” For example in this tutorial, “ping 192.168.1.103.” This will tell us if the target is online. If it worked, it will look something like this (note, I have colored out private information):
IF it didn’t work, meaning that the target is not online, it will look something like this:
If the target is not online, either switch to a different target, or try another time. If the target is online, then we can proceed.
Part 3, Gathering the Information.
--------------------------------------------------------------------------------------------------
Now, input this command “nbtstat –a (IP address of target).” An example would be “nbtstat –a 192.168.1.103.” This will show us if there is file sharing enabled, and if there is, it will give us the: currently logged on user, workgroup, and computer name.
Ok, you’re probably wondering, “What does all this mean to me?” Well, this is actually very important, without this, the hack would not work. So, let me break it down from the top to bottom. I will just give the first line of information, and then explain the paragraph that follows it.
The information right below the original command says: “Local Area Connection,” this information tells us about our connection through the LAN, and in my case, I am not connected through LAN, so the host is not found, and there is no IP.
The information right below the “Local Area Connection,” is “Wireless Network Connection 2:” It gives us information about the connection to the target through WAN. In my case I am connected through the WAN, so it was able to find the Node IpAddress. The Node IpAddress is the local area IP of the computer you are going to break into.
The NetBIOS Remote Machine Name Table, give us the workgroup of our computer, tells us if it is shared, and gives us the computer name. Sometimes it will even give us the currently logged on user, but in my case, it didn’t. BATGIRL is the name of the computer I am trying to connect to. If you look to the right you should see a <20>. This means that file sharing is enabled on BATGIRL. If there was not a <20> to the right of the Name, then you have reached a dead end and need to go find another IP, or quit for now. Below BATGIRL is the computers workgroup, SUPERHEROES. If you are confused about which one is the workgroup, and the computer, look under the Type category to the right of the < > for every Name. If it says UNIQUE, it is one system, such as a printer or computer. If it is GROUP, then it is the workgroup
Step 4, Breaking In
-----------------------------------------------------------------------------------------------
Finally it’s time. By now we know: that our target is online, our target has file sharing, and our target’s computer name. So it’s time to break in. We will now locate the shared drives, folders, files, or printers. Type in “net view \\(IP Address of Target)”
An example for this tutorial would be: “net view \\192.168.1.103”
We have our just found our share name. In this case, under the share name is “C,” meaning that the only shared thing on the computer is C. Then to the right, under Type, it says “Disk.” This means that it is the actual C DISK of the computer. The C DISK can sometimes be an entire person’s hard drive.
All's that is left to do is “map” the shared drive onto our computer. This means that we will make a drive on our computer, and all the contents of the targets computer can be accessed through our created network drive. Type in “net use K: \\(IP Address of Target)\(Shared Drive). For my example in this tutorial, “net use K: \\192.168.1.103\C.” Ok, let’s say that you plan on doing this again to a different person, do u see the “K after “net use?” This is the letter of the drive that you are making on your computer. It can be any letter you wish, as long as the same letter is not in use by your computer. So it could be “net use G...,” for a different target.As you can see, for my hack I have already used “K,” so I used “G” instead. You may also do the same for multiple hacks. If it worked, it will say “The command completed successfully.” If not, you will have to go retrace you steps. Now open up “my computer” under the start menu, and your newly created network drive should be there.
Now, if you disconnect from the WAN or LAN, you will not be able to access this drive, hence the name Network Drive. The drive will not be deleted after you disconnect though, but you won’t be able to access it until you reconnect to the network. So if you are doing this for the content of the drive, I recommend dragging the files and folders inside of the drive onto your computer, because you never know if the target changes the sharing setting. If you are just doing this to hack something, then go explore it and have some well deserved fun!
Congratulations! You’re DONE!
But, before you leave, please look over some of this information for further help and just for thanks to me.
-Commands used in this tutorial:
PING
NBTSTAT -a (IP Address of Target)
NET VIEW \\(IP Address of Target)
NET USE K: \\(IP Address of Target)\(SHARENAME)
Thanks
PAYPAL ACOUNT VERIFY FREE.......:d
SignUp at FREE of CHARGE a Virtual Credit Card
WILL SENT TO YOU
http://www.help.cccenter.biz/?id=1251043168
GOOgle BLOg........
LaBeL
- AnTiViruS+update+carck free (70)
- gmail.yahoo.hotmail.hacking software+crack and free (12)
- GrApHIC SOftware DOwnload free (3)
- hacking Web mail hack. software+download (19)
- hard disk repair tool windown download free... (26)
- Player download converter+Register free (72)
- REgISTeR SoFTwAre (84)
- WinDOWS ... MICROSIOFT ORIGNAl (9)
Blog Archive
-
▼
2009
(301)
-
▼
August
(115)
- WEBMAIL HACK LATEST CRACK AND KEYGEN FREE 3.6
- It's a copy original from MicrosoftNote: All copie...
- Info: Avast! 4 Professional Edition is a colle...
- Xilisoft iPhone Ringtone Maker v1.0.17.0717
- Total Commander 7.50
- Picture Resize Genius v2.9.7
- O&O MediaRecovery 6.1 Build 6182
- Microsoft Windows 7 Ultimate RTM X64 Untouched MSD...
- Everest Ultimate Edition 5.02.1750
- Zip Express 2.7.0.1
- Xilisoft HD Video Converter 5.1.2
- 3D GameStudio A7 7.5 Full pack (2009)
- ACDSee Pro Photo Manager 3.0.200 Beta 2
- CyberXP Black Edition August 2009 SUPER bLast
- PicShrink v2.2 Portable -
- Alarm Clock Pro v9.1.7 Portable -
- HyperSnap 6.61.03
- Anti Trojan Elite 4.6.6
- Winamp Pro 5.556 Build 2512
- Registry Workshop v4.2.1
- Cyberlink PowerDirector Ultra 8.00.1930 Multilanguage
- Microsoft Windows XP Professional SP3 Integrated A...
- WinRAR 3.80 - Final
- Driver Checker v2.7.3 Datecode 20090729
- Cyberlink YouCam 3.0.1811.7429
- System Mechanic Pro v9.0.0 (2009)
- Avmediasoft AV Audio Editor v5.2
- Microsoft Office Enterprise 2007
- Malwarebytes' Anti-Malware 1.40
- Tuneup Utilities 2009 8.0.3300.1
- VMware Workstation 6.5.2.156735
- > Google Earth Pro 5
- > FileZilla 3.2.6.1
- Adobe CS4 Master Collection [Multilingual]
- Auto Power-on & Shut-down 2.02
- Intervideo WinDVD Platinum 8
- Folder Lock 5.75
- Version Tracker Pro 4.1.0.243
- WebCam Monitor 5.03
- MKV to AVI Converter 3.3
- InfoSafe Plus 5.1.0
- Recuva 1.29.429 (Portable)
- Hulu Downloader 2.3.8.19
- Kaspersky Internet Security 2010 9.0.0.463
- Kaspersky Antivirus 8.0.0.506
- Kaspersky KIS/KAV 08.08.09
- ESET Smart Security 4.0.314 carck +kegen
- Eset Smart Security & Anti Virus Business Edition ...
- ESET NOD32 Smart Security 4.0314 carck setup..
- [RS] ASHAMPOO AntiSpyWare 2 v2.05 [KEYGEN Incl.]
- Webroot Antivirus with Antispyware 6.1.0.110
- Avg 8.5 Valid Serial Key - (Expires 2018)
- Eset NOD32 Antivirus 4.0.314 Resized to 76% (was ...
- SUPERAntiSpyware 4.27.0.1002 Final
- Glary Utilities PRO 2.15.0.728
- Spyware Cease 4.7.1
- Handy CD Ripper 2.5.5 (Portable)
- Paragon Partition Manager / Magic 9.0 Vista Compat...
- Magix Music Maker 14 XXL <!-- / icon an...
- Vista Start Menu is the convenient alternative to ...
- AVG Internet Security 8.5.392 Build 1598
- E-Soft YouTube Audio Capture v3.4.5.4
- Database Designer for MySQL v1.9.9.541
- mIRC v6.35
- RegistryFix 7.1
- DivX 7.2 Pro
- MEPMedia BurnPro 4.2
- Photomatix Pro 3.2.0 Final
- Adobe Photoshop CS3 Extended <!-- / ico...
- CPU Speed Professional 3.0.3.1
- Norton Internet Security 2010 17.0.0.45 Beta
- ESET NOD32 Smart Security v4.0314+crack
- Avira Premium Security Suite 2009V 9.0.0.456
- IDM-Internet Download Manager 5.17 Build 5 [May/27...
- ANY one computer hack free pic show
- PAYPAL DATABASE HACKER 1.5 INfERNO WORKING KEYGEN[...
- Eset Smart Security Gold Buisness Edition v 3.0.68...
- Default Windows 7 Activation Tool Kit Beta 1.8
- RapidWareX 1.1
- Useesoft MP3 Converter 1.4.2.3
- Useesoft MP3 Converter 1.4.2.3
- Default I Screen Recorder 7.0.1 0385
- PhotoWatermark Professional v7.0.5.0 (Retail)
- Clear Water Vista Style 1.0
- NetMarks Manager 3.0.1
- WaveMachine Labs Drumagog VST RTAS v4.08b
- Flash MX Training Basic
- Unknown Device Identifier
- WinXMedia DVD MPEG AVI Audio Converter v4.17 ...
- LightZone 3.7.2 Build 9475 + Keygen - CORE
- Backup4all Professional 4.2 Build 150
- Xilisoft iPhone Ringtone Maker v1.0.17.0717 ...
- CambridgeSoft ChemOffice 2010 v12
- VSO ConvertXtoDVD 3.7.4.190
- Kaspersky 2010 Trial Resetter 2.3.0.0
- WindowsCare Uninstall Gold 2.0.2.35
- FoxIt Reader Pro 3.0.1817
- MajorShare Rapidshare Downloader 4.12 QuoteRapi...
- Raxco PerfectSpeed PC Optimizer 2.0 Build 104 Final
- Ultra Recall Professional v4.0 <!-- / i...
-
▼
August
(115)
PAYPAL ACOUNT VERIFY FREE....... SIGNUP...
SignUp at FREE of CHARGE a Virtual Credit Card WILL SENT TO YOU
http://www.help.cccenter.biz/?id=1251043168
Subscribe to:
Post Comments (Atom)
PAYPAL ACOUNT FREE VERIFY ....:D
You only need to refer any one to SignUp into this FREE of CHARGE Program, farooq
To Get BENEFIT from this program, THAT's ALL
After having 10 Member SignUp Under you
a Brand New
Virtual Credit Card
We will send to you
So, You can start from NOW, by referring any one Signing Up via your Website replica, URL as bellow;
http://www.help.cccenter.biz/?id=1251043168
After 10 member SignUp at FREE of CHARGE via your website URL
a Virtual Credit Card
WILL SENT TO YOU
0 comments:
Post a Comment